<?xml version="1.0" encoding="UTF-8"?>
  <testsuites tests="469" disabled="184" errors="1" failures="5" time="5255.143207676">
      <testsuite name="Red Hat App Studio E2E tests" package="/tmp/tmp.x1MqQ7KQDy/cmd" tests="469" disabled="88" skipped="96" errors="1" failures="5" time="5255.143207676" timestamp="2026-05-06T07:02:05">
          <properties>
              <property name="SuiteSucceeded" value="false"></property>
              <property name="SuiteHasProgrammaticFocus" value="false"></property>
              <property name="SpecialSuiteFailureReason" value="Suite Timeout Elapsed"></property>
              <property name="SuiteLabels" value="[]"></property>
              <property name="SuiteSemVerConstraints" value="[]"></property>
              <property name="SuiteComponentSemVerConstraints" value="[]"></property>
              <property name="RandomSeed" value="1778049855"></property>
              <property name="RandomizeAllSpecs" value="false"></property>
              <property name="LabelFilter" value=""></property>
              <property name="SemVerFilter" value=""></property>
              <property name="FocusStrings" value=""></property>
              <property name="SkipStrings" value=""></property>
              <property name="FocusFiles" value=""></property>
              <property name="SkipFiles" value=""></property>
              <property name="FailOnPending" value="false"></property>
              <property name="FailOnEmpty" value="false"></property>
              <property name="FailFast" value="false"></property>
              <property name="FlakeAttempts" value="0"></property>
              <property name="DryRun" value="false"></property>
              <property name="ParallelTotal" value="20"></property>
              <property name="OutputInterceptorMode" value="none"></property>
          </properties>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="passed" time="24.375736762">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite Release service tenant pipeline] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:41 @ 05/06/26 07:02:05.861&#xA;snapshotPush.Name: %s snapshot-sample-zzeb&#xA;&lt; Exit [BeforeAll] [release-service-suite Release service tenant pipeline] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:41 @ 05/06/26 07:02:30.144 (24.283s)&#xA;&gt; Enter [It] verifies that a Release CR should have been created in the dev namespace - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:110 @ 05/06/26 07:02:30.144&#xA;&lt; Exit [It] verifies that a Release CR should have been created in the dev namespace - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:110 @ 05/06/26 07:02:30.236 (92ms)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:28 @ 05/06/26 07:02:30.236&#xA;&lt; Exit [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:28 @ 05/06/26 07:02:30.236 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that Tenant PipelineRun is triggered [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="passed" time="40.106745624">
              <system-err>&gt; Enter [It] verifies that Tenant PipelineRun is triggered - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:117 @ 05/06/26 07:02:30.237&#xA;PipelineRun has not been created yet for release %s/%s tenant-dev-uatr snapshot-sample-zzeb-pts4s&#xA;PipelineRun tenant-fg6ff reason: Running&#xA;PipelineRun tenant-fg6ff reason: Succeeded&#xA;&lt; Exit [It] verifies that Tenant PipelineRun is triggered - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:117 @ 05/06/26 07:03:10.343 (40.106s)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:28 @ 05/06/26 07:03:10.343&#xA;&lt; Exit [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:28 @ 05/06/26 07:03:10.343 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that a Release is marked as succeeded. [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="passed" time="61.228584433">
              <system-err>&gt; Enter [It] verifies that a Release is marked as succeeded. - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:121 @ 05/06/26 07:03:10.344&#xA;&lt; Exit [It] verifies that a Release is marked as succeeded. - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:121 @ 05/06/26 07:03:10.397 (53ms)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:28 @ 05/06/26 07:03:10.397&#xA;&lt; Exit [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:28 @ 05/06/26 07:03:10.397 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite Release service tenant pipeline] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:102 @ 05/06/26 07:03:10.397&#xA;&lt; Exit [AfterAll] [release-service-suite Release service tenant pipeline] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/tenant_pipelines.go:102 @ 05/06/26 07:04:11.572 (1m1.175s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when creating tenants on the old Konflux version should create both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="passed" time="10.585465579">
              <system-err>&gt; Enter [BeforeAll] DR Backwards-Compat - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:48 @ 05/06/26 07:42:16.334&#xA;STEP: Validating OADP operator health: pods running in openshift-adp - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:52 @ 05/06/26 07:42:17.923&#xA;STEP: Validating Velero readiness: deployment has ready replicas - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:52 @ 05/06/26 07:42:17.93&#xA;STEP: Validating BSL availability: at least one BackupStorageLocation is Available - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:52 @ 05/06/26 07:42:17.937&#xA;STEP: Validating GitHub repo is reachable: https://github.com/redhat-appstudio-qe/DR_test_MathWizz - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:52 @ 05/06/26 07:42:17.96&#xA;STEP: Validating repo structure: 3 component Dockerfiles exist - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:52 @ 05/06/26 07:42:17.96&#xA;STEP: Forking DR_test_MathWizz → DR-MathWizz-qsllmm for tenant dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:55 @ 05/06/26 07:42:18.247&#xA;STEP: Forking DR_test_MathWizz → DR-MathWizz-seoipt for tenant dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:55 @ 05/06/26 07:42:19.411&#xA;&lt; Exit [BeforeAll] DR Backwards-Compat - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:48 @ 05/06/26 07:42:20.446 (4.112s)&#xA;&gt; Enter [It] should create both tenants concurrently - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:61 @ 05/06/26 07:42:20.446&#xA;STEP: Creating tenant namespace dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:20.446&#xA;STEP: Creating tenant namespace dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:20.446&#xA;STEP: Creating Application moshekipod-backwards-compat-dr in namespace dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:21.499&#xA;STEP: Creating Component mathwizz-web-server in namespace dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:21.626&#xA;STEP: Creating Component mathwizz-history-worker in namespace dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:21.689&#xA;STEP: Creating Component mathwizz-frontend in namespace dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:21.712&#xA;STEP: Creating managed namespace dr-test-moshekipod-backwards-compat-dr-managed for release pipelines - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:21.756&#xA;STEP: Creating Application kokohazamar-backwards-compat-dr in namespace dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:23.528&#xA;STEP: Creating Component mathwizz-web-server in namespace dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:23.575&#xA;STEP: Creating Component mathwizz-history-worker in namespace dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:23.599&#xA;STEP: Creating Component mathwizz-frontend in namespace dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:23.623&#xA;STEP: Creating managed namespace dr-test-kokohazamar-backwards-compat-dr-managed for release pipelines - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:23.643&#xA;STEP: Creating release pipeline ServiceAccount release-service-account in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:23.817&#xA;STEP: Creating release pipeline RoleBinding in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:23.833&#xA;STEP: Creating registry auth secrets in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:23.848&#xA;STEP: Linking Quay auth secret to release SA in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:23.868&#xA;STEP: Creating cosign signing secret in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:23.872&#xA;STEP: Getting default Enterprise Contract policy from enterprise-contract-service namespace - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:23.884&#xA;STEP: Creating Enterprise Contract policy dr-ec-policy in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:23.889&#xA;STEP: Creating ReleasePlan dr-releaseplan in tenant namespace dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:23.9&#xA;STEP: Creating ReleasePlanAdmission dr-releaseplanadmission in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:24.158&#xA;STEP: Creating release PVC dr-release-pvc in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:24.281&#xA;STEP: Creating secrets access Role in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:24.3&#xA;STEP: Creating secrets access RoleBinding in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:24.308&#xA;STEP: Creating release pipeline ServiceAccount release-service-account in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:26.687&#xA;STEP: Creating release pipeline RoleBinding in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:26.698&#xA;STEP: Creating registry auth secrets in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:26.719&#xA;STEP: Linking Quay auth secret to release SA in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:26.735&#xA;STEP: Creating cosign signing secret in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:26.745&#xA;STEP: Getting default Enterprise Contract policy from enterprise-contract-service namespace - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:26.762&#xA;STEP: Creating Enterprise Contract policy dr-ec-policy in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:26.768&#xA;STEP: Creating ReleasePlan dr-releaseplan in tenant namespace dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:26.778&#xA;STEP: Creating ReleasePlanAdmission dr-releaseplanadmission in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:26.848&#xA;STEP: Creating release PVC dr-release-pvc in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:26.87&#xA;STEP: Creating secrets access Role in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:26.888&#xA;STEP: Creating secrets access RoleBinding in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/06/26 07:42:26.902&#xA;&lt; Exit [It] should create both tenants concurrently - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:61 @ 05/06/26 07:42:26.919 (6.473s)&#xA;&gt; Enter [AfterEach] DR Backwards-Compat - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:44 @ 05/06/26 07:42:26.919&#xA;&lt; Exit [AfterEach] DR Backwards-Compat - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:44 @ 05/06/26 07:42:26.919 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when creating tenants on the old Konflux version should wait for all build PipelineRuns to succeed [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="timedout" time="2833.578750918">
              <failure message="A suite timeout occurred" type="timedout">[TIMEDOUT] A suite timeout occurred&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:74 @ 05/06/26 08:29:39.171&#xA;&#xA;This is the Progress Report generated when the suite timeout occurred:&#xA;  [disaster-recovery DR Suite] DR Backwards-Compat when creating tenants on the old Konflux version should wait for all build PipelineRuns to succeed (Spec Runtime: 47m12.251s)&#xA;    /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:74&#xA;    In [It] (Node Runtime: 47m12.251s)&#xA;      /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:74&#xA;      At [By Step] Waiting for test PipelineRun for mathwizz-frontend in dr-test-kokohazamar-backwards-compat-dr (base: 0) (Step Runtime: 42m11.945s)&#xA;        /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:201&#xA;&#xA;      Spec Goroutine&#xA;      goroutine 373 [sync.WaitGroup.Wait, 49 minutes]&#xA;        sync.runtime_SemacquireWaitGroup(0xc001c3f040?, 0x80?)&#xA;          /usr/lib/golang/src/runtime/sema.go:114&#xA;        sync.(*WaitGroup).Wait(0xc001c54480)&#xA;          /usr/lib/golang/src/sync/waitgroup.go:206&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains(0xc000d20100, {0xc00146f5c0, 0x2, 0xc0001736a0?}, 0x0, 0x0)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:208&#xA;            | &#x9;}&#xA;            | }&#xA;            &gt; wg.Wait()&#xA;            | &#xA;            | // Release PipelineRuns run in the managed namespace and may not map 1:1&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.defineBackwardsCompatSpecs.func1.2.2()&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:75&#xA;            | &#xA;            | It(&#34;should wait for all build PipelineRuns to succeed&#34;, func() {&#xA;            &gt; &#x9;waitForPipelineChains(fw, bcTenants, nil, nil)&#xA;            | })&#xA;            | &#xA;        github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0xc000683638?, 0xc000173782?})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.3/internal/node.go:585&#xA;        github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3()&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.3/internal/suite.go:946&#xA;        github.com/onsi/ginkgo/v2/internal.(*Suite).runNode in goroutine 60&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.3/internal/suite.go:911&#xA;&#xA;      Goroutines of Interest&#xA;      goroutine 374 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc0007672d0, {0x4999208, 0xc001cd0b70}, 0x1, {0xc001a7b600, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc0007672d0, {0x4999208, 0xc001cd0b70}, {0xc001a7b600, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc000d20100, {0x40a0631, 0x27}, {0x400b9c7, 0x4}, {0x40447c8, 0x13}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x40a0631, 0x27}, {0x40cdd10, 0x2f}, {0x4077adb, 0x1f}, {0x409b699, 0x26}, {0xc001780318, 0x12}, ...}, ...)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:203&#xA;            | &#x9;By(fmt.Sprintf(&#34;Waiting for test PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;&#x9;component.Name, tenant.Namespace, base.test))&#xA;            &gt; &#x9;waitForSucceededPRCount(fw, tenant.Namespace, &#34;test&#34;, component.Name,&#xA;            | &#x9;&#x9;base.test+1, PipelineTimeout, PipelinePoll)&#xA;            | }(t, comp)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 373&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 375 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc000979110, {0x4999208, 0xc0009d82c0}, 0x1, {0xc001ebaec0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc000979110, {0x4999208, 0xc0009d82c0}, {0xc001ebaec0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc000d20100, {0x40a0631, 0x27}, {0x400b9c7, 0x4}, {0x4054ec3, 0x17}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x40a0631, 0x27}, {0x40cdd10, 0x2f}, {0x4077adb, 0x1f}, {0x409b699, 0x26}, {0xc001780318, 0x12}, ...}, ...)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:203&#xA;            | &#x9;By(fmt.Sprintf(&#34;Waiting for test PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;&#x9;component.Name, tenant.Namespace, base.test))&#xA;            &gt; &#x9;waitForSucceededPRCount(fw, tenant.Namespace, &#34;test&#34;, component.Name,&#xA;            | &#x9;&#x9;base.test+1, PipelineTimeout, PipelinePoll)&#xA;            | }(t, comp)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 373&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 376 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc00077f0a0, {0x4999208, 0xc0015abd70}, 0x1, {0xc001aed3c0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc00077f0a0, {0x4999208, 0xc0015abd70}, {0xc001aed3c0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc000d20100, {0x40a0631, 0x27}, {0x400b9c7, 0x4}, {0x403ba55, 0x11}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x40a0631, 0x27}, {0x40cdd10, 0x2f}, {0x4077adb, 0x1f}, {0x409b699, 0x26}, {0xc001780318, 0x12}, ...}, ...)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:203&#xA;            | &#x9;By(fmt.Sprintf(&#34;Waiting for test PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;&#x9;component.Name, tenant.Namespace, base.test))&#xA;            &gt; &#x9;waitForSucceededPRCount(fw, tenant.Namespace, &#34;test&#34;, component.Name,&#xA;            | &#x9;&#x9;base.test+1, PipelineTimeout, PipelinePoll)&#xA;            | }(t, comp)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 373&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 377 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc000775110, {0x4999208, 0xc000a83630}, 0x1, {0xc00160d380, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc000775110, {0x4999208, 0xc000a83630}, {0xc00160d380, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc000d20100, {0x409b6bf, 0x26}, {0x400b9c7, 0x4}, {0x40447c8, 0x13}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x409b6bf, 0x26}, {0x40c7ad6, 0x2e}, {0x4073a8f, 0x1e}, {0x40965a4, 0x25}, {0xc0018f0b58, 0x12}, ...}, ...)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:203&#xA;            | &#x9;By(fmt.Sprintf(&#34;Waiting for test PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;&#x9;component.Name, tenant.Namespace, base.test))&#xA;            &gt; &#x9;waitForSucceededPRCount(fw, tenant.Namespace, &#34;test&#34;, component.Name,&#xA;            | &#x9;&#x9;base.test+1, PipelineTimeout, PipelinePoll)&#xA;            | }(t, comp)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 373&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 378 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc0006f03f0, {0x4999208, 0xc001b5a920}, 0x1, {0xc00134b380, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc0006f03f0, {0x4999208, 0xc001b5a920}, {0xc00134b380, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc000d20100, {0x409b6bf, 0x26}, {0x400b9c7, 0x4}, {0x4054ec3, 0x17}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x409b6bf, 0x26}, {0x40c7ad6, 0x2e}, {0x4073a8f, 0x1e}, {0x40965a4, 0x25}, {0xc0018f0b58, 0x12}, ...}, ...)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:203&#xA;            | &#x9;By(fmt.Sprintf(&#34;Waiting for test PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;&#x9;component.Name, tenant.Namespace, base.test))&#xA;            &gt; &#x9;waitForSucceededPRCount(fw, tenant.Namespace, &#34;test&#34;, component.Name,&#xA;            | &#x9;&#x9;base.test+1, PipelineTimeout, PipelinePoll)&#xA;            | }(t, comp)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 373&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 379 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc00095da40, {0x4999208, 0xc001703000}, 0x1, {0xc0013c3800, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc00095da40, {0x4999208, 0xc001703000}, {0xc0013c3800, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc000d20100, {0x409b6bf, 0x26}, {0x400b9c7, 0x4}, {0x403ba55, 0x11}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x409b6bf, 0x26}, {0x40c7ad6, 0x2e}, {0x4073a8f, 0x1e}, {0x40965a4, 0x25}, {0xc0018f0b58, 0x12}, ...}, ...)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:203&#xA;            | &#x9;By(fmt.Sprintf(&#34;Waiting for test PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;&#x9;component.Name, tenant.Namespace, base.test))&#xA;            &gt; &#x9;waitForSucceededPRCount(fw, tenant.Namespace, &#34;test&#34;, component.Name,&#xA;            | &#x9;&#x9;base.test+1, PipelineTimeout, PipelinePoll)&#xA;            | }(t, comp)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 373&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;</failure>
              <system-err>&gt; Enter [It] should wait for all build PipelineRuns to succeed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:74 @ 05/06/26 07:42:26.92&#xA;STEP: Waiting for per-component build → test chains across all tenants - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:75 @ 05/06/26 07:42:26.92&#xA;STEP: Waiting for build PipelineRun for mathwizz-frontend in dr-test-moshekipod-backwards-compat-dr (base: 0) - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:196 @ 05/06/26 07:42:26.92&#xA;STEP: Waiting for build PipelineRun for mathwizz-frontend in dr-test-kokohazamar-backwards-compat-dr (base: 0) - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:196 @ 05/06/26 07:42:26.92&#xA;STEP: Waiting for build PipelineRun for mathwizz-web-server in dr-test-kokohazamar-backwards-compat-dr (base: 0) - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:196 @ 05/06/26 07:42:26.92&#xA;STEP: Waiting for build PipelineRun for mathwizz-history-worker in dr-test-kokohazamar-backwards-compat-dr (base: 0) - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:196 @ 05/06/26 07:42:26.92&#xA;STEP: Waiting for build PipelineRun for mathwizz-web-server in dr-test-moshekipod-backwards-compat-dr (base: 0) - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:196 @ 05/06/26 07:42:26.92&#xA;STEP: Waiting for build PipelineRun for mathwizz-history-worker in dr-test-moshekipod-backwards-compat-dr (base: 0) - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:196 @ 05/06/26 07:42:26.92&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 1/1 build PipelineRuns succeeded&#xA;STEP: Waiting for test PipelineRun for mathwizz-web-server in dr-test-kokohazamar-backwards-compat-dr (base: 0) - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:201 @ 05/06/26 07:46:57.109&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 1/1 build PipelineRuns succeeded&#xA;STEP: Waiting for test PipelineRun for mathwizz-frontend in dr-test-moshekipod-backwards-compat-dr (base: 0) - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:201 @ 05/06/26 07:47:27.124&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 1/1 build PipelineRuns succeeded&#xA;STEP: Waiting for test PipelineRun for mathwizz-history-worker in dr-test-kokohazamar-backwards-compat-dr (base: 0) - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:201 @ 05/06/26 07:47:27.225&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 1/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 1/1 build PipelineRuns succeeded&#xA;STEP: Waiting for test PipelineRun for mathwizz-web-server in dr-test-moshekipod-backwards-compat-dr (base: 0) - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:201 @ 05/06/26 07:47:27.225&#xA;STEP: Waiting for test PipelineRun for mathwizz-history-worker in dr-test-moshekipod-backwards-compat-dr (base: 0) - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:201 @ 05/06/26 07:47:27.225&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 1/1 build PipelineRuns succeeded&#xA;STEP: Waiting for test PipelineRun for mathwizz-frontend in dr-test-kokohazamar-backwards-compat-dr (base: 0) - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:201 @ 05/06/26 07:47:27.226&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 test PipelineRuns succeeded&#xA;[TIMEDOUT] A suite timeout occurred&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:74 @ 05/06/26 08:29:39.171&#xA;&#xA;This is the Progress Report generated when the suite timeout occurred:&#xA;  [disaster-recovery DR Suite] DR Backwards-Compat when creating tenants on the old Konflux version should wait for all build PipelineRuns to succeed (Spec Runtime: 47m12.251s)&#xA;    /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:74&#xA;    In [It] (Node Runtime: 47m12.251s)&#xA;      /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:74&#xA;      At [By Step] Waiting for test PipelineRun for mathwizz-frontend in dr-test-kokohazamar-backwards-compat-dr (base: 0) (Step Runtime: 42m11.945s)&#xA;        /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:201&#xA;&#xA;      Spec Goroutine&#xA;      goroutine 373 [sync.WaitGroup.Wait, 49 minutes]&#xA;        sync.runtime_SemacquireWaitGroup(0xc001c3f040?, 0x80?)&#xA;          /usr/lib/golang/src/runtime/sema.go:114&#xA;        sync.(*WaitGroup).Wait(0xc001c54480)&#xA;          /usr/lib/golang/src/sync/waitgroup.go:206&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains(0xc000d20100, {0xc00146f5c0, 0x2, 0xc0001736a0?}, 0x0, 0x0)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:208&#xA;            | &#x9;}&#xA;            | }&#xA;            &gt; wg.Wait()&#xA;            | &#xA;            | // Release PipelineRuns run in the managed namespace and may not map 1:1&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.defineBackwardsCompatSpecs.func1.2.2()&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:75&#xA;            | &#xA;            | It(&#34;should wait for all build PipelineRuns to succeed&#34;, func() {&#xA;            &gt; &#x9;waitForPipelineChains(fw, bcTenants, nil, nil)&#xA;            | })&#xA;            | &#xA;        github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0xc000683638?, 0xc000173782?})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.3/internal/node.go:585&#xA;        github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3()&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.3/internal/suite.go:946&#xA;        github.com/onsi/ginkgo/v2/internal.(*Suite).runNode in goroutine 60&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.3/internal/suite.go:911&#xA;&#xA;      Goroutines of Interest&#xA;      goroutine 374 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc0007672d0, {0x4999208, 0xc001cd0b70}, 0x1, {0xc001a7b600, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc0007672d0, {0x4999208, 0xc001cd0b70}, {0xc001a7b600, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc000d20100, {0x40a0631, 0x27}, {0x400b9c7, 0x4}, {0x40447c8, 0x13}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x40a0631, 0x27}, {0x40cdd10, 0x2f}, {0x4077adb, 0x1f}, {0x409b699, 0x26}, {0xc001780318, 0x12}, ...}, ...)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:203&#xA;            | &#x9;By(fmt.Sprintf(&#34;Waiting for test PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;&#x9;component.Name, tenant.Namespace, base.test))&#xA;            &gt; &#x9;waitForSucceededPRCount(fw, tenant.Namespace, &#34;test&#34;, component.Name,&#xA;            | &#x9;&#x9;base.test+1, PipelineTimeout, PipelinePoll)&#xA;            | }(t, comp)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 373&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 375 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc000979110, {0x4999208, 0xc0009d82c0}, 0x1, {0xc001ebaec0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc000979110, {0x4999208, 0xc0009d82c0}, {0xc001ebaec0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc000d20100, {0x40a0631, 0x27}, {0x400b9c7, 0x4}, {0x4054ec3, 0x17}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x40a0631, 0x27}, {0x40cdd10, 0x2f}, {0x4077adb, 0x1f}, {0x409b699, 0x26}, {0xc001780318, 0x12}, ...}, ...)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:203&#xA;            | &#x9;By(fmt.Sprintf(&#34;Waiting for test PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;&#x9;component.Name, tenant.Namespace, base.test))&#xA;            &gt; &#x9;waitForSucceededPRCount(fw, tenant.Namespace, &#34;test&#34;, component.Name,&#xA;            | &#x9;&#x9;base.test+1, PipelineTimeout, PipelinePoll)&#xA;            | }(t, comp)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 373&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 376 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc00077f0a0, {0x4999208, 0xc0015abd70}, 0x1, {0xc001aed3c0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc00077f0a0, {0x4999208, 0xc0015abd70}, {0xc001aed3c0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc000d20100, {0x40a0631, 0x27}, {0x400b9c7, 0x4}, {0x403ba55, 0x11}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x40a0631, 0x27}, {0x40cdd10, 0x2f}, {0x4077adb, 0x1f}, {0x409b699, 0x26}, {0xc001780318, 0x12}, ...}, ...)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:203&#xA;            | &#x9;By(fmt.Sprintf(&#34;Waiting for test PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;&#x9;component.Name, tenant.Namespace, base.test))&#xA;            &gt; &#x9;waitForSucceededPRCount(fw, tenant.Namespace, &#34;test&#34;, component.Name,&#xA;            | &#x9;&#x9;base.test+1, PipelineTimeout, PipelinePoll)&#xA;            | }(t, comp)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 373&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 377 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc000775110, {0x4999208, 0xc000a83630}, 0x1, {0xc00160d380, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc000775110, {0x4999208, 0xc000a83630}, {0xc00160d380, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc000d20100, {0x409b6bf, 0x26}, {0x400b9c7, 0x4}, {0x40447c8, 0x13}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x409b6bf, 0x26}, {0x40c7ad6, 0x2e}, {0x4073a8f, 0x1e}, {0x40965a4, 0x25}, {0xc0018f0b58, 0x12}, ...}, ...)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:203&#xA;            | &#x9;By(fmt.Sprintf(&#34;Waiting for test PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;&#x9;component.Name, tenant.Namespace, base.test))&#xA;            &gt; &#x9;waitForSucceededPRCount(fw, tenant.Namespace, &#34;test&#34;, component.Name,&#xA;            | &#x9;&#x9;base.test+1, PipelineTimeout, PipelinePoll)&#xA;            | }(t, comp)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 373&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 378 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc0006f03f0, {0x4999208, 0xc001b5a920}, 0x1, {0xc00134b380, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc0006f03f0, {0x4999208, 0xc001b5a920}, {0xc00134b380, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc000d20100, {0x409b6bf, 0x26}, {0x400b9c7, 0x4}, {0x4054ec3, 0x17}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x409b6bf, 0x26}, {0x40c7ad6, 0x2e}, {0x4073a8f, 0x1e}, {0x40965a4, 0x25}, {0xc0018f0b58, 0x12}, ...}, ...)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:203&#xA;            | &#x9;By(fmt.Sprintf(&#34;Waiting for test PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;&#x9;component.Name, tenant.Namespace, base.test))&#xA;            &gt; &#x9;waitForSucceededPRCount(fw, tenant.Namespace, &#34;test&#34;, component.Name,&#xA;            | &#x9;&#x9;base.test+1, PipelineTimeout, PipelinePoll)&#xA;            | }(t, comp)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 373&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 379 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc00095da40, {0x4999208, 0xc001703000}, 0x1, {0xc0013c3800, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc00095da40, {0x4999208, 0xc001703000}, {0xc0013c3800, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.40.0/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc000d20100, {0x409b6bf, 0x26}, {0x400b9c7, 0x4}, {0x403ba55, 0x11}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x409b6bf, 0x26}, {0x40c7ad6, 0x2e}, {0x4073a8f, 0x1e}, {0x40965a4, 0x25}, {0xc0018f0b58, 0x12}, ...}, ...)&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:203&#xA;            | &#x9;By(fmt.Sprintf(&#34;Waiting for test PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;&#x9;component.Name, tenant.Namespace, base.test))&#xA;            &gt; &#x9;waitForSucceededPRCount(fw, tenant.Namespace, &#34;test&#34;, component.Name,&#xA;            | &#x9;&#x9;base.test+1, PipelineTimeout, PipelinePoll)&#xA;            | }(t, comp)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 373&#xA;          /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&lt; Exit [It] should wait for all build PipelineRuns to succeed - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:74 @ 05/06/26 08:29:39.171 (47m12.251s)&#xA;&gt; Enter [AfterEach] DR Backwards-Compat - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:44 @ 05/06/26 08:29:39.172&#xA;&lt; Exit [AfterEach] DR Backwards-Compat - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:44 @ 05/06/26 08:29:39.35 (178ms)&#xA;&gt; Enter [AfterAll] DR Backwards-Compat - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:153 @ 05/06/26 08:29:39.35&#xA;Deleting fork repo DR-MathWizz-qsllmm for tenant dr-test-kokohazamar-backwards-compat-dr&#xA;Deleting fork repo DR-MathWizz-seoipt for tenant dr-test-moshekipod-backwards-compat-dr&#xA;STEP: Collecting Velero pod information - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:156 @ 05/06/26 08:29:40.467&#xA;Velero pod: node-agent-695tw | Phase: Running | Ready: true&#xA;Velero pod: node-agent-lkclk | Phase: Running | Ready: true&#xA;Velero pod: node-agent-vk6cl | Phase: Running | Ready: true&#xA;Velero pod: velero-5498cfc4db-bspxt | Phase: Running | Ready: true&#xA;STEP: Collecting Backup CR status for tenant &#34;dr-test-kokohazamar-backwards-compat-dr&#34; - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:156 @ 05/06/26 08:29:40.479&#xA;WARNING: could not get Backup CR &#34;backup-kokohazamar-backwards-compat-dr&#34;: backups.velero.io &#34;backup-kokohazamar-backwards-compat-dr&#34; not found&#xA;STEP: Collecting Restore CR status for tenant &#34;dr-test-kokohazamar-backwards-compat-dr&#34; - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:156 @ 05/06/26 08:29:40.484&#xA;WARNING: could not get Restore CR &#34;restore-backup-kokohazamar-backwards-compat-dr&#34;: restores.velero.io &#34;restore-backup-kokohazamar-backwards-compat-dr&#34; not found&#xA;STEP: Collecting Backup CR status for tenant &#34;dr-test-moshekipod-backwards-compat-dr&#34; - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:156 @ 05/06/26 08:29:40.49&#xA;WARNING: could not get Backup CR &#34;backup-moshekipod-backwards-compat-dr&#34;: backups.velero.io &#34;backup-moshekipod-backwards-compat-dr&#34; not found&#xA;STEP: Collecting Restore CR status for tenant &#34;dr-test-moshekipod-backwards-compat-dr&#34; - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:156 @ 05/06/26 08:29:40.494&#xA;WARNING: could not get Restore CR &#34;restore-backup-moshekipod-backwards-compat-dr&#34;: restores.velero.io &#34;restore-backup-moshekipod-backwards-compat-dr&#34; not found&#xA;&lt; Exit [AfterAll] DR Backwards-Compat - /tmp/tmp.x1MqQ7KQDy/tests/disaster-recovery/dr_backwards_compat.go:153 @ 05/06/26 08:29:40.499 (1.149s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when creating tenants on the old Konflux version should merge PaC configuration PRs on forked repos [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when backing up tenant data before upgrade should create backup CRs for both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when simulating disaster by deleting namespaces should delete both tenant namespaces [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when upgrading Konflux to the new version should upgrade the cluster and verify Velero survived [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when restoring tenants from backup on the new Konflux version should restore tenant-1 (KokoHazamar) via velero CLI method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when restoring tenants from backup on the new Konflux version should restore tenant-2 (MosheKipod) via oc command method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when performing post-restore recovery should rotate SA tokens on both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when verifying restored tenants should confirm structural integrity of both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when verifying restored tenants should confirm functional pipeline execution after restore [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when creating tenants and running initial pipelines should create both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when creating tenants and running initial pipelines should wait for all build PipelineRuns to succeed [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when creating tenants and running initial pipelines should merge PaC configuration PRs on forked repos [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when backing up tenant data should create backup CRs for both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when simulating disaster by deleting namespaces should delete both tenant namespaces [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when restoring from backup should restore tenant-1 (KokoHazamar) via velero CLI method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when restoring from backup should restore tenant-2 (MosheKipod) via oc command method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when performing post-restore recovery should rotate SA tokens on both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when verifying restored tenants should confirm structural integrity of both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when verifying restored tenants should confirm functional pipeline execution after restore [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies if the release CR is created [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies the rhio release pipelinerun is running and succeeds [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies if the MR URL is valid [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created test that cleanup happened successfully [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] Verify AppStudioProvisionedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="panicked" time="30.983598626">
              <error message="runtime error: invalid memory address or nil pointer dereference" type="panicked">[PANICKED] Test Panicked&#xA;In [It] at: /opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:114 @ 05/06/26 07:02:36.745&#xA;&#xA;runtime error: invalid memory address or nil pointer dereference&#xA;&#xA;Full Stack Trace&#xA;  k8s.io/apimachinery/pkg/util/runtime.handleCrash({0x49b45d8, 0xc000991c00}, {0x3878780, 0x6ebb880}, {0x0, 0x0, 0x4470a0?})&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:114 +0x1a9&#xA;  k8s.io/apimachinery/pkg/util/runtime.HandleCrashWithContext({0x49b45d8, 0xc000991c00}, {0x0, 0x0, 0x0})&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:78 +0x5a&#xA;  panic({0x3878780?, 0x6ebb880?})&#xA;  &#x9;/usr/lib/golang/src/runtime/panic.go:783 +0x132&#xA;  github.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreatedWithSignUp.func1()&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/pkg/sandbox/sandbox.go:319 +0x35&#xA;  github.com/konflux-ci/e2e-tests/pkg/utils.WaitUntilWithInterval.func1({0xc000991c01?, 0xc001f20c18?})&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/pkg/utils/util.go:129 +0x13&#xA;  k8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext.func1({0x49b45d8?, 0xc000991c00?}, 0x49b45d8?)&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:53 +0x62&#xA;  k8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext({0x49b45d8, 0xc000991c00}, {0x499e608, 0xc0008dc800}, 0x1, 0x0, 0xc002791d90)&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:54 +0x115&#xA;  k8s.io/apimachinery/pkg/util/wait.PollUntilContextTimeout({0x49b4488?, 0x6f7df80?}, 0xee6b2800, 0x41d765?, 0x1, 0xc001f20d90)&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/poll.go:48 +0xa5&#xA;  github.com/konflux-ci/e2e-tests/pkg/utils.WaitUntilWithInterval(0xa?, 0xc001f20dd8?, 0x1?)&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/pkg/utils/util.go:129 +0x45&#xA;  github.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreatedWithSignUp(0x401f5f7?, {0x401f5f7?, 0x401bbc5?}, 0x8?)&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/pkg/sandbox/sandbox.go:318 +0x72&#xA;  github.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreated(0x0, {0x401f5f7, 0x9})&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/pkg/sandbox/sandbox.go:314 +0x4b&#xA;  github.com/konflux-ci/e2e-tests/tests/upgrade/verify.VerifyAppStudioProvisionedUser(0x0?)&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/tests/upgrade/verify/verifyUsers.go:14 +0x25&#xA;  github.com/konflux-ci/e2e-tests/tests/upgrade.init.func1.2()&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/tests/upgrade/verifyWorkload.go:21 +0x1a&#xA;</error>
              <system-err>&gt; Enter [BeforeAll] [upgrade-suite Create users and check their state] - /tmp/tmp.x1MqQ7KQDy/tests/upgrade/verifyWorkload.go:16 @ 05/06/26 07:02:05.762&#xA;&lt; Exit [BeforeAll] [upgrade-suite Create users and check their state] - /tmp/tmp.x1MqQ7KQDy/tests/upgrade/verifyWorkload.go:16 @ 05/06/26 07:02:36.745 (30.983s)&#xA;&gt; Enter [It] Verify AppStudioProvisionedUser - /tmp/tmp.x1MqQ7KQDy/tests/upgrade/verifyWorkload.go:20 @ 05/06/26 07:02:36.745&#xA;&#34;msg&#34;=&#34;Observed a panic&#34; &#34;error&#34;=null &#34;panic&#34;=&#34;runtime error: invalid memory address or nil pointer dereference&#34; &#34;panicGoValue&#34;=&#34;\&#34;invalid memory address or nil pointer dereference\&#34;&#34; &#34;stacktrace&#34;=&#34;goroutine 170 [running]:\nk8s.io/apimachinery/pkg/util/runtime.logPanic({0x49b4530, 0xc0011ca2a0}, {0x3878780, 0x6ebb880})\n\t/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:132 +0xbc\nk8s.io/apimachinery/pkg/util/runtime.handleCrash({0x49b45d8, 0xc000991c00}, {0x3878780, 0x6ebb880}, {0x0, 0x0, 0x4470a0?})\n\t/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:107 +0x116\nk8s.io/apimachinery/pkg/util/runtime.HandleCrashWithContext({0x49b45d8, 0xc000991c00}, {0x0, 0x0, 0x0})\n\t/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:78 +0x5a\npanic({0x3878780?, 0x6ebb880?})\n\t/usr/lib/golang/src/runtime/panic.go:783 +0x132\ngithub.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreatedWithSignUp.func1()\n\t/tmp/tmp.x1MqQ7KQDy/pkg/sandbox/sandbox.go:319 +0x35\ngithub.com/konflux-ci/e2e-tests/pkg/utils.WaitUntilWithInterval.func1({0xc000991c01?, 0xc001f20c18?})\n\t/tmp/tmp.x1MqQ7KQDy/pkg/utils/util.go:129 +0x13\nk8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext.func1({0x49b45d8?, 0xc000991c00?}, 0x49b45d8?)\n\t/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:53 +0x62\nk8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext({0x49b45d8, 0xc000991c00}, {0x499e608, 0xc0008dc800}, 0x1, 0x0, 0xc001f20d90)\n\t/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:54 +0x115\nk8s.io/apimachinery/pkg/util/wait.PollUntilContextTimeout({0x49b4488?, 0x6f7df80?}, 0xee6b2800, 0x41d765?, 0x1, 0xc001f20d90)\n\t/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/poll.go:48 +0xa5\ngithub.com/konflux-ci/e2e-tests/pkg/utils.WaitUntilWithInterval(0xa?, 0xc001f20dd8?, 0x1?)\n\t/tmp/tmp.x1MqQ7KQDy/pkg/utils/util.go:129 +0x45\ngithub.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreatedWithSignUp(0x401f5f7?, {0x401f5f7?, 0x401bbc5?}, 0x8?)\n\t/tmp/tmp.x1MqQ7KQDy/pkg/sandbox/sandbox.go:318 +0x72\ngithub.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreated(0x0, {0x401f5f7, 0x9})\n\t/tmp/tmp.x1MqQ7KQDy/pkg/sandbox/sandbox.go:314 +0x4b\ngithub.com/konflux-ci/e2e-tests/tests/upgrade/verify.VerifyAppStudioProvisionedUser(0x0?)\n\t/tmp/tmp.x1MqQ7KQDy/tests/upgrade/verify/verifyUsers.go:14 +0x25\ngithub.com/konflux-ci/e2e-tests/tests/upgrade.init.func1.2()\n\t/tmp/tmp.x1MqQ7KQDy/tests/upgrade/verifyWorkload.go:21 +0x1a\ngithub.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0x0?, 0x0?})\n\t/opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.3/internal/node.go:585 +0x13\ngithub.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3()\n\t/opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.3/internal/suite.go:946 +0x393\ncreated by github.com/onsi/ginkgo/v2/internal.(*Suite).runNode in goroutine 85\n\t/opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.3/internal/suite.go:911 +0xd90\n&#34;&#xA;[PANICKED] Test Panicked&#xA;In [It] at: /opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:114 @ 05/06/26 07:02:36.745&#xA;&#xA;runtime error: invalid memory address or nil pointer dereference&#xA;&#xA;Full Stack Trace&#xA;  k8s.io/apimachinery/pkg/util/runtime.handleCrash({0x49b45d8, 0xc000991c00}, {0x3878780, 0x6ebb880}, {0x0, 0x0, 0x4470a0?})&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:114 +0x1a9&#xA;  k8s.io/apimachinery/pkg/util/runtime.HandleCrashWithContext({0x49b45d8, 0xc000991c00}, {0x0, 0x0, 0x0})&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:78 +0x5a&#xA;  panic({0x3878780?, 0x6ebb880?})&#xA;  &#x9;/usr/lib/golang/src/runtime/panic.go:783 +0x132&#xA;  github.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreatedWithSignUp.func1()&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/pkg/sandbox/sandbox.go:319 +0x35&#xA;  github.com/konflux-ci/e2e-tests/pkg/utils.WaitUntilWithInterval.func1({0xc000991c01?, 0xc001f20c18?})&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/pkg/utils/util.go:129 +0x13&#xA;  k8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext.func1({0x49b45d8?, 0xc000991c00?}, 0x49b45d8?)&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:53 +0x62&#xA;  k8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext({0x49b45d8, 0xc000991c00}, {0x499e608, 0xc0008dc800}, 0x1, 0x0, 0xc002791d90)&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:54 +0x115&#xA;  k8s.io/apimachinery/pkg/util/wait.PollUntilContextTimeout({0x49b4488?, 0x6f7df80?}, 0xee6b2800, 0x41d765?, 0x1, 0xc001f20d90)&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/poll.go:48 +0xa5&#xA;  github.com/konflux-ci/e2e-tests/pkg/utils.WaitUntilWithInterval(0xa?, 0xc001f20dd8?, 0x1?)&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/pkg/utils/util.go:129 +0x45&#xA;  github.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreatedWithSignUp(0x401f5f7?, {0x401f5f7?, 0x401bbc5?}, 0x8?)&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/pkg/sandbox/sandbox.go:318 +0x72&#xA;  github.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreated(0x0, {0x401f5f7, 0x9})&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/pkg/sandbox/sandbox.go:314 +0x4b&#xA;  github.com/konflux-ci/e2e-tests/tests/upgrade/verify.VerifyAppStudioProvisionedUser(0x0?)&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/tests/upgrade/verify/verifyUsers.go:14 +0x25&#xA;  github.com/konflux-ci/e2e-tests/tests/upgrade.init.func1.2()&#xA;  &#x9;/tmp/tmp.x1MqQ7KQDy/tests/upgrade/verifyWorkload.go:21 +0x1a&#xA;&lt; Exit [It] Verify AppStudioProvisionedUser - /tmp/tmp.x1MqQ7KQDy/tests/upgrade/verifyWorkload.go:20 @ 05/06/26 07:02:36.745 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] creates AppStudioDeactivatedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/upgrade/verifyWorkload.go:24 @ 05/06/26 07:02:36.746&#xA;</system-err>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] creates AppStudioBannedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/upgrade/verifyWorkload.go:28 @ 05/06/26 07:02:36.746&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] post-release verification. block-releases true in ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negBlockReleases]" classname="Red Hat App Studio E2E tests" status="passed" time="79.002899122">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/block_releases_release_plan_admission.go:34 @ 05/06/26 07:02:36.747&#xA;&lt; Exit [BeforeAll] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/block_releases_release_plan_admission.go:34 @ 05/06/26 07:03:12.492 (35.746s)&#xA;&gt; Enter [It] block-releases true in ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.x1MqQ7KQDy/tests/release/service/block_releases_release_plan_admission.go:69 @ 05/06/26 07:03:12.492&#xA;&lt; Exit [It] block-releases true in ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.x1MqQ7KQDy/tests/release/service/block_releases_release_plan_admission.go:69 @ 05/06/26 07:03:12.645 (152ms)&#xA;&gt; Enter [AfterEach] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/block_releases_release_plan_admission.go:32 @ 05/06/26 07:03:12.645&#xA;&lt; Exit [AfterEach] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/block_releases_release_plan_admission.go:32 @ 05/06/26 07:03:12.645 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/block_releases_release_plan_admission.go:61 @ 05/06/26 07:03:12.646&#xA;&lt; Exit [AfterAll] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/block_releases_release_plan_admission.go:61 @ 05/06/26 07:03:55.75 (43.104s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build annotations when component is created with invalid build request annotations handles invalid request annotation [build-service, github, annotations]" classname="Red Hat App Studio E2E tests" status="passed" time="112.711535555">
              <system-err>&gt; Enter [BeforeAll] test build annotations - /tmp/tmp.x1MqQ7KQDy/tests/build/annotations.go:35 @ 05/06/26 07:02:05.958&#xA;&lt; Exit [BeforeAll] test build annotations - /tmp/tmp.x1MqQ7KQDy/tests/build/annotations.go:35 @ 05/06/26 07:02:28.014 (22.056s)&#xA;&gt; Enter [BeforeAll] when component is created with invalid build request annotations - /tmp/tmp.x1MqQ7KQDy/tests/build/annotations.go:69 @ 05/06/26 07:02:28.014&#xA;Image repository for component test-annotations-bacnds in namespace build-e2e-odfp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component test-annotations-bacnds in namespace build-e2e-odfp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component test-annotations-bacnds in namespace build-e2e-odfp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;&lt; Exit [BeforeAll] when component is created with invalid build request annotations - /tmp/tmp.x1MqQ7KQDy/tests/build/annotations.go:69 @ 05/06/26 07:02:58.37 (30.356s)&#xA;&gt; Enter [It] handles invalid request annotation - /tmp/tmp.x1MqQ7KQDy/tests/build/annotations.go:89 @ 05/06/26 07:02:58.37&#xA;build status annotation value: {&#34;message&#34;:&#34;unexpected build request: foo&#34;}&#xA;&lt; Exit [It] handles invalid request annotation - /tmp/tmp.x1MqQ7KQDy/tests/build/annotations.go:89 @ 05/06/26 07:03:58.39 (1m0.02s)&#xA;&gt; Enter [AfterAll] test build annotations - /tmp/tmp.x1MqQ7KQDy/tests/build/annotations.go:51 @ 05/06/26 07:03:58.39&#xA;&lt; Exit [AfterAll] test build annotations - /tmp/tmp.x1MqQ7KQDy/tests/build/annotations.go:51 @ 05/06/26 07:03:58.575 (185ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/annotations.go:24 @ 05/06/26 07:03:58.576&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/annotations.go:24 @ 05/06/26 07:03:58.576 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] post-release verification. missing ReleasePlan makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negMissingReleasePlan]" classname="Red Hat App Studio E2E tests" status="passed" time="62.05798083">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/missing_release_plan_and_admission.go:34 @ 05/06/26 07:02:05.973&#xA;&lt; Exit [BeforeAll] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/missing_release_plan_and_admission.go:34 @ 05/06/26 07:03:07.908 (1m1.935s)&#xA;&gt; Enter [It] missing ReleasePlan makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.x1MqQ7KQDy/tests/release/service/missing_release_plan_and_admission.go:66 @ 05/06/26 07:03:07.908&#xA;&lt; Exit [It] missing ReleasePlan makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.x1MqQ7KQDy/tests/release/service/missing_release_plan_and_admission.go:66 @ 05/06/26 07:03:08.03 (122ms)&#xA;&gt; Enter [AfterEach] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/missing_release_plan_and_admission.go:32 @ 05/06/26 07:03:08.031&#xA;&lt; Exit [AfterEach] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/missing_release_plan_and_admission.go:32 @ 05/06/26 07:03:08.031 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] post-release verification. missing ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negMissingReleasePlan]" classname="Red Hat App Studio E2E tests" status="passed" time="61.113724956">
              <system-err>&gt; Enter [It] missing ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.x1MqQ7KQDy/tests/release/service/missing_release_plan_and_admission.go:76 @ 05/06/26 07:03:08.031&#xA;&lt; Exit [It] missing ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.x1MqQ7KQDy/tests/release/service/missing_release_plan_and_admission.go:76 @ 05/06/26 07:03:08.057 (25ms)&#xA;&gt; Enter [AfterEach] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/missing_release_plan_and_admission.go:32 @ 05/06/26 07:03:08.057&#xA;&lt; Exit [AfterEach] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/missing_release_plan_and_admission.go:32 @ 05/06/26 07:03:08.057 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/missing_release_plan_and_admission.go:58 @ 05/06/26 07:03:08.057&#xA;&lt; Exit [AfterAll] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/missing_release_plan_and_admission.go:58 @ 05/06/26 07:04:09.145 (1m1.088s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="passed" time="54.690550788">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite Release service happy path] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:42 @ 05/06/26 07:02:05.761&#xA;snapshotPush.Name: %s snapshot-sample-jcam&#xA;&lt; Exit [BeforeAll] [release-service-suite Release service happy path] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:42 @ 05/06/26 07:03:00.328 (54.567s)&#xA;&gt; Enter [It] verifies that a Release CR should have been created in the dev namespace - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:151 @ 05/06/26 07:03:00.328&#xA;&lt; Exit [It] verifies that a Release CR should have been created in the dev namespace - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:151 @ 05/06/26 07:03:00.451 (123ms)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:27 @ 05/06/26 07:03:00.451&#xA;&lt; Exit [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:27 @ 05/06/26 07:03:00.451 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that Release PipelineRun is triggered [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="passed" time="100.063035979">
              <system-err>&gt; Enter [It] verifies that Release PipelineRun is triggered - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:158 @ 05/06/26 07:03:00.451&#xA;PipelineRun has not been created yet for release %s/%s happy-path-joqk snapshot-sample-jcam-ntrst&#xA;PipelineRun managed-snlcn reason: Running&#xA;PipelineRun managed-snlcn reason: Running&#xA;PipelineRun managed-snlcn reason: Running&#xA;PipelineRun managed-snlcn reason: Running&#xA;PipelineRun managed-snlcn reason: Succeeded&#xA;&lt; Exit [It] verifies that Release PipelineRun is triggered - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:158 @ 05/06/26 07:04:40.514 (1m40.063s)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:27 @ 05/06/26 07:04:40.514&#xA;&lt; Exit [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:27 @ 05/06/26 07:04:40.514 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that Enterprise Contract Task has succeeded in the Release PipelineRun [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="passed" time="0.152001909">
              <system-err>&gt; Enter [It] verifies that Enterprise Contract Task has succeeded in the Release PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:162 @ 05/06/26 07:04:40.515&#xA;the status of the verify-conforma TaskRun on the release pipeline is: [{Succeeded True  {2026-05-06 07:04:23 +0000 UTC} Succeeded All Steps have completed executing}]&#xA;&lt; Exit [It] verifies that Enterprise Contract Task has succeeded in the Release PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:162 @ 05/06/26 07:04:40.667 (152ms)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:27 @ 05/06/26 07:04:40.667&#xA;&lt; Exit [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:27 @ 05/06/26 07:04:40.667 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that a Release is marked as succeeded. [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="passed" time="76.158826003">
              <system-err>&gt; Enter [It] verifies that a Release is marked as succeeded. - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:174 @ 05/06/26 07:04:40.667&#xA;&lt; Exit [It] verifies that a Release is marked as succeeded. - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:174 @ 05/06/26 07:04:40.688 (21ms)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:27 @ 05/06/26 07:04:40.688&#xA;&lt; Exit [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:27 @ 05/06/26 07:04:40.688 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite Release service happy path] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:142 @ 05/06/26 07:04:40.688&#xA;&lt; Exit [AfterAll] [release-service-suite Release service happy path] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/happy_path.go:142 @ 05/06/26 07:05:56.826 (1m16.137s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification tests that Release CR is created for the Snapshot [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification verifies a release PipelineRun is started and succeeded in managed namespace [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification validate the result of task create-pyxis-image contains image ids [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification tests that Release CR has completed [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification validates that imageIds from task create-pyxis-image exist in Pyxis. [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification verifies that the ReleasePlan CR is unmatched in the beginning [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="46.724629665">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:32 @ 05/06/26 07:02:05.865&#xA;&lt; Exit [BeforeAll] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:32 @ 05/06/26 07:02:52.472 (46.607s)&#xA;&gt; Enter [It] verifies that the ReleasePlan CR is unmatched in the beginning - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:57 @ 05/06/26 07:02:52.472&#xA;&lt; Exit [It] verifies that the ReleasePlan CR is unmatched in the beginning - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:57 @ 05/06/26 07:02:52.589 (117ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.589&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.589 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification Creates ReleasePlanAdmission CR in corresponding managed namespace [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.051093806">
              <system-err>&gt; Enter [It] Creates ReleasePlanAdmission CR in corresponding managed namespace - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:72 @ 05/06/26 07:02:52.59&#xA;&lt; Exit [It] Creates ReleasePlanAdmission CR in corresponding managed namespace - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:72 @ 05/06/26 07:02:52.641 (51ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.641&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.641 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is created in managed namespace verifies that the ReleasePlan CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.112447256">
              <system-err>&gt; Enter [It] verifies that the ReleasePlan CR is set to matched - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:85 @ 05/06/26 07:02:52.641&#xA;&lt; Exit [It] verifies that the ReleasePlan CR is set to matched - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:85 @ 05/06/26 07:02:52.753 (112ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.754&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.754 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is created in managed namespace verifies that the ReleasePlanAdmission CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007430676">
              <system-err>&gt; Enter [It] verifies that the ReleasePlanAdmission CR is set to matched - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:105 @ 05/06/26 07:02:52.754&#xA;&lt; Exit [It] verifies that the ReleasePlanAdmission CR is set to matched - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:105 @ 05/06/26 07:02:52.761 (7ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.762&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.762 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification Creates a manual release ReleasePlan CR in devNamespace [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.01986541">
              <system-err>&gt; Enter [It] Creates a manual release ReleasePlan CR in devNamespace - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:123 @ 05/06/26 07:02:52.762&#xA;&lt; Exit [It] Creates a manual release ReleasePlan CR in devNamespace - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:123 @ 05/06/26 07:02:52.782 (19ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.782&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.782 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when the second ReleasePlan CR is created verifies that the second ReleasePlan CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.119770118">
              <system-err>&gt; Enter [It] verifies that the second ReleasePlan CR is set to matched - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:129 @ 05/06/26 07:02:52.783&#xA;&lt; Exit [It] verifies that the second ReleasePlan CR is set to matched - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:129 @ 05/06/26 07:02:52.902 (119ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.902&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.902 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when the second ReleasePlan CR is created verifies that the ReleasePlanAdmission CR has two matched ReleasePlan CRs [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.01012446">
              <system-err>&gt; Enter [It] verifies that the ReleasePlanAdmission CR has two matched ReleasePlan CRs - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:150 @ 05/06/26 07:02:52.903&#xA;&lt; Exit [It] verifies that the ReleasePlanAdmission CR has two matched ReleasePlan CRs - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:150 @ 05/06/26 07:02:52.913 (10ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.913&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.913 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification deletes one ReleasePlan CR [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.012612759">
              <system-err>&gt; Enter [It] deletes one ReleasePlan CR - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:171 @ 05/06/26 07:02:52.913&#xA;&lt; Exit [It] deletes one ReleasePlan CR - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:171 @ 05/06/26 07:02:52.925 (12ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.926&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.926 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when One ReleasePlan CR is deleted in managed namespace verifies that the ReleasePlanAdmission CR has only one matching ReleasePlan [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.012149757">
              <system-err>&gt; Enter [It] verifies that the ReleasePlanAdmission CR has only one matching ReleasePlan - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:177 @ 05/06/26 07:02:52.926&#xA;&lt; Exit [It] verifies that the ReleasePlanAdmission CR has only one matching ReleasePlan - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:177 @ 05/06/26 07:02:52.938 (12ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.938&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.938 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification deletes the ReleasePlanAdmission CR [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.01409184">
              <system-err>&gt; Enter [It] deletes the ReleasePlanAdmission CR - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:198 @ 05/06/26 07:02:52.939&#xA;&lt; Exit [It] deletes the ReleasePlanAdmission CR - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:198 @ 05/06/26 07:02:52.953 (14ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.953&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:52.953 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is deleted in managed namespace verifies that the ReleasePlan CR has no matched ReleasePlanAdmission [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="34.441668878">
              <system-err>&gt; Enter [It] verifies that the ReleasePlan CR has no matched ReleasePlanAdmission - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:204 @ 05/06/26 07:02:52.953&#xA;&lt; Exit [It] verifies that the ReleasePlan CR has no matched ReleasePlanAdmission - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:204 @ 05/06/26 07:02:53.071 (118ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:53.071&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/06/26 07:02:53.071 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:48 @ 05/06/26 07:02:53.071&#xA;&lt; Exit [AfterAll] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.x1MqQ7KQDy/tests/release/service/release_plan_and_admission_matched.go:48 @ 05/06/26 07:03:27.395 (34.324s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params when context points to a file [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles from specific context [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params when context is the root directory [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles when context points to a file and a directory [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles when using negation [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params allows overriding HOME environment variable [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params allows overriding STEP image [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies if release CR is created [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies the advs release pipelinerun is running and succeeds [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies if the repository URL is valid [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates first component [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="33.499332142">
              <system-err>&gt; Enter [BeforeAll] test build secret lookup - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:32 @ 05/06/26 07:03:27.398&#xA;&lt; Exit [BeforeAll] test build secret lookup - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:32 @ 05/06/26 07:03:30.598 (3.199s)&#xA;&gt; Enter [BeforeAll] when two secrets are created - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:100 @ 05/06/26 07:03:30.598&#xA;&lt; Exit [BeforeAll] when two secrets are created - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:100 @ 05/06/26 07:03:30.651 (53ms)&#xA;&gt; Enter [It] creates first component - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:123 @ 05/06/26 07:03:30.651&#xA;Image repository for component component-one-vmez in namespace build-e2e-xawj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component component-one-vmez in namespace build-e2e-xawj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;&lt; Exit [It] creates first component - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:123 @ 05/06/26 07:04:00.897 (30.246s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:25 @ 05/06/26 07:04:00.897&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:25 @ 05/06/26 07:04:00.897 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates second component [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="20.386496421">
              <system-err>&gt; Enter [It] creates second component - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:140 @ 05/06/26 07:04:00.898&#xA;Image repository for component component-two-ajrb in namespace build-e2e-xawj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component component-two-ajrb in namespace build-e2e-xawj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;&lt; Exit [It] creates second component - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:140 @ 05/06/26 07:04:21.284 (20.386s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:25 @ 05/06/26 07:04:21.284&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:25 @ 05/06/26 07:04:21.284 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check first component annotation has errors [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="0.171577166">
              <system-err>&gt; Enter [It] check first component annotation has errors - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:158 @ 05/06/26 07:04:21.285&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;error&#34;,&#34;error-id&#34;:74,&#34;error-message&#34;:&#34;74: Access token is unrecognizable by GitHub&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;&lt; Exit [It] check first component annotation has errors - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:158 @ 05/06/26 07:04:21.456 (171ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:25 @ 05/06/26 07:04:21.456&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:25 @ 05/06/26 07:04:21.456 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created triggered PipelineRun is for component  [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="20.228491294">
              <system-err>&gt; Enter [It] triggered PipelineRun is for component  - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:178 @ 05/06/26 07:04:21.457&#xA;PipelineRun has not been created yet for the component build-e2e-xawj/component-two-ajrb&#xA;&lt; Exit [It] triggered PipelineRun is for component  - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:178 @ 05/06/26 07:04:41.685 (20.228s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:25 @ 05/06/26 07:04:41.685&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:25 @ 05/06/26 07:04:41.685 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check only one pipelinerun should be triggered [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="122.588622688">
              <system-err>&gt; Enter [It] check only one pipelinerun should be triggered - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:193 @ 05/06/26 07:04:41.686&#xA;&lt; Exit [It] check only one pipelinerun should be triggered - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:193 @ 05/06/26 07:06:41.687 (2m0.001s)&#xA;&gt; Enter [AfterAll] test build secret lookup - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:61 @ 05/06/26 07:06:41.687&#xA;&lt; Exit [AfterAll] test build secret lookup - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:61 @ 05/06/26 07:06:44.274 (2.587s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:25 @ 05/06/26 07:06:44.274&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/secret_lookup.go:25 @ 05/06/26 07:06:44.274 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created when second component is deleted, pac pr branch should not exist in the repo [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that Release PipelineRun should eventually succeed [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification tests if the image was pushed to quay [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that a Release is marked as succeeded. [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="failed" time="426.088769329">
              <failure message="Failed to fork repository for fj&#xA;Unexpected error:&#xA;    &lt;*fmt.wrapError | 0xc00195c140&gt;: &#xA;    error migrating project konflux-qe/devfile-sample-hello-world to konflux-qe/devfile-sample-hello-world-qqbwyj (last error: ): context deadline exceeded&#xA;    {&#xA;        msg: &#34;error migrating project konflux-qe/devfile-sample-hello-world to konflux-qe/devfile-sample-hello-world-qqbwyj (last error: ): context deadline exceeded&#34;,&#xA;        err: &lt;context.deadlineExceededError&gt;{},&#xA;    }&#xA;occurred" type="failed">[FAILED] Failed to fork repository for fj&#xA;Unexpected error:&#xA;    &lt;*fmt.wrapError | 0xc00195c140&gt;: &#xA;    error migrating project konflux-qe/devfile-sample-hello-world to konflux-qe/devfile-sample-hello-world-qqbwyj (last error: ): context deadline exceeded&#xA;    {&#xA;        msg: &#34;error migrating project konflux-qe/devfile-sample-hello-world to konflux-qe/devfile-sample-hello-world-qqbwyj (last error: ): context deadline exceeded&#34;,&#xA;        err: &lt;context.deadlineExceededError&gt;{},&#xA;    }&#xA;occurred&#xA;In [BeforeAll] at: /tmp/tmp.x1MqQ7KQDy/tests/build/git_provider_config.go:329 @ 05/06/26 07:09:11.905&#xA;</failure>
              <system-err>&gt; Enter [BeforeAll] PaC component build - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:54 @ 05/06/26 07:02:05.962&#xA;[FAILED] Failed to fork repository for fj&#xA;Unexpected error:&#xA;    &lt;*fmt.wrapError | 0xc00195c140&gt;: &#xA;    error migrating project konflux-qe/devfile-sample-hello-world to konflux-qe/devfile-sample-hello-world-qqbwyj (last error: ): context deadline exceeded&#xA;    {&#xA;        msg: &#34;error migrating project konflux-qe/devfile-sample-hello-world to konflux-qe/devfile-sample-hello-world-qqbwyj (last error: ): context deadline exceeded&#34;,&#xA;        err: &lt;context.deadlineExceededError&gt;{},&#xA;    }&#xA;occurred&#xA;In [BeforeAll] at: /tmp/tmp.x1MqQ7KQDy/tests/build/git_provider_config.go:329 @ 05/06/26 07:09:11.905&#xA;&lt; Exit [BeforeAll] PaC component build - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:54 @ 05/06/26 07:09:11.905 (7m5.942s)&#xA;&gt; Enter [AfterAll] PaC component build - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:101 @ 05/06/26 07:09:11.905&#xA;&lt; Exit [AfterAll] PaC component build - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:101 @ 05/06/26 07:09:11.905 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:09:11.905&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:09:12.051 (146ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:153 @ 05/06/26 07:09:12.052&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:176 @ 05/06/26 07:09:12.052&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:191 @ 05/06/26 07:09:12.052&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:195 @ 05/06/26 07:09:12.053&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:225 @ 05/06/26 07:09:12.053&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:243 @ 05/06/26 07:09:12.053&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:249 @ 05/06/26 07:09:12.053&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:265 @ 05/06/26 07:09:12.053&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:278 @ 05/06/26 07:09:12.053&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:332 @ 05/06/26 07:09:12.054&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:347 @ 05/06/26 07:09:12.054&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:365 @ 05/06/26 07:09:12.054&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:371 @ 05/06/26 07:09:12.054&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:390 @ 05/06/26 07:09:12.055&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:396 @ 05/06/26 07:09:12.055&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:425 @ 05/06/26 07:09:12.055&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:439 @ 05/06/26 07:09:12.055&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:464 @ 05/06/26 07:09:12.055&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:479 @ 05/06/26 07:09:12.056&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:498 @ 05/06/26 07:09:12.056&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:504 @ 05/06/26 07:09:12.056&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:530 @ 05/06/26 07:09:12.056&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:546 @ 05/06/26 07:09:12.057&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:552 @ 05/06/26 07:09:12.057&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:564 @ 05/06/26 07:09:12.057&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:595 @ 05/06/26 07:09:12.057&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:661 @ 05/06/26 07:09:12.058&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:679 @ 05/06/26 07:09:12.058&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies if release CR is created [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies the release pipelinerun is running and succeeds [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies if the Release exists in github repo [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="failed" time="496.275829962">
              <failure message="Unexpected error:&#xA;    &lt;*fmt.wrapError | 0xc00144e080&gt;: &#xA;    error migrating project konflux-qe/build-nudge-parent to konflux-qe/build-nudge-parent-tufopa (last error: ): context deadline exceeded&#xA;    {&#xA;        msg: &#34;error migrating project konflux-qe/build-nudge-parent to konflux-qe/build-nudge-parent-tufopa (last error: ): context deadline exceeded&#34;,&#xA;        err: &lt;context.deadlineExceededError&gt;{},&#xA;    }&#xA;occurred" type="failed">[FAILED] Unexpected error:&#xA;    &lt;*fmt.wrapError | 0xc00144e080&gt;: &#xA;    error migrating project konflux-qe/build-nudge-parent to konflux-qe/build-nudge-parent-tufopa (last error: ): context deadline exceeded&#xA;    {&#xA;        msg: &#34;error migrating project konflux-qe/build-nudge-parent to konflux-qe/build-nudge-parent-tufopa (last error: ): context deadline exceeded&#34;,&#xA;        err: &lt;context.deadlineExceededError&gt;{},&#xA;    }&#xA;occurred&#xA;In [BeforeAll] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:131 @ 05/06/26 07:08:21.891&#xA;&#xA;There were additional failures detected after the initial failure. These are visible in the timeline&#xA;</failure>
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:72 @ 05/06/26 07:02:05.763&#xA;[FAILED] Unexpected error:&#xA;    &lt;*fmt.wrapError | 0xc00144e080&gt;: &#xA;    error migrating project konflux-qe/build-nudge-parent to konflux-qe/build-nudge-parent-tufopa (last error: ): context deadline exceeded&#xA;    {&#xA;        msg: &#34;error migrating project konflux-qe/build-nudge-parent to konflux-qe/build-nudge-parent-tufopa (last error: ): context deadline exceeded&#34;,&#xA;        err: &lt;context.deadlineExceededError&gt;{},&#xA;    }&#xA;occurred&#xA;In [BeforeAll] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:131 @ 05/06/26 07:08:21.891&#xA;&lt; Exit [BeforeAll] component update with renovate - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:72 @ 05/06/26 07:08:21.891 (6m16.128s)&#xA;&gt; Enter [AfterAll] component update with renovate - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:214 @ 05/06/26 07:08:21.891&#xA;[FAILED] Timed out after 120.000s.&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc001656330&gt;: &#xA;    could not check for namespace &#39;&#39; existence: resource name may not be empty&#xA;    {&#xA;        s: &#34;could not check for namespace &#39;&#39; existence: resource name may not be empty&#34;,&#xA;    }&#xA;In [AfterAll] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:230 @ 05/06/26 07:10:21.892&#xA;&lt; Exit [AfterAll] component update with renovate - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:214 @ 05/06/26 07:10:21.892 (2m0.001s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:10:21.892&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:10:22.039 (146ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:259 @ 05/06/26 07:10:22.039&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:274 @ 05/06/26 07:10:22.04&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:285 @ 05/06/26 07:10:22.04&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:289 @ 05/06/26 07:10:22.04&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:307 @ 05/06/26 07:10:22.04&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:318 @ 05/06/26 07:10:22.041&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:358 @ 05/06/26 07:10:22.041&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:375 @ 05/06/26 07:10:22.041&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:385 @ 05/06/26 07:10:22.041&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:401 @ 05/06/26 07:10:22.041&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:412 @ 05/06/26 07:10:22.042&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:429 @ 05/06/26 07:10:22.042&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:440 @ 05/06/26 07:10:22.042&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created does not contain an annotation with a Snapshot Name [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="76.102993081">
              <system-err>&gt; Enter [BeforeAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:45 @ 05/06/26 07:02:05.762&#xA;Image repository for component test-component-pac-gekbpm in namespace stat-rep-hwqy do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Build PipelineRun has not been created yet for the component stat-rep-hwqy/test-component-pac-gekbpm&#xA;Build PipelineRun has not been created yet for the component stat-rep-hwqy/test-component-pac-gekbpm&#xA;&lt; Exit [BeforeAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:45 @ 05/06/26 07:03:21.865 (1m16.102s)&#xA;&gt; Enter [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:111 @ 05/06/26 07:03:21.865&#xA;&lt; Exit [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:111 @ 05/06/26 07:03:21.865 (0s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 05/06/26 07:03:21.865&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 05/06/26 07:03:21.865 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created should have a related PaC init PR created [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.311952671">
              <system-err>&gt; Enter [It] should have a related PaC init PR created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:115 @ 05/06/26 07:03:21.866&#xA;&lt; Exit [It] should have a related PaC init PR created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:115 @ 05/06/26 07:03:22.177 (312ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 05/06/26 07:03:22.178&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 05/06/26 07:03:22.178 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created initialized integration test status is reported to github [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.400280329">
              <system-err>&gt; Enter [It] initialized integration test status is reported to github - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:134 @ 05/06/26 07:03:22.178&#xA;&lt; Exit [It] initialized integration test status is reported to github - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:134 @ 05/06/26 07:03:22.578 (400ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 05/06/26 07:03:22.578&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 05/06/26 07:03:22.578 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created should lead to build PipelineRun finishing successfully [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="failed" time="561.219882057">
              <failure message="build pipelinerun fails for NameSpace/Application/Component stat-rep-hwqy/integ-app-host/test-component-pac-gekbpm with logs: Pipelinerun &#39;test-component-pac-gekbpm-on-pull-request-k5k86&#39; didn&#39;t succeed&#xA;&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0012bfcc0&gt;: &#xA;    Pipelinerun &#39;test-component-pac-gekbpm-on-pull-request-k5k86&#39; didn&#39;t succeed&#xA;    &#xA;    {&#xA;        s: &#34;Pipelinerun &#39;test-component-pac-gekbpm-on-pull-request-k5k86&#39; didn&#39;t succeed\n&#34;,&#xA;    }" type="failed">[FAILED] build pipelinerun fails for NameSpace/Application/Component stat-rep-hwqy/integ-app-host/test-component-pac-gekbpm with logs: Pipelinerun &#39;test-component-pac-gekbpm-on-pull-request-k5k86&#39; didn&#39;t succeed&#xA;&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0012bfcc0&gt;: &#xA;    Pipelinerun &#39;test-component-pac-gekbpm-on-pull-request-k5k86&#39; didn&#39;t succeed&#xA;    &#xA;    {&#xA;        s: &#34;Pipelinerun &#39;test-component-pac-gekbpm-on-pull-request-k5k86&#39; didn&#39;t succeed\n&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:146 @ 05/06/26 07:12:42.741&#xA;</failure>
              <system-err>&gt; Enter [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:144 @ 05/06/26 07:03:22.579&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: ResolvingTaskRef&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Running&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: PipelineRunStopping&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: PipelineRunStopping&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: PipelineRunStopping&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: PipelineRunStopping&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: PipelineRunStopping&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: PipelineRunStopping&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: PipelineRunStopping&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: PipelineRunStopping&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: PipelineRunStopping&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: PipelineRunStopping&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: PipelineRunStopping&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: PipelineRunStopping&#xA;PipelineRun test-component-pac-gekbpm-on-pull-request-k5k86 reason: Failed&#xA;[FAILED] build pipelinerun fails for NameSpace/Application/Component stat-rep-hwqy/integ-app-host/test-component-pac-gekbpm with logs: Pipelinerun &#39;test-component-pac-gekbpm-on-pull-request-k5k86&#39; didn&#39;t succeed&#xA;&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0012bfcc0&gt;: &#xA;    Pipelinerun &#39;test-component-pac-gekbpm-on-pull-request-k5k86&#39; didn&#39;t succeed&#xA;    &#xA;    {&#xA;        s: &#34;Pipelinerun &#39;test-component-pac-gekbpm-on-pull-request-k5k86&#39; didn&#39;t succeed\n&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:146 @ 05/06/26 07:12:42.741&#xA;&lt; Exit [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:144 @ 05/06/26 07:12:42.741 (9m20.163s)&#xA;&gt; Enter [AfterAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:94 @ 05/06/26 07:12:42.742&#xA;&lt; Exit [AfterAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:94 @ 05/06/26 07:12:43.557 (816ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 05/06/26 07:12:43.557&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 05/06/26 07:12:43.799 (241ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:151 @ 05/06/26 07:12:43.799&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the Snapshot is created [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:155 @ 05/06/26 07:12:43.8&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:160 @ 05/06/26 07:12:43.8&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the Snapshot was created should find both the related Integration PipelineRuns [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:166 @ 05/06/26 07:12:43.8&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns are created should eventually complete successfully [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:190 @ 05/06/26 07:12:43.8&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully should lead to Snapshot CR being marked as failed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:199 @ 05/06/26 07:12:43.8&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the successful Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:213 @ 05/06/26 07:12:43.801&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the failed Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:217 @ 05/06/26 07:12:43.801&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the optional Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:221 @ 05/06/26 07:12:43.801&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the warning Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:225 @ 05/06/26 07:12:43.801&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the optional Integration Test Scenario status is reported in the Snapshot [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:229 @ 05/06/26 07:12:43.802&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the finalizer was removed from the optional Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:244 @ 05/06/26 07:12:43.802&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the warning Integration Test Scenario status is reported in the Snapshot [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:248 @ 05/06/26 07:12:43.802&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the finalizer was removed from the warning Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:263 @ 05/06/26 07:12:43.802&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully merging the PR, expected to succeed  [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:267 @ 05/06/26 07:12:43.802&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully leads to triggering a push PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:276 @ 05/06/26 07:12:43.803&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully verifies that Push PipelineRuns completed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:291 @ 05/06/26 07:12:43.803&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully validates the Integration test scenario PipelineRun is reported to merge request CheckRuns, and it pass [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:297 @ 05/06/26 07:12:43.803&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the failed Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:302 @ 05/06/26 07:12:43.803&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when The git-provider annotation is missing should set the git-reporting-failure annotation correctly [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:308 @ 05/06/26 07:12:43.803&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when build pipelinerun fails build pipelinerun is created but fails [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:355 @ 05/06/26 07:12:43.804&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when build pipelinerun fails build pipelinerun failure is reported to integration test checkRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/integration-service/status-reporting-to-pullrequest.go:400 @ 05/06/26 07:12:43.804&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] infrastructure is running verifies if the chains controller is running [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="34.113971042">
              <system-err>&gt; Enter [BeforeAll] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:31 @ 05/06/26 07:02:05.565&#xA;&lt; Exit [BeforeAll] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:31 @ 05/06/26 07:02:39.565 (34s)&#xA;&gt; Enter [It] verifies if the chains controller is running - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:43 @ 05/06/26 07:02:39.565&#xA;&lt; Exit [It] verifies if the chains controller is running - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:43 @ 05/06/26 07:02:39.677 (112ms)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:02:39.677&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:02:39.678 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] infrastructure is running verifies the signing secret is present [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="0.012431336">
              <system-err>&gt; Enter [It] verifies the signing secret is present - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:48 @ 05/06/26 07:02:39.678&#xA;&lt; Exit [It] verifies the signing secret is present - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:48 @ 05/06/26 07:02:39.69 (12ms)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:02:39.69&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:02:39.69 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task creates signature and attestation [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="294.95819377">
              <system-err>&gt; Enter [BeforeAll] test creating and signing an image and task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:73 @ 05/06/26 07:02:39.691&#xA;Creating Pipeline &#34;buildah-demo-ohfkxyrwwd&#34;&#xA;Waiting for pipeline &#34;buildah-demo-ohfkxyrwwd&#34; to finish&#xA;The pipeline named &#34;buildah-demo-ohfkxyrwwd&#34; in namespace &#34;chains-e2e-ioyw&#34; succeeded&#xA;The image signed by Tekton Chains is quay.io/redhat-appstudio-qe/test-images:buildah-demo-ohfkxyrwwd@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#xA;&lt; Exit [BeforeAll] test creating and signing an image and task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:73 @ 05/06/26 07:07:33.096 (4m53.405s)&#xA;&gt; Enter [It] creates signature and attestation - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:115 @ 05/06/26 07:07:33.096&#xA;failed to get cosign result for image quay.io/redhat-appstudio-qe/test-images:buildah-demo-ohfkxyrwwd@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9: failed to find cosign results for image quay.io/redhat-appstudio-qe/test-images:buildah-demo-ohfkxyrwwd@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9: error when getting attestation tag: cannot get manifest digest from quay.io/redhat-appstudio-qe/test-images:sha256-c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9.att image. response body: {&#34;tags&#34;: [], &#34;page&#34;: 1, &#34;has_additional&#34;: false}&#xA;&#xA;&#xA;Cosign verify pass with .att and .sig ImageStreamTags found for quay.io/redhat-appstudio-qe/test-images:buildah-demo-ohfkxyrwwd@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#xA;&lt; Exit [It] creates signature and attestation - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:115 @ 05/06/26 07:07:34.649 (1.552s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:07:34.649&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:07:34.649 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task succeeds when policy is met [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="243.275572887">
              <system-err>&gt; Enter [BeforeAll] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:133 @ 05/06/26 07:07:34.65&#xA;Copy public key from openshift-pipelines/signing-secrets to a new secret&#xA;Configured Rekor host: https://rekor.sigstore.dev&#xA;Using verify EC task bundle: quay.io/conforma/tekton-task:kf-b345847182602d9a5ce9e957fa76fe02575c8018@sha256:7df8d121c09999d0376e189c1eb8a8263078aab697aa5ee966512f581427a6ce&#xA;&lt; Exit [BeforeAll] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:133 @ 05/06/26 07:07:34.694 (45ms)&#xA;&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:07:34.694&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:07:34.715 (21ms)&#xA;&gt; Enter [It] succeeds when policy is met - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:177 @ 05/06/26 07:07:34.716&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-hkslt&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-hkslt&#34; to finish&#xA;*** TaskRun status:&#xA;artifacts: {}&#xA;completionTime: &#34;2026-05-06T07:11:36Z&#34;&#xA;conditions:&#xA;- lastTransitionTime: &#34;2026-05-06T07:11:36Z&#34;&#xA;  message: All Steps have completed executing&#xA;  reason: Succeeded&#xA;  status: &#34;True&#34;&#xA;  type: Succeeded&#xA;podName: verify-enterprise-contract-eec15bf6ae576b907ec1f6e893d3c7ea-pod&#xA;provenance:&#xA;  featureFlags:&#xA;    awaitSidecarReadiness: true&#xA;    coschedule: workspaces&#xA;    enableAPIFields: alpha&#xA;    enableParamEnum: true&#xA;    enableProvenanceInStatus: true&#xA;    enforceNonfalsifiability: none&#xA;    maxResultSize: 4096&#xA;    resultExtractionMethod: termination-message&#xA;    runningInEnvWithInjectedSidecars: true&#xA;    verificationNoMatchPolicy: ignore&#xA;  refSource:&#xA;    digest:&#xA;      sha256: 7df8d121c09999d0376e189c1eb8a8263078aab697aa5ee966512f581427a6ce&#xA;    entryPoint: verify-enterprise-contract&#xA;    uri: quay.io/conforma/tekton-task&#xA;results:&#xA;- name: TEST_OUTPUT&#xA;  type: string&#xA;  value: |&#xA;    {&#34;timestamp&#34;:&#34;1778051495&#34;,&#34;namespace&#34;:&#34;&#34;,&#34;successes&#34;:5,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;}&#xA;spanContext:&#xA;  traceparent: 00-ecfa629d3c4173f43a64b6fa4f668dd1-8130184e7b2f4d96-01&#xA;startTime: &#34;2026-05-06T07:07:35Z&#34;&#xA;steps:&#xA;- container: step-initialize-tuf&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: initialize-tuf&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://72473723f715446ab37015d2c12493081034293bbee7ccd1f028d9f995a4dae3&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:29Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:29Z&#34;&#xA;  terminationReason: Skipped&#xA;- container: step-reduce&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: reduce&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://4ab49572d1288d164cc1be737cbedc78c663f0d1a91737473a2d65de19608a0f&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:29Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:29Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-validate&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: validate&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://08577362ff9f0d4bc8533b3503f9e44d4ae4bac35ef512098222936042431c1c&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:35Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051495\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:29Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-report-json&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: report-json&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://5025f38e310bd99fcb12f247ad91b8da370e82b26fa695371a56086318a3b413&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:35Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051495\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:35Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-summary&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: summary&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://87f5ee81259326e5d271e82f646d311c105b59730c8b06e2e1424813d8af8665&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:35Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051495\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:35Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-version&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: version&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://fa8af80bf4ae4b7d0f3b9fde20910a543756dfc2dac2b397eca08b3665cdf141&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:35Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051495\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:35Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-show-config&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: show-config&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://d1b92c32a9d7bf4dd9604dcb0eafa8343651d96f69a3fc38499fa73e8888aac7&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:35Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051495\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:35Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-detailed-report&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: detailed-report&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://26ddf791bd8d1a5530cd691a298ed6874a12395b92fcf2f5f06686bea68986fe&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:35Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051495\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:35Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-assert&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: assert&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://b7f868354be477aa85e68e39da856de20a1871386fd44bc79818daa3f47d0745&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:35Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051495\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:35Z&#34;&#xA;  terminationReason: Completed&#xA;taskSpec:&#xA;  description: Verify the enterprise contract is met&#xA;  params:&#xA;  - description: |&#xA;      Spec section of an ApplicationSnapshot resource. Not all fields of the&#xA;      resource are required. A minimal example:&#xA;&#xA;      ```json&#xA;        {&#xA;          &#34;components&#34;: [&#xA;            {&#xA;              &#34;containerImage&#34;: &#34;quay.io/example/repo:latest&#34;&#xA;            }&#xA;          ]&#xA;        }&#xA;      ```&#xA;&#xA;      Each `containerImage` in the `components` array is validated.&#xA;    name: IMAGES&#xA;    type: string&#xA;  - default: enterprise-contract-service/default&#xA;    description: |&#xA;      Name of the policy configuration (EnterpriseContractPolicy&#xA;      resource) to use. `namespace/name` or `name` syntax supported. If&#xA;      namespace is omitted the namespace where the task runs is used.&#xA;      You can also specify a policy configuration using a git url, e.g.&#xA;      `github.com/conforma/config//slsa3`.&#xA;    name: POLICY_CONFIGURATION&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Public key used to verify traditional long-lived signatures. Must&#xA;      be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret&#xA;      contains the expected cosign.pub attribute. Required for traditional signing&#xA;      key verification. Will be ignored if any of CERTIFICATE_IDENTITY, CERTIFICATE_IDENTITY_REGEXP,&#xA;      CERTIFICATE_OIDC_ISSUER, or CERTIFICATE_OIDC_ISSUER_REGEXP are provided.&#xA;    name: PUBLIC_KEY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Rekor host for transparency log lookups&#xA;    name: REKOR_HOST&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected identity in the signing certificate for keyless verification.&#xA;      This should be the email or URI that was used when signing. You should provide&#xA;      both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification.&#xA;      The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_IDENTITY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected OIDC issuer in the signing certificate for keyless verification.&#xA;      This should match the issuer that provided the identity token used for signing.&#xA;      You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for&#xA;      keyless verification. The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_OIDC_ISSUER&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_IDENTITY but the value is a regexp that will&#xA;      be matched. Note that CERTIFICATE_IDENTITY takes precedence over this if both&#xA;      are present.&#xA;    name: CERTIFICATE_IDENTITY_REGEXP&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_OIDC_ISSUER but a regexp that will be matched.&#xA;      Note that CERTIFICATE_OIDC_ISSUER takes precedence over this if both are present.&#xA;    name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Skip Rekor transparency log checks during validation. Compatible&#xA;      with traditional signing secret signature checks only. If any of the CERTIFICATE_*&#xA;      keyless verification params are present, this value is disregarded and Rekor&#xA;      transparency log checks are included.&#xA;    name: IGNORE_REKOR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: TUF mirror URL. Provide a value when NOT using public sigstore deployment.&#xA;    name: TUF_MIRROR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Path to a directory containing SSL certs to be used when communicating&#xA;      with external services. This is useful when using the integrated registry&#xA;      and a local instance of Rekor on a development cluster which may use&#xA;      certificates issued by a not-commonly trusted root CA. In such cases,&#xA;      `/var/run/secrets/kubernetes.io/serviceaccount` is a good value. Multiple&#xA;      paths can be provided by using the `:` separator.&#xA;    name: SSL_CERT_DIR&#xA;    type: string&#xA;  - default: trusted-ca&#xA;    description: The name of the ConfigMap to read CA bundle data from.&#xA;    name: CA_TRUST_CONFIGMAP_NAME&#xA;    type: string&#xA;  - default: ca-bundle.crt&#xA;    description: The name of the key in the ConfigMap that contains the CA bundle&#xA;      data.&#xA;    name: CA_TRUST_CONFIG_MAP_KEY&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Include rule titles and descriptions in the output. Set to `&#34;false&#34;`&#xA;      to disable it.&#xA;    name: INFO&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Fail the task if policy fails. Set to `&#34;false&#34;` to disable it.&#xA;    name: STRICT&#xA;    type: string&#xA;  - default: /tekton/home&#xA;    description: Value for the HOME environment variable.&#xA;    name: HOMEDIR&#xA;    type: string&#xA;  - default: now&#xA;    description: Run policy checks with the provided time.&#xA;    name: EFFECTIVE_TIME&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Merge additional Rego variables into the policy data. Use syntax&#xA;      &#34;key=value,key2=value2...&#34;&#xA;    name: EXTRA_RULE_DATA&#xA;    type: string&#xA;  - default: &#34;1&#34;&#xA;    description: Number of parallel workers to use for policy evaluation.&#xA;    name: WORKERS&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Reduce the Snapshot to only the component whose build caused the&#xA;      Snapshot to be created&#xA;    name: SINGLE_COMPONENT&#xA;    type: string&#xA;  - default: unknown&#xA;    description: |&#xA;      Name, including kind, of the Kubernetes resource to query for labels when single component mode is enabled, e.g. pr/somepipeline.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Kubernetes namespace where the SINGLE_COMPONENT_NAME is found. Only used when single component mode is enabled.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE_NS&#xA;    type: string&#xA;  - default: 1s&#xA;    description: Base duration for exponential backoff calculation (e.g., &#34;1s&#34;, &#34;500ms&#34;)&#xA;    name: RETRY_DURATION&#xA;    type: string&#xA;  - default: &#34;2.0&#34;&#xA;    description: Exponential backoff multiplier (e.g., &#34;2.0&#34;, &#34;1.5&#34;)&#xA;    name: RETRY_FACTOR&#xA;    type: string&#xA;  - default: &#34;0.1&#34;&#xA;    description: Randomness factor for backoff calculation (0.0-1.0, e.g., &#34;0.1&#34;,&#xA;      &#34;0.2&#34;)&#xA;    name: RETRY_JITTER&#xA;    type: string&#xA;  - default: &#34;3&#34;&#xA;    description: Maximum number of retry attempts&#xA;    name: RETRY_MAX_RETRY&#xA;    type: string&#xA;  - default: 3s&#xA;    description: Maximum wait time between retries (e.g., &#34;3s&#34;, &#34;10s&#34;)&#xA;    name: RETRY_MAX_WAIT&#xA;    type: string&#xA;  results:&#xA;  - description: Short summary of the policy evaluation for each image&#xA;    name: TEST_OUTPUT&#xA;    type: string&#xA;  stepTemplate:&#xA;    computeResources: {}&#xA;    env:&#xA;    - name: HOME&#xA;      value: /tekton/home&#xA;  steps:&#xA;  - args:&#xA;    - sigstore&#xA;    - initialize&#xA;    - --mirror&#xA;    - &#34;&#34;&#xA;    - --root&#xA;    - /root.json&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: initialize-tuf&#xA;    when:&#xA;    - operator: notin&#xA;      values:&#xA;      - &#34;&#34;&#xA;  - command:&#xA;    - reduce-snapshot.sh&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    env:&#xA;    - name: SNAPSHOT&#xA;      value: &#39;{&#34;components&#34;:[{&#34;name&#34;:&#34;&#34;,&#34;containerImage&#34;:&#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-ohfkxyrwwd@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#34;,&#34;source&#34;:{}}],&#34;artifacts&#34;:{}}&#39;&#xA;    - name: SINGLE_COMPONENT&#xA;      value: &#34;false&#34;&#xA;    - name: CUSTOM_RESOURCE&#xA;      value: unknown&#xA;    - name: CUSTOM_RESOURCE_NAMESPACE&#xA;    - name: SNAPSHOT_PATH&#xA;      value: /tekton/home/snapshot.json&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: reduce&#xA;    onError: continue&#xA;  - computeResources:&#xA;      limits:&#xA;        memory: 2Gi&#xA;      requests:&#xA;        cpu: 1800m&#xA;        memory: 2Gi&#xA;    env:&#xA;    - name: POLICY_CONFIGURATION&#xA;      value: ec-policy&#xA;    - name: PUBLIC_KEY&#xA;      value: k8s://chains-e2e-ioyw/cosign-public-key&#xA;    - name: CERTIFICATE_IDENTITY&#xA;    - name: CERTIFICATE_OIDC_ISSUER&#xA;    - name: CERTIFICATE_IDENTITY_REGEXP&#xA;    - name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    - name: REKOR_HOST&#xA;    - name: IGNORE_REKOR&#xA;      value: &#34;true&#34;&#xA;    - name: WORKERS&#xA;      value: &#34;1&#34;&#xA;    - name: INFO&#xA;      value: &#34;true&#34;&#xA;    - name: EFFECTIVE_TIME&#xA;      value: now&#xA;    - name: EXTRA_RULE_DATA&#xA;    - name: RETRY_MAX_WAIT&#xA;      value: 3s&#xA;    - name: RETRY_MAX_RETRY&#xA;      value: &#34;3&#34;&#xA;    - name: RETRY_DURATION&#xA;      value: 1s&#xA;    - name: RETRY_FACTOR&#xA;      value: &#34;2.0&#34;&#xA;    - name: RETRY_JITTER&#xA;      value: &#34;0.1&#34;&#xA;    - name: HOMEDIR&#xA;      value: /tekton/home&#xA;    - name: SSL_CERT_DIR&#xA;      value: /tekton-custom-certs:/etc/ssl/certs:/etc/pki/tls/certs:/system/etc/security/cacerts:/var/run/secrets/kubernetes.io/serviceaccount&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: validate&#xA;    onError: continue&#xA;    script: |&#xA;      #!/bin/bash&#xA;      set -euo pipefail&#xA;&#xA;      cmd_args=(&#xA;        validate&#xA;        image&#xA;        --images=&#34;${HOMEDIR}/snapshot.json&#34;&#xA;        --policy=&#34;${POLICY_CONFIGURATION}&#34;&#xA;      )&#xA;&#xA;      # To keep bash logic as thin as possible we deliberately don&#39;t sanitize&#xA;      # these params. If something is wrong or missing let Conforma handle it.&#xA;&#xA;      if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;        # If *any* of the above are non-empty assume the intention is to&#xA;        # try keyless verification&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity=&#34;${CERTIFICATE_IDENTITY}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity-regexp=&#34;${CERTIFICATE_IDENTITY_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer=&#34;${CERTIFICATE_OIDC_ISSUER}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer-regexp=&#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        # Force --ignore-rekor to false since we need rekor&#xA;        cmd_args+=(&#xA;          --ignore-rekor=false&#xA;        )&#xA;      else&#xA;        # Assume traditional signing secret verification&#xA;        cmd_args+=(&#xA;          --public-key=&#34;${PUBLIC_KEY}&#34;&#xA;          --ignore-rekor=&#34;${IGNORE_REKOR}&#34;&#xA;        )&#xA;      fi&#xA;&#xA;      cmd_args+=(&#xA;        --rekor-url=&#34;${REKOR_HOST}&#34;&#xA;        --workers=&#34;${WORKERS}&#34;&#xA;        --info=&#34;${INFO}&#34;&#xA;        --timeout=0&#xA;        --strict=false&#xA;        --show-successes=true&#xA;        --show-policy-docs-link=true&#xA;        --effective-time=&#34;${EFFECTIVE_TIME}&#34;&#xA;        --extra-rule-data=&#34;${EXTRA_RULE_DATA}&#34;&#xA;        --retry-max-wait=&#34;${RETRY_MAX_WAIT}&#34;&#xA;        --retry-max-retry=&#34;${RETRY_MAX_RETRY}&#34;&#xA;        --retry-duration=&#34;${RETRY_DURATION}&#34;&#xA;        --retry-factor=&#34;${RETRY_FACTOR}&#34;&#xA;        --retry-jitter=&#34;${RETRY_JITTER}&#34;&#xA;        --output=&#34;text=${HOMEDIR}/text-report.txt?show-successes=false&#34;&#xA;        --output=&#34;json=${HOMEDIR}/report-json.json&#34;&#xA;        --output=&#34;appstudio=/tekton/results/TEST_OUTPUT&#34;&#xA;      )&#xA;&#xA;&#xA;      # Execute Conforma with constructed arguments&#xA;      exec ec &#34;${cmd_args[@]}&#34;&#xA;    volumeMounts:&#xA;    - mountPath: /etc/pki/tls/certs/ca-custom-bundle.crt&#xA;      name: trusted-ca&#xA;      readOnly: true&#xA;      subPath: ca-bundle.crt&#xA;  - args:&#xA;    - jq . /tekton/home/report-json.json | awk &#39;{gsub(/^ +/, &#34;&#34;); acc += length; if&#xA;      (acc &gt;= 8000) { printf &#34;\n&#34;; acc=length } printf $0 }&#39;&#xA;    command:&#xA;    - sh&#xA;    - -c&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: report-json&#xA;    onError: continue&#xA;  - args:&#xA;    - .&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: summary&#xA;    onError: continue&#xA;  - args:&#xA;    - version&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: version&#xA;  - args:&#xA;    - &#39;{policy: .policy, key: .key, &#34;effective-time&#34;: .[&#34;effective-time&#34;]}&#39;&#xA;    - /tekton/home/report-json.json&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: show-config&#xA;  - args:&#xA;    - /tekton/home/text-report.txt&#xA;    command:&#xA;    - cat&#xA;    computeResources: {}&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: detailed-report&#xA;    onError: continue&#xA;  - args:&#xA;    - --argjson&#xA;    - strict&#xA;    - &#34;true&#34;&#xA;    - -e&#xA;    - |&#xA;      .result == &#34;SUCCESS&#34; or .result == &#34;WARNING&#34; or ($strict | not)&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: assert&#xA;  volumes:&#xA;  - configMap:&#xA;      items:&#xA;      - key: ca-bundle.crt&#xA;        path: ca-bundle.crt&#xA;      name: trusted-ca&#xA;      optional: true&#xA;    name: trusted-ca&#xA;  workspaces:&#xA;  - description: The workspace where the snapshot spec json file resides&#xA;    name: data&#xA;    optional: true&#xA;&#xA;*** Logs from pod &#39;verify-enterprise-contract-eec15bf6ae576b907ec1f6e893d3c7ea-pod&#39;, container &#39;step-initialize-tuf&#39;:&#xA;----- START -----2026/05/06 07:11:29 INFO Step was skipped due to when expressions were evaluated to false.&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eec15bf6ae576b907ec1f6e893d3c7ea-pod&#39;, container &#39;step-reduce&#39;:&#xA;----- START -----Single Component mode? false&#xA;{&#xA;  &#34;components&#34;: [&#xA;    {&#xA;      &#34;name&#34;: &#34;&#34;,&#xA;      &#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-ohfkxyrwwd@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#34;,&#xA;      &#34;source&#34;: {}&#xA;    }&#xA;  ],&#xA;  &#34;artifacts&#34;: {}&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eec15bf6ae576b907ec1f6e893d3c7ea-pod&#39;, container &#39;step-validate&#39;:&#xA;----- START ---------- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eec15bf6ae576b907ec1f6e893d3c7ea-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: true,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#34;,&#34;source&#34;: {},&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.allowed_predicate_types_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_predicate_types` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed predicate types provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.attestation_predicate_type_accepted&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicateType field of the attestation indicates the in-toto SLSA Provenance format was used to attest the PipelineRun.&#34;,&#34;title&#34;: &#34;Expected attestation predicate type found&#34;}}],&#34;success&#34;: true,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIHpThoeJopV8XLF2YuemXz4DR4hRN/vZvyQngkYPoXLYAiBqD0xaa9X1e/XtioW0Gl3/NnBA0fE9kcKeTwOGxzy6CA==&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEUCIQDDSONR8Lny6UO7VwgOfhw8F6WJmm2/oOttApzOEimBFwIgHQWWPKKliBt/1HskjjUPptgRBMtqrndFaesyAF09GqQ=&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIFS/iyOUt5n9cVhOzAWKMMkbvQYkrzkm0Z3doUhfTuTPAiAO3L5lGuZDGl68dhva0CT//ihJnixMt8+rZtJCwo03RQ==&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:fOgL1xsyIks4O0XWySo7iEds+F+o5nNbqZKqVlESoIw&#34;,&#34;sig&#34;: &#34;MEQCIB4iVUsI/n1MKSqcuXD2CH6Z0jU1QdGaEeiEQSAjIswkAiAkwsGaw24EvO78rvpJVMw0CC2wzE2qX87Q8tFYsD3GwQ==&#34;}]}]}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEF1KPrbmgPwizdb09V4Tx2cuolTkR\n7bvG0CNUnt8llVgeI3i8FwpJavDhEIhOOd+Ug62XZMEQJkhn0x9upJLjbw==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:59c6b95c02295edb7928ef187571d26d426993fd5aae0236a03c832afbd6072a&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=67018469815ee9f81e47cfb54dae39d71ed5f389&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:c7303e2d586614e47d7340ff8d7059c98c6c68fc8ca938b3448179fb8009372e&#34;,&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;include&#34;: [&#34;slsa_provenance_available&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-ioyw/cosign-public-key&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-06T07:11:29.770610109Z&#34;}----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eec15bf6ae576b907ec1f6e893d3c7ea-pod&#39;, container &#39;step-summary&#39;:&#xA;----- START -----{&#xA;  &#34;timestamp&#34;: &#34;1778051495&#34;,&#xA;  &#34;namespace&#34;: &#34;&#34;,&#xA;  &#34;successes&#34;: 5,&#xA;  &#34;failures&#34;: 0,&#xA;  &#34;warnings&#34;: 0,&#xA;  &#34;result&#34;: &#34;SUCCESS&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eec15bf6ae576b907ec1f6e893d3c7ea-pod&#39;, container &#39;step-version&#39;:&#xA;----- START -----Version            v0.9.25&#xA;Source ID          b345847182602d9a5ce9e957fa76fe02575c8018&#xA;Change date        2026-04-27 12:52:43 +0000 UTC (1 week ago)&#xA;ECC                v0.1.7&#xA;OPA                v1.15.2&#xA;Conftest           v0.68.2&#xA;Cosign             v3.0.4&#xA;Sigstore           v1.10.4&#xA;Rekor              v1.5.0&#xA;Tekton Pipeline    v1.9.2&#xA;Kubernetes Client  v0.35.0&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eec15bf6ae576b907ec1f6e893d3c7ea-pod&#39;, container &#39;step-show-config&#39;:&#xA;----- START -----{&#xA;  &#34;policy&#34;: {&#xA;    &#34;name&#34;: &#34;Default&#34;,&#xA;    &#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#xA;    &#34;sources&#34;: [&#xA;      {&#xA;        &#34;name&#34;: &#34;Default&#34;,&#xA;        &#34;policy&#34;: [&#xA;          &#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:59c6b95c02295edb7928ef187571d26d426993fd5aae0236a03c832afbd6072a&#34;&#xA;        ],&#xA;        &#34;data&#34;: [&#xA;          &#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=67018469815ee9f81e47cfb54dae39d71ed5f389&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:c7303e2d586614e47d7340ff8d7059c98c6c68fc8ca938b3448179fb8009372e&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;&#xA;        ],&#xA;        &#34;config&#34;: {&#xA;          &#34;include&#34;: [&#xA;            &#34;slsa_provenance_available&#34;&#xA;          ]&#xA;        }&#xA;      }&#xA;    ],&#xA;    &#34;publicKey&#34;: &#34;k8s://chains-e2e-ioyw/cosign-public-key&#34;&#xA;  },&#xA;  &#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEF1KPrbmgPwizdb09V4Tx2cuolTkR\n7bvG0CNUnt8llVgeI3i8FwpJavDhEIhOOd+Ug62XZMEQJkhn0x9upJLjbw==\n-----END PUBLIC KEY-----\n&#34;,&#xA;  &#34;effective-time&#34;: &#34;2026-05-06T07:11:29.770610109Z&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eec15bf6ae576b907ec1f6e893d3c7ea-pod&#39;, container &#39;step-detailed-report&#39;:&#xA;----- START -----Success: true&#xA;Result: SUCCESS&#xA;Violations: 0, Warnings: 0, Successes: 5&#xA;Component: &#xA;ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#xA;&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eec15bf6ae576b907ec1f6e893d3c7ea-pod&#39;, container &#39;step-assert&#39;:&#xA;----- START -----true&#xA;----- END -----&#xA;Make sure TaskRun verify-enterprise-contract of PipelineRun verify-enterprise-contract-run-hkslt succeeded&#xA;Make sure result for TaskRun &#34;verify-enterprise-contract&#34; succeeded&#xA;&lt; Exit [It] succeeds when policy is met - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:177 @ 05/06/26 07:11:37.925 (4m3.209s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:11:37.925&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:11:37.925 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task does not pass when tests are not satisfied on non-strict mode [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="14.207614245">
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:11:37.926&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:11:37.942 (17ms)&#xA;&gt; Enter [It] does not pass when tests are not satisfied on non-strict mode - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:197 @ 05/06/26 07:11:37.942&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-2djv6&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-2djv6&#34; to finish&#xA;*** TaskRun status:&#xA;artifacts: {}&#xA;completionTime: &#34;2026-05-06T07:11:51Z&#34;&#xA;conditions:&#xA;- lastTransitionTime: &#34;2026-05-06T07:11:51Z&#34;&#xA;  message: All Steps have completed executing&#xA;  reason: Succeeded&#xA;  status: &#34;True&#34;&#xA;  type: Succeeded&#xA;podName: verify-enterprise-contract-a853bf0901c38a3aed11dcef2c62eb63-pod&#xA;provenance:&#xA;  featureFlags:&#xA;    awaitSidecarReadiness: true&#xA;    coschedule: workspaces&#xA;    enableAPIFields: alpha&#xA;    enableParamEnum: true&#xA;    enableProvenanceInStatus: true&#xA;    enforceNonfalsifiability: none&#xA;    maxResultSize: 4096&#xA;    resultExtractionMethod: termination-message&#xA;    runningInEnvWithInjectedSidecars: true&#xA;    verificationNoMatchPolicy: ignore&#xA;  refSource:&#xA;    digest:&#xA;      sha256: 7df8d121c09999d0376e189c1eb8a8263078aab697aa5ee966512f581427a6ce&#xA;    entryPoint: verify-enterprise-contract&#xA;    uri: quay.io/conforma/tekton-task&#xA;results:&#xA;- name: TEST_OUTPUT&#xA;  type: string&#xA;  value: |&#xA;    {&#34;timestamp&#34;:&#34;1778051509&#34;,&#34;namespace&#34;:&#34;&#34;,&#34;successes&#34;:5,&#34;failures&#34;:1,&#34;warnings&#34;:0,&#34;result&#34;:&#34;FAILURE&#34;}&#xA;spanContext:&#xA;  traceparent: 00-17d1f796e88db3c3dd21b64b3bc429ba-97130d7e2860f144-01&#xA;startTime: &#34;2026-05-06T07:11:38Z&#34;&#xA;steps:&#xA;- container: step-initialize-tuf&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: initialize-tuf&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://f56f7f5c4c0e7d5090e4ebe00eb99fd77a95396c738a6db7c2ea23d21210b53f&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:44Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:44Z&#34;&#xA;  terminationReason: Skipped&#xA;- container: step-reduce&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: reduce&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://0df7dd9ee6e817696d44acf4d5fc1d8662a357f3e9e96d1e00e8f074b65035ce&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:44Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:44Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-validate&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: validate&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://2e1287edba1a071b5b11fc57289eb1dd9700defa0e17bb7e222d1062c31c9333&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:49Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051509\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:44Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-report-json&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: report-json&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://0f865841d5350ada10ed2c41af0778dd577034976ba353290f89d07b1e5f6dc8&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:50Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051509\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:50Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-summary&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: summary&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://15a8ceb293002856809cd8fecfc1608be0c7faedec1f506814ce795d9b4284f6&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:50Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051509\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:50Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-version&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: version&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://3a367f349d6355ba4793fb8a5f6d585d52ca2c9e82d8010ba6bd35e297824ea8&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:50Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051509\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:50Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-show-config&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: show-config&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://89364bc8d207f784df0bc361216b7e3ab48422529cf5260c74b08a05d113c66f&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:50Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051509\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:50Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-detailed-report&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: detailed-report&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://50d054445dc80c677ce125fa2c3084c35b6157d41363879907a1d761a8725c7f&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:50Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051509\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:50Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-assert&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: assert&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://9529576a62321d01c2aa430cb7fd1d9bda97bb73199259c069dd94c3ebc3c8ec&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:50Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051509\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:50Z&#34;&#xA;  terminationReason: Completed&#xA;taskSpec:&#xA;  description: Verify the enterprise contract is met&#xA;  params:&#xA;  - description: |&#xA;      Spec section of an ApplicationSnapshot resource. Not all fields of the&#xA;      resource are required. A minimal example:&#xA;&#xA;      ```json&#xA;        {&#xA;          &#34;components&#34;: [&#xA;            {&#xA;              &#34;containerImage&#34;: &#34;quay.io/example/repo:latest&#34;&#xA;            }&#xA;          ]&#xA;        }&#xA;      ```&#xA;&#xA;      Each `containerImage` in the `components` array is validated.&#xA;    name: IMAGES&#xA;    type: string&#xA;  - default: enterprise-contract-service/default&#xA;    description: |&#xA;      Name of the policy configuration (EnterpriseContractPolicy&#xA;      resource) to use. `namespace/name` or `name` syntax supported. If&#xA;      namespace is omitted the namespace where the task runs is used.&#xA;      You can also specify a policy configuration using a git url, e.g.&#xA;      `github.com/conforma/config//slsa3`.&#xA;    name: POLICY_CONFIGURATION&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Public key used to verify traditional long-lived signatures. Must&#xA;      be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret&#xA;      contains the expected cosign.pub attribute. Required for traditional signing&#xA;      key verification. Will be ignored if any of CERTIFICATE_IDENTITY, CERTIFICATE_IDENTITY_REGEXP,&#xA;      CERTIFICATE_OIDC_ISSUER, or CERTIFICATE_OIDC_ISSUER_REGEXP are provided.&#xA;    name: PUBLIC_KEY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Rekor host for transparency log lookups&#xA;    name: REKOR_HOST&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected identity in the signing certificate for keyless verification.&#xA;      This should be the email or URI that was used when signing. You should provide&#xA;      both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification.&#xA;      The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_IDENTITY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected OIDC issuer in the signing certificate for keyless verification.&#xA;      This should match the issuer that provided the identity token used for signing.&#xA;      You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for&#xA;      keyless verification. The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_OIDC_ISSUER&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_IDENTITY but the value is a regexp that will&#xA;      be matched. Note that CERTIFICATE_IDENTITY takes precedence over this if both&#xA;      are present.&#xA;    name: CERTIFICATE_IDENTITY_REGEXP&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_OIDC_ISSUER but a regexp that will be matched.&#xA;      Note that CERTIFICATE_OIDC_ISSUER takes precedence over this if both are present.&#xA;    name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Skip Rekor transparency log checks during validation. Compatible&#xA;      with traditional signing secret signature checks only. If any of the CERTIFICATE_*&#xA;      keyless verification params are present, this value is disregarded and Rekor&#xA;      transparency log checks are included.&#xA;    name: IGNORE_REKOR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: TUF mirror URL. Provide a value when NOT using public sigstore deployment.&#xA;    name: TUF_MIRROR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Path to a directory containing SSL certs to be used when communicating&#xA;      with external services. This is useful when using the integrated registry&#xA;      and a local instance of Rekor on a development cluster which may use&#xA;      certificates issued by a not-commonly trusted root CA. In such cases,&#xA;      `/var/run/secrets/kubernetes.io/serviceaccount` is a good value. Multiple&#xA;      paths can be provided by using the `:` separator.&#xA;    name: SSL_CERT_DIR&#xA;    type: string&#xA;  - default: trusted-ca&#xA;    description: The name of the ConfigMap to read CA bundle data from.&#xA;    name: CA_TRUST_CONFIGMAP_NAME&#xA;    type: string&#xA;  - default: ca-bundle.crt&#xA;    description: The name of the key in the ConfigMap that contains the CA bundle&#xA;      data.&#xA;    name: CA_TRUST_CONFIG_MAP_KEY&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Include rule titles and descriptions in the output. Set to `&#34;false&#34;`&#xA;      to disable it.&#xA;    name: INFO&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Fail the task if policy fails. Set to `&#34;false&#34;` to disable it.&#xA;    name: STRICT&#xA;    type: string&#xA;  - default: /tekton/home&#xA;    description: Value for the HOME environment variable.&#xA;    name: HOMEDIR&#xA;    type: string&#xA;  - default: now&#xA;    description: Run policy checks with the provided time.&#xA;    name: EFFECTIVE_TIME&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Merge additional Rego variables into the policy data. Use syntax&#xA;      &#34;key=value,key2=value2...&#34;&#xA;    name: EXTRA_RULE_DATA&#xA;    type: string&#xA;  - default: &#34;1&#34;&#xA;    description: Number of parallel workers to use for policy evaluation.&#xA;    name: WORKERS&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Reduce the Snapshot to only the component whose build caused the&#xA;      Snapshot to be created&#xA;    name: SINGLE_COMPONENT&#xA;    type: string&#xA;  - default: unknown&#xA;    description: |&#xA;      Name, including kind, of the Kubernetes resource to query for labels when single component mode is enabled, e.g. pr/somepipeline.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Kubernetes namespace where the SINGLE_COMPONENT_NAME is found. Only used when single component mode is enabled.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE_NS&#xA;    type: string&#xA;  - default: 1s&#xA;    description: Base duration for exponential backoff calculation (e.g., &#34;1s&#34;, &#34;500ms&#34;)&#xA;    name: RETRY_DURATION&#xA;    type: string&#xA;  - default: &#34;2.0&#34;&#xA;    description: Exponential backoff multiplier (e.g., &#34;2.0&#34;, &#34;1.5&#34;)&#xA;    name: RETRY_FACTOR&#xA;    type: string&#xA;  - default: &#34;0.1&#34;&#xA;    description: Randomness factor for backoff calculation (0.0-1.0, e.g., &#34;0.1&#34;,&#xA;      &#34;0.2&#34;)&#xA;    name: RETRY_JITTER&#xA;    type: string&#xA;  - default: &#34;3&#34;&#xA;    description: Maximum number of retry attempts&#xA;    name: RETRY_MAX_RETRY&#xA;    type: string&#xA;  - default: 3s&#xA;    description: Maximum wait time between retries (e.g., &#34;3s&#34;, &#34;10s&#34;)&#xA;    name: RETRY_MAX_WAIT&#xA;    type: string&#xA;  results:&#xA;  - description: Short summary of the policy evaluation for each image&#xA;    name: TEST_OUTPUT&#xA;    type: string&#xA;  stepTemplate:&#xA;    computeResources: {}&#xA;    env:&#xA;    - name: HOME&#xA;      value: /tekton/home&#xA;  steps:&#xA;  - args:&#xA;    - sigstore&#xA;    - initialize&#xA;    - --mirror&#xA;    - &#34;&#34;&#xA;    - --root&#xA;    - /root.json&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: initialize-tuf&#xA;    when:&#xA;    - operator: notin&#xA;      values:&#xA;      - &#34;&#34;&#xA;  - command:&#xA;    - reduce-snapshot.sh&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    env:&#xA;    - name: SNAPSHOT&#xA;      value: &#39;{&#34;components&#34;:[{&#34;name&#34;:&#34;&#34;,&#34;containerImage&#34;:&#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-ohfkxyrwwd@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#34;,&#34;source&#34;:{}}],&#34;artifacts&#34;:{}}&#39;&#xA;    - name: SINGLE_COMPONENT&#xA;      value: &#34;false&#34;&#xA;    - name: CUSTOM_RESOURCE&#xA;      value: unknown&#xA;    - name: CUSTOM_RESOURCE_NAMESPACE&#xA;    - name: SNAPSHOT_PATH&#xA;      value: /tekton/home/snapshot.json&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: reduce&#xA;    onError: continue&#xA;  - computeResources:&#xA;      limits:&#xA;        memory: 2Gi&#xA;      requests:&#xA;        cpu: 1800m&#xA;        memory: 2Gi&#xA;    env:&#xA;    - name: POLICY_CONFIGURATION&#xA;      value: ec-policy&#xA;    - name: PUBLIC_KEY&#xA;      value: k8s://chains-e2e-ioyw/cosign-public-key&#xA;    - name: CERTIFICATE_IDENTITY&#xA;    - name: CERTIFICATE_OIDC_ISSUER&#xA;    - name: CERTIFICATE_IDENTITY_REGEXP&#xA;    - name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    - name: REKOR_HOST&#xA;    - name: IGNORE_REKOR&#xA;      value: &#34;true&#34;&#xA;    - name: WORKERS&#xA;      value: &#34;1&#34;&#xA;    - name: INFO&#xA;      value: &#34;true&#34;&#xA;    - name: EFFECTIVE_TIME&#xA;      value: now&#xA;    - name: EXTRA_RULE_DATA&#xA;    - name: RETRY_MAX_WAIT&#xA;      value: 3s&#xA;    - name: RETRY_MAX_RETRY&#xA;      value: &#34;3&#34;&#xA;    - name: RETRY_DURATION&#xA;      value: 1s&#xA;    - name: RETRY_FACTOR&#xA;      value: &#34;2.0&#34;&#xA;    - name: RETRY_JITTER&#xA;      value: &#34;0.1&#34;&#xA;    - name: HOMEDIR&#xA;      value: /tekton/home&#xA;    - name: SSL_CERT_DIR&#xA;      value: /tekton-custom-certs:/etc/ssl/certs:/etc/pki/tls/certs:/system/etc/security/cacerts:/var/run/secrets/kubernetes.io/serviceaccount&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: validate&#xA;    onError: continue&#xA;    script: |&#xA;      #!/bin/bash&#xA;      set -euo pipefail&#xA;&#xA;      cmd_args=(&#xA;        validate&#xA;        image&#xA;        --images=&#34;${HOMEDIR}/snapshot.json&#34;&#xA;        --policy=&#34;${POLICY_CONFIGURATION}&#34;&#xA;      )&#xA;&#xA;      # To keep bash logic as thin as possible we deliberately don&#39;t sanitize&#xA;      # these params. If something is wrong or missing let Conforma handle it.&#xA;&#xA;      if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;        # If *any* of the above are non-empty assume the intention is to&#xA;        # try keyless verification&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity=&#34;${CERTIFICATE_IDENTITY}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity-regexp=&#34;${CERTIFICATE_IDENTITY_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer=&#34;${CERTIFICATE_OIDC_ISSUER}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer-regexp=&#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        # Force --ignore-rekor to false since we need rekor&#xA;        cmd_args+=(&#xA;          --ignore-rekor=false&#xA;        )&#xA;      else&#xA;        # Assume traditional signing secret verification&#xA;        cmd_args+=(&#xA;          --public-key=&#34;${PUBLIC_KEY}&#34;&#xA;          --ignore-rekor=&#34;${IGNORE_REKOR}&#34;&#xA;        )&#xA;      fi&#xA;&#xA;      cmd_args+=(&#xA;        --rekor-url=&#34;${REKOR_HOST}&#34;&#xA;        --workers=&#34;${WORKERS}&#34;&#xA;        --info=&#34;${INFO}&#34;&#xA;        --timeout=0&#xA;        --strict=false&#xA;        --show-successes=true&#xA;        --show-policy-docs-link=true&#xA;        --effective-time=&#34;${EFFECTIVE_TIME}&#34;&#xA;        --extra-rule-data=&#34;${EXTRA_RULE_DATA}&#34;&#xA;        --retry-max-wait=&#34;${RETRY_MAX_WAIT}&#34;&#xA;        --retry-max-retry=&#34;${RETRY_MAX_RETRY}&#34;&#xA;        --retry-duration=&#34;${RETRY_DURATION}&#34;&#xA;        --retry-factor=&#34;${RETRY_FACTOR}&#34;&#xA;        --retry-jitter=&#34;${RETRY_JITTER}&#34;&#xA;        --output=&#34;text=${HOMEDIR}/text-report.txt?show-successes=false&#34;&#xA;        --output=&#34;json=${HOMEDIR}/report-json.json&#34;&#xA;        --output=&#34;appstudio=/tekton/results/TEST_OUTPUT&#34;&#xA;      )&#xA;&#xA;&#xA;      # Execute Conforma with constructed arguments&#xA;      exec ec &#34;${cmd_args[@]}&#34;&#xA;    volumeMounts:&#xA;    - mountPath: /etc/pki/tls/certs/ca-custom-bundle.crt&#xA;      name: trusted-ca&#xA;      readOnly: true&#xA;      subPath: ca-bundle.crt&#xA;  - args:&#xA;    - jq . /tekton/home/report-json.json | awk &#39;{gsub(/^ +/, &#34;&#34;); acc += length; if&#xA;      (acc &gt;= 8000) { printf &#34;\n&#34;; acc=length } printf $0 }&#39;&#xA;    command:&#xA;    - sh&#xA;    - -c&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: report-json&#xA;    onError: continue&#xA;  - args:&#xA;    - .&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: summary&#xA;    onError: continue&#xA;  - args:&#xA;    - version&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: version&#xA;  - args:&#xA;    - &#39;{policy: .policy, key: .key, &#34;effective-time&#34;: .[&#34;effective-time&#34;]}&#39;&#xA;    - /tekton/home/report-json.json&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: show-config&#xA;  - args:&#xA;    - /tekton/home/text-report.txt&#xA;    command:&#xA;    - cat&#xA;    computeResources: {}&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: detailed-report&#xA;    onError: continue&#xA;  - args:&#xA;    - --argjson&#xA;    - strict&#xA;    - &#34;false&#34;&#xA;    - -e&#xA;    - |&#xA;      .result == &#34;SUCCESS&#34; or .result == &#34;WARNING&#34; or ($strict | not)&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: assert&#xA;  volumes:&#xA;  - configMap:&#xA;      items:&#xA;      - key: ca-bundle.crt&#xA;        path: ca-bundle.crt&#xA;      name: trusted-ca&#xA;      optional: true&#xA;    name: trusted-ca&#xA;  workspaces:&#xA;  - description: The workspace where the snapshot spec json file resides&#xA;    name: data&#xA;    optional: true&#xA;&#xA;*** Logs from pod &#39;verify-enterprise-contract-a853bf0901c38a3aed11dcef2c62eb63-pod&#39;, container &#39;step-initialize-tuf&#39;:&#xA;----- START -----2026/05/06 07:11:44 INFO Step was skipped due to when expressions were evaluated to false.&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-a853bf0901c38a3aed11dcef2c62eb63-pod&#39;, container &#39;step-reduce&#39;:&#xA;----- START -----Single Component mode? false&#xA;{&#xA;  &#34;components&#34;: [&#xA;    {&#xA;      &#34;name&#34;: &#34;&#34;,&#xA;      &#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-ohfkxyrwwd@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#34;,&#xA;      &#34;source&#34;: {}&#xA;    }&#xA;  ],&#xA;  &#34;artifacts&#34;: {}&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-a853bf0901c38a3aed11dcef2c62eb63-pod&#39;, container &#39;step-validate&#39;:&#xA;----- START ---------- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-a853bf0901c38a3aed11dcef2c62eb63-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: false,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#34;,&#34;source&#34;: {},&#34;violations&#34;: [{&#34;msg&#34;: &#34;No test data found&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;test.test_data_found&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that at least one of the tasks in the pipeline includes a TEST_OUTPUT task result, which is where Conforma expects to find test result data. To exclude this rule add \&#34;test.test_data_found\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;Confirm at least one task in the build pipeline contains a result named TEST_OUTPUT.&#34;,&#34;title&#34;: &#34;Test data found in task results&#34;}}],&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;test.rule_data_provided&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the expected rule data keys have been provided in the expected format. The keys are `supported_tests_results`, `failed_tests_results`, `informative_tests`, `erred_tests_results`, `skipped_tests_results`, and `warned_tests_results`.&#34;,&#34;title&#34;: &#34;Rule data provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;test.test_all_images&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Ensure that task producing the IMAGES_PROCESSED result contains the digests of the built image.&#34;,&#34;effective_on&#34;: &#34;2024-05-29T00:00:00Z&#34;,&#34;title&#34;: &#34;Image digest is present in IMAGES_PROCESSED result&#34;}}],&#34;success&#34;: false,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIHpThoeJopV8XLF2YuemXz4DR4hRN/vZvyQngkYPoXLYAiBqD0xaa9X1e/XtioW0Gl3/NnBA0fE9kcKeTwOGxzy6CA==&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEUCIQDDSONR8Lny6UO7VwgOfhw8F6WJmm2/oOttApzOEimBFwIgHQWWPKKliBt/1HskjjUPptgRBMtqrndFaesyAF09GqQ=&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIFS/iyOUt5n9cVhOzAWKMMkbvQYkrzkm0Z3doUhfTuTPAiAO3L5lGuZDGl68dhva0CT//ihJnixMt8+rZtJCwo03RQ==&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:fOgL1xsyIks4O0XWySo7iEds+F+o5nNbqZKqVlESoIw&#34;,&#34;sig&#34;: &#34;MEQCIB4iVUsI/n1MKSqcuXD2CH6Z0jU1QdGaEeiEQSAjIswkAiAkwsGaw24EvO78rvpJVMw0CC2wzE2qX87Q8tFYsD3GwQ==&#34;}]}]}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEF1KPrbmgPwizdb09V4Tx2cuolTkR\n7bvG0CNUnt8llVgeI3i8FwpJavDhEIhOOd+Ug62XZMEQJkhn0x9upJLjbw==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:59c6b95c02295edb7928ef187571d26d426993fd5aae0236a03c832afbd6072a&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=67018469815ee9f81e47cfb54dae39d71ed5f389&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:c7303e2d586614e47d7340ff8d7059c98c6c68fc8ca938b3448179fb8009372e&#34;,&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;include&#34;: [&#34;test&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-ioyw/cosign-public-key&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-06T07:11:44.40641189Z&#34;}----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-a853bf0901c38a3aed11dcef2c62eb63-pod&#39;, container &#39;step-summary&#39;:&#xA;----- START -----{&#xA;  &#34;timestamp&#34;: &#34;1778051509&#34;,&#xA;  &#34;namespace&#34;: &#34;&#34;,&#xA;  &#34;successes&#34;: 5,&#xA;  &#34;failures&#34;: 1,&#xA;  &#34;warnings&#34;: 0,&#xA;  &#34;result&#34;: &#34;FAILURE&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-a853bf0901c38a3aed11dcef2c62eb63-pod&#39;, container &#39;step-version&#39;:&#xA;----- START -----Version            v0.9.25&#xA;Source ID          b345847182602d9a5ce9e957fa76fe02575c8018&#xA;Change date        2026-04-27 12:52:43 +0000 UTC (1 week ago)&#xA;ECC                v0.1.7&#xA;OPA                v1.15.2&#xA;Conftest           v0.68.2&#xA;Cosign             v3.0.4&#xA;Sigstore           v1.10.4&#xA;Rekor              v1.5.0&#xA;Tekton Pipeline    v1.9.2&#xA;Kubernetes Client  v0.35.0&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-a853bf0901c38a3aed11dcef2c62eb63-pod&#39;, container &#39;step-show-config&#39;:&#xA;----- START -----{&#xA;  &#34;policy&#34;: {&#xA;    &#34;name&#34;: &#34;Default&#34;,&#xA;    &#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#xA;    &#34;sources&#34;: [&#xA;      {&#xA;        &#34;name&#34;: &#34;Default&#34;,&#xA;        &#34;policy&#34;: [&#xA;          &#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:59c6b95c02295edb7928ef187571d26d426993fd5aae0236a03c832afbd6072a&#34;&#xA;        ],&#xA;        &#34;data&#34;: [&#xA;          &#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=67018469815ee9f81e47cfb54dae39d71ed5f389&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:c7303e2d586614e47d7340ff8d7059c98c6c68fc8ca938b3448179fb8009372e&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;&#xA;        ],&#xA;        &#34;config&#34;: {&#xA;          &#34;include&#34;: [&#xA;            &#34;test&#34;&#xA;          ]&#xA;        }&#xA;      }&#xA;    ],&#xA;    &#34;publicKey&#34;: &#34;k8s://chains-e2e-ioyw/cosign-public-key&#34;&#xA;  },&#xA;  &#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEF1KPrbmgPwizdb09V4Tx2cuolTkR\n7bvG0CNUnt8llVgeI3i8FwpJavDhEIhOOd+Ug62XZMEQJkhn0x9upJLjbw==\n-----END PUBLIC KEY-----\n&#34;,&#xA;  &#34;effective-time&#34;: &#34;2026-05-06T07:11:44.40641189Z&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-a853bf0901c38a3aed11dcef2c62eb63-pod&#39;, container &#39;step-detailed-report&#39;:&#xA;----- START -----Success: false&#xA;Result: FAILURE&#xA;Violations: 1, Warnings: 0, Successes: 5&#xA;Component: &#xA;ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#xA;&#xA;Results:&#xA;✕ [Violation] test.test_data_found&#xA;  ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#xA;  Reason: No test data found&#xA;  Title: Test data found in task results&#xA;  Description: Ensure that at least one of the tasks in the pipeline includes a TEST_OUTPUT task result, which is where Conforma&#xA;  expects to find test result data. To exclude this rule add &#34;test.test_data_found&#34; to the `exclude` section of the policy&#xA;  configuration.&#xA;  Solution: Confirm at least one task in the build pipeline contains a result named TEST_OUTPUT.&#xA;&#xA;For more information about policy issues, see the policy documentation: https://conforma.dev/docs/policy/&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-a853bf0901c38a3aed11dcef2c62eb63-pod&#39;, container &#39;step-assert&#39;:&#xA;----- START -----true&#xA;----- END -----&#xA;Make sure TaskRun verify-enterprise-contract of PipelineRun verify-enterprise-contract-run-2djv6 succeeded&#xA;Make sure result for TaskRun &#34;verify-enterprise-contract&#34; succeeded&#xA;&lt; Exit [It] does not pass when tests are not satisfied on non-strict mode - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:197 @ 05/06/26 07:11:52.133 (14.191s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:11:52.133&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:11:52.133 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task fails when tests are not satisfied on strict mode [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="17.333252375">
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:11:52.134&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:11:52.153 (19ms)&#xA;&gt; Enter [It] fails when tests are not satisfied on strict mode - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:225 @ 05/06/26 07:11:52.153&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-j9r7p&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-j9r7p&#34; to finish&#xA;*** TaskRun status:&#xA;artifacts: {}&#xA;completionTime: &#34;2026-05-06T07:12:08Z&#34;&#xA;conditions:&#xA;- lastTransitionTime: &#34;2026-05-06T07:12:08Z&#34;&#xA;  message: &#39;&#34;step-assert&#34; exited with code 1: Error&#39;&#xA;  reason: Failed&#xA;  status: &#34;False&#34;&#xA;  type: Succeeded&#xA;podName: verify-enterprise-contract-eeddd40397367cfe93c6fdf714d8aa94-pod&#xA;provenance:&#xA;  featureFlags:&#xA;    awaitSidecarReadiness: true&#xA;    coschedule: workspaces&#xA;    enableAPIFields: alpha&#xA;    enableParamEnum: true&#xA;    enableProvenanceInStatus: true&#xA;    enforceNonfalsifiability: none&#xA;    maxResultSize: 4096&#xA;    resultExtractionMethod: termination-message&#xA;    runningInEnvWithInjectedSidecars: true&#xA;    verificationNoMatchPolicy: ignore&#xA;  refSource:&#xA;    digest:&#xA;      sha256: 7df8d121c09999d0376e189c1eb8a8263078aab697aa5ee966512f581427a6ce&#xA;    entryPoint: verify-enterprise-contract&#xA;    uri: quay.io/conforma/tekton-task&#xA;results:&#xA;- name: TEST_OUTPUT&#xA;  type: string&#xA;  value: |&#xA;    {&#34;timestamp&#34;:&#34;1778051526&#34;,&#34;namespace&#34;:&#34;&#34;,&#34;successes&#34;:5,&#34;failures&#34;:1,&#34;warnings&#34;:0,&#34;result&#34;:&#34;FAILURE&#34;}&#xA;spanContext:&#xA;  traceparent: 00-052e657e87c00ef0b85dec05d71641a0-5a9d3fe3ad43a7c2-01&#xA;startTime: &#34;2026-05-06T07:11:53Z&#34;&#xA;steps:&#xA;- container: step-initialize-tuf&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: initialize-tuf&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://97409bc6077c2e0766c80119d76e2cf36968be99477f0552a4d66069759f7237&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:59Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:59Z&#34;&#xA;  terminationReason: Skipped&#xA;- container: step-reduce&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: reduce&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://3032662df58e4a3a94aa589bfe4883037c10760ceb0aaac9c240a24b0c078eb5&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:11:59Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:11:59Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-validate&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: validate&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://a644491bf5884353355f9e385811cc5546e36c316570b5c84703c995e3e5f64a&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:06Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051526\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:00Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-report-json&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: report-json&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://56c6f19a3be9bb14e7e5a64ae1efd6ed308e0e704969201494d48a660dab0e75&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:07Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051526\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:06Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-summary&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: summary&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://5bbd9dd3da7c7bb43aab0bfdec066cad8347bc9c3561f2c6e66e3690d4ffd06a&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:07Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051526\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:07Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-version&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: version&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://8eeddbee4ae14d66dad76bd5da71900f719e08f9ae65e0b839f4ec33d14976f6&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:07Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051526\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:07Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-show-config&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: show-config&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://ba9048d58205ece0b28bf4637485bf428f92f8d0ad705ee412b075d616b95597&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:07Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051526\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:07Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-detailed-report&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: detailed-report&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://d25d98206d1ed0955227897b970d4390a9a28562caf388635fdc0a0bd08f210c&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:08Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051526\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:07Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-assert&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: assert&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://c01d314aa38578d60076668aa60fcac3a361a75ead5715f86a6ee2568f598d09&#xA;    exitCode: 1&#xA;    finishedAt: &#34;2026-05-06T07:12:08Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051526\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Error&#xA;    startedAt: &#34;2026-05-06T07:12:08Z&#34;&#xA;  terminationReason: Error&#xA;taskSpec:&#xA;  description: Verify the enterprise contract is met&#xA;  params:&#xA;  - description: |&#xA;      Spec section of an ApplicationSnapshot resource. Not all fields of the&#xA;      resource are required. A minimal example:&#xA;&#xA;      ```json&#xA;        {&#xA;          &#34;components&#34;: [&#xA;            {&#xA;              &#34;containerImage&#34;: &#34;quay.io/example/repo:latest&#34;&#xA;            }&#xA;          ]&#xA;        }&#xA;      ```&#xA;&#xA;      Each `containerImage` in the `components` array is validated.&#xA;    name: IMAGES&#xA;    type: string&#xA;  - default: enterprise-contract-service/default&#xA;    description: |&#xA;      Name of the policy configuration (EnterpriseContractPolicy&#xA;      resource) to use. `namespace/name` or `name` syntax supported. If&#xA;      namespace is omitted the namespace where the task runs is used.&#xA;      You can also specify a policy configuration using a git url, e.g.&#xA;      `github.com/conforma/config//slsa3`.&#xA;    name: POLICY_CONFIGURATION&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Public key used to verify traditional long-lived signatures. Must&#xA;      be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret&#xA;      contains the expected cosign.pub attribute. Required for traditional signing&#xA;      key verification. Will be ignored if any of CERTIFICATE_IDENTITY, CERTIFICATE_IDENTITY_REGEXP,&#xA;      CERTIFICATE_OIDC_ISSUER, or CERTIFICATE_OIDC_ISSUER_REGEXP are provided.&#xA;    name: PUBLIC_KEY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Rekor host for transparency log lookups&#xA;    name: REKOR_HOST&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected identity in the signing certificate for keyless verification.&#xA;      This should be the email or URI that was used when signing. You should provide&#xA;      both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification.&#xA;      The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_IDENTITY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected OIDC issuer in the signing certificate for keyless verification.&#xA;      This should match the issuer that provided the identity token used for signing.&#xA;      You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for&#xA;      keyless verification. The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_OIDC_ISSUER&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_IDENTITY but the value is a regexp that will&#xA;      be matched. Note that CERTIFICATE_IDENTITY takes precedence over this if both&#xA;      are present.&#xA;    name: CERTIFICATE_IDENTITY_REGEXP&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_OIDC_ISSUER but a regexp that will be matched.&#xA;      Note that CERTIFICATE_OIDC_ISSUER takes precedence over this if both are present.&#xA;    name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Skip Rekor transparency log checks during validation. Compatible&#xA;      with traditional signing secret signature checks only. If any of the CERTIFICATE_*&#xA;      keyless verification params are present, this value is disregarded and Rekor&#xA;      transparency log checks are included.&#xA;    name: IGNORE_REKOR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: TUF mirror URL. Provide a value when NOT using public sigstore deployment.&#xA;    name: TUF_MIRROR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Path to a directory containing SSL certs to be used when communicating&#xA;      with external services. This is useful when using the integrated registry&#xA;      and a local instance of Rekor on a development cluster which may use&#xA;      certificates issued by a not-commonly trusted root CA. In such cases,&#xA;      `/var/run/secrets/kubernetes.io/serviceaccount` is a good value. Multiple&#xA;      paths can be provided by using the `:` separator.&#xA;    name: SSL_CERT_DIR&#xA;    type: string&#xA;  - default: trusted-ca&#xA;    description: The name of the ConfigMap to read CA bundle data from.&#xA;    name: CA_TRUST_CONFIGMAP_NAME&#xA;    type: string&#xA;  - default: ca-bundle.crt&#xA;    description: The name of the key in the ConfigMap that contains the CA bundle&#xA;      data.&#xA;    name: CA_TRUST_CONFIG_MAP_KEY&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Include rule titles and descriptions in the output. Set to `&#34;false&#34;`&#xA;      to disable it.&#xA;    name: INFO&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Fail the task if policy fails. Set to `&#34;false&#34;` to disable it.&#xA;    name: STRICT&#xA;    type: string&#xA;  - default: /tekton/home&#xA;    description: Value for the HOME environment variable.&#xA;    name: HOMEDIR&#xA;    type: string&#xA;  - default: now&#xA;    description: Run policy checks with the provided time.&#xA;    name: EFFECTIVE_TIME&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Merge additional Rego variables into the policy data. Use syntax&#xA;      &#34;key=value,key2=value2...&#34;&#xA;    name: EXTRA_RULE_DATA&#xA;    type: string&#xA;  - default: &#34;1&#34;&#xA;    description: Number of parallel workers to use for policy evaluation.&#xA;    name: WORKERS&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Reduce the Snapshot to only the component whose build caused the&#xA;      Snapshot to be created&#xA;    name: SINGLE_COMPONENT&#xA;    type: string&#xA;  - default: unknown&#xA;    description: |&#xA;      Name, including kind, of the Kubernetes resource to query for labels when single component mode is enabled, e.g. pr/somepipeline.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Kubernetes namespace where the SINGLE_COMPONENT_NAME is found. Only used when single component mode is enabled.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE_NS&#xA;    type: string&#xA;  - default: 1s&#xA;    description: Base duration for exponential backoff calculation (e.g., &#34;1s&#34;, &#34;500ms&#34;)&#xA;    name: RETRY_DURATION&#xA;    type: string&#xA;  - default: &#34;2.0&#34;&#xA;    description: Exponential backoff multiplier (e.g., &#34;2.0&#34;, &#34;1.5&#34;)&#xA;    name: RETRY_FACTOR&#xA;    type: string&#xA;  - default: &#34;0.1&#34;&#xA;    description: Randomness factor for backoff calculation (0.0-1.0, e.g., &#34;0.1&#34;,&#xA;      &#34;0.2&#34;)&#xA;    name: RETRY_JITTER&#xA;    type: string&#xA;  - default: &#34;3&#34;&#xA;    description: Maximum number of retry attempts&#xA;    name: RETRY_MAX_RETRY&#xA;    type: string&#xA;  - default: 3s&#xA;    description: Maximum wait time between retries (e.g., &#34;3s&#34;, &#34;10s&#34;)&#xA;    name: RETRY_MAX_WAIT&#xA;    type: string&#xA;  results:&#xA;  - description: Short summary of the policy evaluation for each image&#xA;    name: TEST_OUTPUT&#xA;    type: string&#xA;  stepTemplate:&#xA;    computeResources: {}&#xA;    env:&#xA;    - name: HOME&#xA;      value: /tekton/home&#xA;  steps:&#xA;  - args:&#xA;    - sigstore&#xA;    - initialize&#xA;    - --mirror&#xA;    - &#34;&#34;&#xA;    - --root&#xA;    - /root.json&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: initialize-tuf&#xA;    when:&#xA;    - operator: notin&#xA;      values:&#xA;      - &#34;&#34;&#xA;  - command:&#xA;    - reduce-snapshot.sh&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    env:&#xA;    - name: SNAPSHOT&#xA;      value: &#39;{&#34;components&#34;:[{&#34;name&#34;:&#34;&#34;,&#34;containerImage&#34;:&#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-ohfkxyrwwd@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#34;,&#34;source&#34;:{}}],&#34;artifacts&#34;:{}}&#39;&#xA;    - name: SINGLE_COMPONENT&#xA;      value: &#34;false&#34;&#xA;    - name: CUSTOM_RESOURCE&#xA;      value: unknown&#xA;    - name: CUSTOM_RESOURCE_NAMESPACE&#xA;    - name: SNAPSHOT_PATH&#xA;      value: /tekton/home/snapshot.json&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: reduce&#xA;    onError: continue&#xA;  - computeResources:&#xA;      limits:&#xA;        memory: 2Gi&#xA;      requests:&#xA;        cpu: 1800m&#xA;        memory: 2Gi&#xA;    env:&#xA;    - name: POLICY_CONFIGURATION&#xA;      value: ec-policy&#xA;    - name: PUBLIC_KEY&#xA;      value: k8s://chains-e2e-ioyw/cosign-public-key&#xA;    - name: CERTIFICATE_IDENTITY&#xA;    - name: CERTIFICATE_OIDC_ISSUER&#xA;    - name: CERTIFICATE_IDENTITY_REGEXP&#xA;    - name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    - name: REKOR_HOST&#xA;    - name: IGNORE_REKOR&#xA;      value: &#34;true&#34;&#xA;    - name: WORKERS&#xA;      value: &#34;1&#34;&#xA;    - name: INFO&#xA;      value: &#34;true&#34;&#xA;    - name: EFFECTIVE_TIME&#xA;      value: now&#xA;    - name: EXTRA_RULE_DATA&#xA;    - name: RETRY_MAX_WAIT&#xA;      value: 3s&#xA;    - name: RETRY_MAX_RETRY&#xA;      value: &#34;3&#34;&#xA;    - name: RETRY_DURATION&#xA;      value: 1s&#xA;    - name: RETRY_FACTOR&#xA;      value: &#34;2.0&#34;&#xA;    - name: RETRY_JITTER&#xA;      value: &#34;0.1&#34;&#xA;    - name: HOMEDIR&#xA;      value: /tekton/home&#xA;    - name: SSL_CERT_DIR&#xA;      value: /tekton-custom-certs:/etc/ssl/certs:/etc/pki/tls/certs:/system/etc/security/cacerts:/var/run/secrets/kubernetes.io/serviceaccount&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: validate&#xA;    onError: continue&#xA;    script: |&#xA;      #!/bin/bash&#xA;      set -euo pipefail&#xA;&#xA;      cmd_args=(&#xA;        validate&#xA;        image&#xA;        --images=&#34;${HOMEDIR}/snapshot.json&#34;&#xA;        --policy=&#34;${POLICY_CONFIGURATION}&#34;&#xA;      )&#xA;&#xA;      # To keep bash logic as thin as possible we deliberately don&#39;t sanitize&#xA;      # these params. If something is wrong or missing let Conforma handle it.&#xA;&#xA;      if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;        # If *any* of the above are non-empty assume the intention is to&#xA;        # try keyless verification&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity=&#34;${CERTIFICATE_IDENTITY}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity-regexp=&#34;${CERTIFICATE_IDENTITY_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer=&#34;${CERTIFICATE_OIDC_ISSUER}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer-regexp=&#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        # Force --ignore-rekor to false since we need rekor&#xA;        cmd_args+=(&#xA;          --ignore-rekor=false&#xA;        )&#xA;      else&#xA;        # Assume traditional signing secret verification&#xA;        cmd_args+=(&#xA;          --public-key=&#34;${PUBLIC_KEY}&#34;&#xA;          --ignore-rekor=&#34;${IGNORE_REKOR}&#34;&#xA;        )&#xA;      fi&#xA;&#xA;      cmd_args+=(&#xA;        --rekor-url=&#34;${REKOR_HOST}&#34;&#xA;        --workers=&#34;${WORKERS}&#34;&#xA;        --info=&#34;${INFO}&#34;&#xA;        --timeout=0&#xA;        --strict=false&#xA;        --show-successes=true&#xA;        --show-policy-docs-link=true&#xA;        --effective-time=&#34;${EFFECTIVE_TIME}&#34;&#xA;        --extra-rule-data=&#34;${EXTRA_RULE_DATA}&#34;&#xA;        --retry-max-wait=&#34;${RETRY_MAX_WAIT}&#34;&#xA;        --retry-max-retry=&#34;${RETRY_MAX_RETRY}&#34;&#xA;        --retry-duration=&#34;${RETRY_DURATION}&#34;&#xA;        --retry-factor=&#34;${RETRY_FACTOR}&#34;&#xA;        --retry-jitter=&#34;${RETRY_JITTER}&#34;&#xA;        --output=&#34;text=${HOMEDIR}/text-report.txt?show-successes=false&#34;&#xA;        --output=&#34;json=${HOMEDIR}/report-json.json&#34;&#xA;        --output=&#34;appstudio=/tekton/results/TEST_OUTPUT&#34;&#xA;      )&#xA;&#xA;&#xA;      # Execute Conforma with constructed arguments&#xA;      exec ec &#34;${cmd_args[@]}&#34;&#xA;    volumeMounts:&#xA;    - mountPath: /etc/pki/tls/certs/ca-custom-bundle.crt&#xA;      name: trusted-ca&#xA;      readOnly: true&#xA;      subPath: ca-bundle.crt&#xA;  - args:&#xA;    - jq . /tekton/home/report-json.json | awk &#39;{gsub(/^ +/, &#34;&#34;); acc += length; if&#xA;      (acc &gt;= 8000) { printf &#34;\n&#34;; acc=length } printf $0 }&#39;&#xA;    command:&#xA;    - sh&#xA;    - -c&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: report-json&#xA;    onError: continue&#xA;  - args:&#xA;    - .&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: summary&#xA;    onError: continue&#xA;  - args:&#xA;    - version&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: version&#xA;  - args:&#xA;    - &#39;{policy: .policy, key: .key, &#34;effective-time&#34;: .[&#34;effective-time&#34;]}&#39;&#xA;    - /tekton/home/report-json.json&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: show-config&#xA;  - args:&#xA;    - /tekton/home/text-report.txt&#xA;    command:&#xA;    - cat&#xA;    computeResources: {}&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: detailed-report&#xA;    onError: continue&#xA;  - args:&#xA;    - --argjson&#xA;    - strict&#xA;    - &#34;true&#34;&#xA;    - -e&#xA;    - |&#xA;      .result == &#34;SUCCESS&#34; or .result == &#34;WARNING&#34; or ($strict | not)&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: assert&#xA;  volumes:&#xA;  - configMap:&#xA;      items:&#xA;      - key: ca-bundle.crt&#xA;        path: ca-bundle.crt&#xA;      name: trusted-ca&#xA;      optional: true&#xA;    name: trusted-ca&#xA;  workspaces:&#xA;  - description: The workspace where the snapshot spec json file resides&#xA;    name: data&#xA;    optional: true&#xA;&#xA;*** Logs from pod &#39;verify-enterprise-contract-eeddd40397367cfe93c6fdf714d8aa94-pod&#39;, container &#39;step-initialize-tuf&#39;:&#xA;----- START -----2026/05/06 07:11:59 INFO Step was skipped due to when expressions were evaluated to false.&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eeddd40397367cfe93c6fdf714d8aa94-pod&#39;, container &#39;step-reduce&#39;:&#xA;----- START -----Single Component mode? false&#xA;{&#xA;  &#34;components&#34;: [&#xA;    {&#xA;      &#34;name&#34;: &#34;&#34;,&#xA;      &#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-ohfkxyrwwd@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#34;,&#xA;      &#34;source&#34;: {}&#xA;    }&#xA;  ],&#xA;  &#34;artifacts&#34;: {}&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eeddd40397367cfe93c6fdf714d8aa94-pod&#39;, container &#39;step-validate&#39;:&#xA;----- START ---------- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eeddd40397367cfe93c6fdf714d8aa94-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: false,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#34;,&#34;source&#34;: {},&#34;violations&#34;: [{&#34;msg&#34;: &#34;No test data found&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;test.test_data_found&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that at least one of the tasks in the pipeline includes a TEST_OUTPUT task result, which is where Conforma expects to find test result data. To exclude this rule add \&#34;test.test_data_found\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;Confirm at least one task in the build pipeline contains a result named TEST_OUTPUT.&#34;,&#34;title&#34;: &#34;Test data found in task results&#34;}}],&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;test.rule_data_provided&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the expected rule data keys have been provided in the expected format. The keys are `supported_tests_results`, `failed_tests_results`, `informative_tests`, `erred_tests_results`, `skipped_tests_results`, and `warned_tests_results`.&#34;,&#34;title&#34;: &#34;Rule data provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;test.test_all_images&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Ensure that task producing the IMAGES_PROCESSED result contains the digests of the built image.&#34;,&#34;effective_on&#34;: &#34;2024-05-29T00:00:00Z&#34;,&#34;title&#34;: &#34;Image digest is present in IMAGES_PROCESSED result&#34;}}],&#34;success&#34;: false,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIHpThoeJopV8XLF2YuemXz4DR4hRN/vZvyQngkYPoXLYAiBqD0xaa9X1e/XtioW0Gl3/NnBA0fE9kcKeTwOGxzy6CA==&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEUCIQDDSONR8Lny6UO7VwgOfhw8F6WJmm2/oOttApzOEimBFwIgHQWWPKKliBt/1HskjjUPptgRBMtqrndFaesyAF09GqQ=&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIFS/iyOUt5n9cVhOzAWKMMkbvQYkrzkm0Z3doUhfTuTPAiAO3L5lGuZDGl68dhva0CT//ihJnixMt8+rZtJCwo03RQ==&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:fOgL1xsyIks4O0XWySo7iEds+F+o5nNbqZKqVlESoIw&#34;,&#34;sig&#34;: &#34;MEQCIB4iVUsI/n1MKSqcuXD2CH6Z0jU1QdGaEeiEQSAjIswkAiAkwsGaw24EvO78rvpJVMw0CC2wzE2qX87Q8tFYsD3GwQ==&#34;}]}]}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEF1KPrbmgPwizdb09V4Tx2cuolTkR\n7bvG0CNUnt8llVgeI3i8FwpJavDhEIhOOd+Ug62XZMEQJkhn0x9upJLjbw==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:59c6b95c02295edb7928ef187571d26d426993fd5aae0236a03c832afbd6072a&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=67018469815ee9f81e47cfb54dae39d71ed5f389&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:c7303e2d586614e47d7340ff8d7059c98c6c68fc8ca938b3448179fb8009372e&#34;,&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;include&#34;: [&#34;test&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-ioyw/cosign-public-key&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-06T07:12:01.089464036Z&#34;}----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eeddd40397367cfe93c6fdf714d8aa94-pod&#39;, container &#39;step-summary&#39;:&#xA;----- START -----{&#xA;  &#34;timestamp&#34;: &#34;1778051526&#34;,&#xA;  &#34;namespace&#34;: &#34;&#34;,&#xA;  &#34;successes&#34;: 5,&#xA;  &#34;failures&#34;: 1,&#xA;  &#34;warnings&#34;: 0,&#xA;  &#34;result&#34;: &#34;FAILURE&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eeddd40397367cfe93c6fdf714d8aa94-pod&#39;, container &#39;step-version&#39;:&#xA;----- START -----Version            v0.9.25&#xA;Source ID          b345847182602d9a5ce9e957fa76fe02575c8018&#xA;Change date        2026-04-27 12:52:43 +0000 UTC (1 week ago)&#xA;ECC                v0.1.7&#xA;OPA                v1.15.2&#xA;Conftest           v0.68.2&#xA;Cosign             v3.0.4&#xA;Sigstore           v1.10.4&#xA;Rekor              v1.5.0&#xA;Tekton Pipeline    v1.9.2&#xA;Kubernetes Client  v0.35.0&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eeddd40397367cfe93c6fdf714d8aa94-pod&#39;, container &#39;step-show-config&#39;:&#xA;----- START -----{&#xA;  &#34;policy&#34;: {&#xA;    &#34;name&#34;: &#34;Default&#34;,&#xA;    &#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#xA;    &#34;sources&#34;: [&#xA;      {&#xA;        &#34;name&#34;: &#34;Default&#34;,&#xA;        &#34;policy&#34;: [&#xA;          &#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:59c6b95c02295edb7928ef187571d26d426993fd5aae0236a03c832afbd6072a&#34;&#xA;        ],&#xA;        &#34;data&#34;: [&#xA;          &#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=67018469815ee9f81e47cfb54dae39d71ed5f389&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:c7303e2d586614e47d7340ff8d7059c98c6c68fc8ca938b3448179fb8009372e&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;&#xA;        ],&#xA;        &#34;config&#34;: {&#xA;          &#34;include&#34;: [&#xA;            &#34;test&#34;&#xA;          ]&#xA;        }&#xA;      }&#xA;    ],&#xA;    &#34;publicKey&#34;: &#34;k8s://chains-e2e-ioyw/cosign-public-key&#34;&#xA;  },&#xA;  &#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEF1KPrbmgPwizdb09V4Tx2cuolTkR\n7bvG0CNUnt8llVgeI3i8FwpJavDhEIhOOd+Ug62XZMEQJkhn0x9upJLjbw==\n-----END PUBLIC KEY-----\n&#34;,&#xA;  &#34;effective-time&#34;: &#34;2026-05-06T07:12:01.089464036Z&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eeddd40397367cfe93c6fdf714d8aa94-pod&#39;, container &#39;step-detailed-report&#39;:&#xA;----- START -----Success: false&#xA;Result: FAILURE&#xA;Violations: 1, Warnings: 0, Successes: 5&#xA;Component: &#xA;ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#xA;&#xA;Results:&#xA;✕ [Violation] test.test_data_found&#xA;  ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#xA;  Reason: No test data found&#xA;  Title: Test data found in task results&#xA;  Description: Ensure that at least one of the tasks in the pipeline includes a TEST_OUTPUT task result, which is where Conforma&#xA;  expects to find test result data. To exclude this rule add &#34;test.test_data_found&#34; to the `exclude` section of the policy&#xA;  configuration.&#xA;  Solution: Confirm at least one task in the build pipeline contains a result named TEST_OUTPUT.&#xA;&#xA;For more information about policy issues, see the policy documentation: https://conforma.dev/docs/policy/&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-eeddd40397367cfe93c6fdf714d8aa94-pod&#39;, container &#39;step-assert&#39;:&#xA;----- START -----false&#xA;----- END -----&#xA;Make sure TaskRun verify-enterprise-contract of PipelineRun verify-enterprise-contract-run-j9r7p failed&#xA;&lt; Exit [It] fails when tests are not satisfied on strict mode - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:225 @ 05/06/26 07:12:09.467 (17.314s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:12:09.467&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:12:09.467 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task fails when unexpected signature is used [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="18.278413493">
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:12:09.468&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:12:09.495 (27ms)&#xA;&gt; Enter [It] fails when unexpected signature is used - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:251 @ 05/06/26 07:12:09.495&#xA;Create an unexpected public signing key&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-rqb9w&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-rqb9w&#34; to finish&#xA;*** TaskRun status:&#xA;artifacts: {}&#xA;completionTime: &#34;2026-05-06T07:12:26Z&#34;&#xA;conditions:&#xA;- lastTransitionTime: &#34;2026-05-06T07:12:26Z&#34;&#xA;  message: &#39;&#34;step-assert&#34; exited with code 1: Error&#39;&#xA;  reason: Failed&#xA;  status: &#34;False&#34;&#xA;  type: Succeeded&#xA;podName: verify-enterprise-contract-9de664babf1c709d7b136866f9afe440-pod&#xA;provenance:&#xA;  featureFlags:&#xA;    awaitSidecarReadiness: true&#xA;    coschedule: workspaces&#xA;    enableAPIFields: alpha&#xA;    enableParamEnum: true&#xA;    enableProvenanceInStatus: true&#xA;    enforceNonfalsifiability: none&#xA;    maxResultSize: 4096&#xA;    resultExtractionMethod: termination-message&#xA;    runningInEnvWithInjectedSidecars: true&#xA;    verificationNoMatchPolicy: ignore&#xA;  refSource:&#xA;    digest:&#xA;      sha256: 7df8d121c09999d0376e189c1eb8a8263078aab697aa5ee966512f581427a6ce&#xA;    entryPoint: verify-enterprise-contract&#xA;    uri: quay.io/conforma/tekton-task&#xA;results:&#xA;- name: TEST_OUTPUT&#xA;  type: string&#xA;  value: |&#xA;    {&#34;timestamp&#34;:&#34;1778051543&#34;,&#34;namespace&#34;:&#34;&#34;,&#34;successes&#34;:0,&#34;failures&#34;:2,&#34;warnings&#34;:0,&#34;result&#34;:&#34;FAILURE&#34;}&#xA;spanContext:&#xA;  traceparent: 00-644703fa21ed380572ccc97d55671b95-a6aed42278b25138-01&#xA;startTime: &#34;2026-05-06T07:12:10Z&#34;&#xA;steps:&#xA;- container: step-initialize-tuf&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: initialize-tuf&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://c20fe985cf7ddbf7accfe76f9cf08ab34cb9a53e24f3fd79df65925a1a4e0309&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:19Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:19Z&#34;&#xA;  terminationReason: Skipped&#xA;- container: step-reduce&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: reduce&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://a7ded30fc08ad19e15db9ca52f8ad57c2ef6aa1ec17481d503ca36dc19a7104b&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:19Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:19Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-validate&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: validate&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://59fb265041ad6737e686add5d379ff636fac12e7fd935420a5f4ed7b8dae2772&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:23Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051543\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:19Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-report-json&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: report-json&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://db8aeef11b6b38b87651163495e26c2198753e4f32b9f8a468a0c3c916789c80&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:24Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051543\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:24Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-summary&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: summary&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://a8a9f4702227ad6a8a7205ec3bafadfa36911db9d93709b6e866bbdcaadfd869&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:24Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051543\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:24Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-version&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: version&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://619469b9d761cb8f90a04b90b03f597017a20dd5e0f7bc890951362238bd3e14&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:24Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051543\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:24Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-show-config&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: show-config&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://90d32bac6810f65e73870ecb169f013561acd140ea483699d6933746892eac30&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:24Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051543\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:24Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-detailed-report&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: detailed-report&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://34cd3004ab038bc89296f2daa55356017e6d6b315cabcddc5cb3eb5e06136fb0&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-06T07:12:24Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051543\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-06T07:12:24Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-assert&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: assert&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://857e19fada198f4a7fef81ea91a0d301a86ce9c7c6ba7f02923c2d64e5d634d3&#xA;    exitCode: 1&#xA;    finishedAt: &#34;2026-05-06T07:12:25Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1778051543\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Error&#xA;    startedAt: &#34;2026-05-06T07:12:25Z&#34;&#xA;  terminationReason: Error&#xA;taskSpec:&#xA;  description: Verify the enterprise contract is met&#xA;  params:&#xA;  - description: |&#xA;      Spec section of an ApplicationSnapshot resource. Not all fields of the&#xA;      resource are required. A minimal example:&#xA;&#xA;      ```json&#xA;        {&#xA;          &#34;components&#34;: [&#xA;            {&#xA;              &#34;containerImage&#34;: &#34;quay.io/example/repo:latest&#34;&#xA;            }&#xA;          ]&#xA;        }&#xA;      ```&#xA;&#xA;      Each `containerImage` in the `components` array is validated.&#xA;    name: IMAGES&#xA;    type: string&#xA;  - default: enterprise-contract-service/default&#xA;    description: |&#xA;      Name of the policy configuration (EnterpriseContractPolicy&#xA;      resource) to use. `namespace/name` or `name` syntax supported. If&#xA;      namespace is omitted the namespace where the task runs is used.&#xA;      You can also specify a policy configuration using a git url, e.g.&#xA;      `github.com/conforma/config//slsa3`.&#xA;    name: POLICY_CONFIGURATION&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Public key used to verify traditional long-lived signatures. Must&#xA;      be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret&#xA;      contains the expected cosign.pub attribute. Required for traditional signing&#xA;      key verification. Will be ignored if any of CERTIFICATE_IDENTITY, CERTIFICATE_IDENTITY_REGEXP,&#xA;      CERTIFICATE_OIDC_ISSUER, or CERTIFICATE_OIDC_ISSUER_REGEXP are provided.&#xA;    name: PUBLIC_KEY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Rekor host for transparency log lookups&#xA;    name: REKOR_HOST&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected identity in the signing certificate for keyless verification.&#xA;      This should be the email or URI that was used when signing. You should provide&#xA;      both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification.&#xA;      The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_IDENTITY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected OIDC issuer in the signing certificate for keyless verification.&#xA;      This should match the issuer that provided the identity token used for signing.&#xA;      You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for&#xA;      keyless verification. The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_OIDC_ISSUER&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_IDENTITY but the value is a regexp that will&#xA;      be matched. Note that CERTIFICATE_IDENTITY takes precedence over this if both&#xA;      are present.&#xA;    name: CERTIFICATE_IDENTITY_REGEXP&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_OIDC_ISSUER but a regexp that will be matched.&#xA;      Note that CERTIFICATE_OIDC_ISSUER takes precedence over this if both are present.&#xA;    name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Skip Rekor transparency log checks during validation. Compatible&#xA;      with traditional signing secret signature checks only. If any of the CERTIFICATE_*&#xA;      keyless verification params are present, this value is disregarded and Rekor&#xA;      transparency log checks are included.&#xA;    name: IGNORE_REKOR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: TUF mirror URL. Provide a value when NOT using public sigstore deployment.&#xA;    name: TUF_MIRROR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Path to a directory containing SSL certs to be used when communicating&#xA;      with external services. This is useful when using the integrated registry&#xA;      and a local instance of Rekor on a development cluster which may use&#xA;      certificates issued by a not-commonly trusted root CA. In such cases,&#xA;      `/var/run/secrets/kubernetes.io/serviceaccount` is a good value. Multiple&#xA;      paths can be provided by using the `:` separator.&#xA;    name: SSL_CERT_DIR&#xA;    type: string&#xA;  - default: trusted-ca&#xA;    description: The name of the ConfigMap to read CA bundle data from.&#xA;    name: CA_TRUST_CONFIGMAP_NAME&#xA;    type: string&#xA;  - default: ca-bundle.crt&#xA;    description: The name of the key in the ConfigMap that contains the CA bundle&#xA;      data.&#xA;    name: CA_TRUST_CONFIG_MAP_KEY&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Include rule titles and descriptions in the output. Set to `&#34;false&#34;`&#xA;      to disable it.&#xA;    name: INFO&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Fail the task if policy fails. Set to `&#34;false&#34;` to disable it.&#xA;    name: STRICT&#xA;    type: string&#xA;  - default: /tekton/home&#xA;    description: Value for the HOME environment variable.&#xA;    name: HOMEDIR&#xA;    type: string&#xA;  - default: now&#xA;    description: Run policy checks with the provided time.&#xA;    name: EFFECTIVE_TIME&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Merge additional Rego variables into the policy data. Use syntax&#xA;      &#34;key=value,key2=value2...&#34;&#xA;    name: EXTRA_RULE_DATA&#xA;    type: string&#xA;  - default: &#34;1&#34;&#xA;    description: Number of parallel workers to use for policy evaluation.&#xA;    name: WORKERS&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Reduce the Snapshot to only the component whose build caused the&#xA;      Snapshot to be created&#xA;    name: SINGLE_COMPONENT&#xA;    type: string&#xA;  - default: unknown&#xA;    description: |&#xA;      Name, including kind, of the Kubernetes resource to query for labels when single component mode is enabled, e.g. pr/somepipeline.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Kubernetes namespace where the SINGLE_COMPONENT_NAME is found. Only used when single component mode is enabled.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE_NS&#xA;    type: string&#xA;  - default: 1s&#xA;    description: Base duration for exponential backoff calculation (e.g., &#34;1s&#34;, &#34;500ms&#34;)&#xA;    name: RETRY_DURATION&#xA;    type: string&#xA;  - default: &#34;2.0&#34;&#xA;    description: Exponential backoff multiplier (e.g., &#34;2.0&#34;, &#34;1.5&#34;)&#xA;    name: RETRY_FACTOR&#xA;    type: string&#xA;  - default: &#34;0.1&#34;&#xA;    description: Randomness factor for backoff calculation (0.0-1.0, e.g., &#34;0.1&#34;,&#xA;      &#34;0.2&#34;)&#xA;    name: RETRY_JITTER&#xA;    type: string&#xA;  - default: &#34;3&#34;&#xA;    description: Maximum number of retry attempts&#xA;    name: RETRY_MAX_RETRY&#xA;    type: string&#xA;  - default: 3s&#xA;    description: Maximum wait time between retries (e.g., &#34;3s&#34;, &#34;10s&#34;)&#xA;    name: RETRY_MAX_WAIT&#xA;    type: string&#xA;  results:&#xA;  - description: Short summary of the policy evaluation for each image&#xA;    name: TEST_OUTPUT&#xA;    type: string&#xA;  stepTemplate:&#xA;    computeResources: {}&#xA;    env:&#xA;    - name: HOME&#xA;      value: /tekton/home&#xA;  steps:&#xA;  - args:&#xA;    - sigstore&#xA;    - initialize&#xA;    - --mirror&#xA;    - &#34;&#34;&#xA;    - --root&#xA;    - /root.json&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: initialize-tuf&#xA;    when:&#xA;    - operator: notin&#xA;      values:&#xA;      - &#34;&#34;&#xA;  - command:&#xA;    - reduce-snapshot.sh&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    env:&#xA;    - name: SNAPSHOT&#xA;      value: &#39;{&#34;components&#34;:[{&#34;name&#34;:&#34;&#34;,&#34;containerImage&#34;:&#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-ohfkxyrwwd@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#34;,&#34;source&#34;:{}}],&#34;artifacts&#34;:{}}&#39;&#xA;    - name: SINGLE_COMPONENT&#xA;      value: &#34;false&#34;&#xA;    - name: CUSTOM_RESOURCE&#xA;      value: unknown&#xA;    - name: CUSTOM_RESOURCE_NAMESPACE&#xA;    - name: SNAPSHOT_PATH&#xA;      value: /tekton/home/snapshot.json&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: reduce&#xA;    onError: continue&#xA;  - computeResources:&#xA;      limits:&#xA;        memory: 2Gi&#xA;      requests:&#xA;        cpu: 1800m&#xA;        memory: 2Gi&#xA;    env:&#xA;    - name: POLICY_CONFIGURATION&#xA;      value: ec-policy&#xA;    - name: PUBLIC_KEY&#xA;      value: k8s://chains-e2e-ioyw/dummy-public-key-pzagsmzkkp&#xA;    - name: CERTIFICATE_IDENTITY&#xA;    - name: CERTIFICATE_OIDC_ISSUER&#xA;    - name: CERTIFICATE_IDENTITY_REGEXP&#xA;    - name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    - name: REKOR_HOST&#xA;    - name: IGNORE_REKOR&#xA;      value: &#34;true&#34;&#xA;    - name: WORKERS&#xA;      value: &#34;1&#34;&#xA;    - name: INFO&#xA;      value: &#34;true&#34;&#xA;    - name: EFFECTIVE_TIME&#xA;      value: now&#xA;    - name: EXTRA_RULE_DATA&#xA;    - name: RETRY_MAX_WAIT&#xA;      value: 3s&#xA;    - name: RETRY_MAX_RETRY&#xA;      value: &#34;3&#34;&#xA;    - name: RETRY_DURATION&#xA;      value: 1s&#xA;    - name: RETRY_FACTOR&#xA;      value: &#34;2.0&#34;&#xA;    - name: RETRY_JITTER&#xA;      value: &#34;0.1&#34;&#xA;    - name: HOMEDIR&#xA;      value: /tekton/home&#xA;    - name: SSL_CERT_DIR&#xA;      value: /tekton-custom-certs:/etc/ssl/certs:/etc/pki/tls/certs:/system/etc/security/cacerts:/var/run/secrets/kubernetes.io/serviceaccount&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: validate&#xA;    onError: continue&#xA;    script: |&#xA;      #!/bin/bash&#xA;      set -euo pipefail&#xA;&#xA;      cmd_args=(&#xA;        validate&#xA;        image&#xA;        --images=&#34;${HOMEDIR}/snapshot.json&#34;&#xA;        --policy=&#34;${POLICY_CONFIGURATION}&#34;&#xA;      )&#xA;&#xA;      # To keep bash logic as thin as possible we deliberately don&#39;t sanitize&#xA;      # these params. If something is wrong or missing let Conforma handle it.&#xA;&#xA;      if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;        # If *any* of the above are non-empty assume the intention is to&#xA;        # try keyless verification&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity=&#34;${CERTIFICATE_IDENTITY}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity-regexp=&#34;${CERTIFICATE_IDENTITY_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer=&#34;${CERTIFICATE_OIDC_ISSUER}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer-regexp=&#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        # Force --ignore-rekor to false since we need rekor&#xA;        cmd_args+=(&#xA;          --ignore-rekor=false&#xA;        )&#xA;      else&#xA;        # Assume traditional signing secret verification&#xA;        cmd_args+=(&#xA;          --public-key=&#34;${PUBLIC_KEY}&#34;&#xA;          --ignore-rekor=&#34;${IGNORE_REKOR}&#34;&#xA;        )&#xA;      fi&#xA;&#xA;      cmd_args+=(&#xA;        --rekor-url=&#34;${REKOR_HOST}&#34;&#xA;        --workers=&#34;${WORKERS}&#34;&#xA;        --info=&#34;${INFO}&#34;&#xA;        --timeout=0&#xA;        --strict=false&#xA;        --show-successes=true&#xA;        --show-policy-docs-link=true&#xA;        --effective-time=&#34;${EFFECTIVE_TIME}&#34;&#xA;        --extra-rule-data=&#34;${EXTRA_RULE_DATA}&#34;&#xA;        --retry-max-wait=&#34;${RETRY_MAX_WAIT}&#34;&#xA;        --retry-max-retry=&#34;${RETRY_MAX_RETRY}&#34;&#xA;        --retry-duration=&#34;${RETRY_DURATION}&#34;&#xA;        --retry-factor=&#34;${RETRY_FACTOR}&#34;&#xA;        --retry-jitter=&#34;${RETRY_JITTER}&#34;&#xA;        --output=&#34;text=${HOMEDIR}/text-report.txt?show-successes=false&#34;&#xA;        --output=&#34;json=${HOMEDIR}/report-json.json&#34;&#xA;        --output=&#34;appstudio=/tekton/results/TEST_OUTPUT&#34;&#xA;      )&#xA;&#xA;&#xA;      # Execute Conforma with constructed arguments&#xA;      exec ec &#34;${cmd_args[@]}&#34;&#xA;    volumeMounts:&#xA;    - mountPath: /etc/pki/tls/certs/ca-custom-bundle.crt&#xA;      name: trusted-ca&#xA;      readOnly: true&#xA;      subPath: ca-bundle.crt&#xA;  - args:&#xA;    - jq . /tekton/home/report-json.json | awk &#39;{gsub(/^ +/, &#34;&#34;); acc += length; if&#xA;      (acc &gt;= 8000) { printf &#34;\n&#34;; acc=length } printf $0 }&#39;&#xA;    command:&#xA;    - sh&#xA;    - -c&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: report-json&#xA;    onError: continue&#xA;  - args:&#xA;    - .&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: summary&#xA;    onError: continue&#xA;  - args:&#xA;    - version&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: version&#xA;  - args:&#xA;    - &#39;{policy: .policy, key: .key, &#34;effective-time&#34;: .[&#34;effective-time&#34;]}&#39;&#xA;    - /tekton/home/report-json.json&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: show-config&#xA;  - args:&#xA;    - /tekton/home/text-report.txt&#xA;    command:&#xA;    - cat&#xA;    computeResources: {}&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: detailed-report&#xA;    onError: continue&#xA;  - args:&#xA;    - --argjson&#xA;    - strict&#xA;    - &#34;true&#34;&#xA;    - -e&#xA;    - |&#xA;      .result == &#34;SUCCESS&#34; or .result == &#34;WARNING&#34; or ($strict | not)&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: assert&#xA;  volumes:&#xA;  - configMap:&#xA;      items:&#xA;      - key: ca-bundle.crt&#xA;        path: ca-bundle.crt&#xA;      name: trusted-ca&#xA;      optional: true&#xA;    name: trusted-ca&#xA;  workspaces:&#xA;  - description: The workspace where the snapshot spec json file resides&#xA;    name: data&#xA;    optional: true&#xA;&#xA;*** Logs from pod &#39;verify-enterprise-contract-9de664babf1c709d7b136866f9afe440-pod&#39;, container &#39;step-initialize-tuf&#39;:&#xA;----- START -----2026/05/06 07:12:19 INFO Step was skipped due to when expressions were evaluated to false.&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9de664babf1c709d7b136866f9afe440-pod&#39;, container &#39;step-reduce&#39;:&#xA;----- START -----Single Component mode? false&#xA;{&#xA;  &#34;components&#34;: [&#xA;    {&#xA;      &#34;name&#34;: &#34;&#34;,&#xA;      &#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-ohfkxyrwwd@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#34;,&#xA;      &#34;source&#34;: {}&#xA;    }&#xA;  ],&#xA;  &#34;artifacts&#34;: {}&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9de664babf1c709d7b136866f9afe440-pod&#39;, container &#39;step-validate&#39;:&#xA;----- START ---------- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9de664babf1c709d7b136866f9afe440-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: false,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#34;,&#34;source&#34;: {},&#34;violations&#34;: [{&#34;msg&#34;: &#34;No image attestations found matching the given public key. Verify the correct public key was provided, and one or more attestations were created. Error: no matching attestations: accepted signatures do not match threshold, Found: 0, Expected 1&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;No image signatures found matching the given public key. Verify the correct public key was provided, and a signature was created. Error: no matching signatures: invalid signature when validating ASN.1 encoded signature\n invalid signature when validating ASN.1 encoded signature\n invalid signature when validating ASN.1 encoded signature&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}}],&#34;success&#34;: false}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAENZxkE/d0fKvJ51dXHQmxXaRMTtVz\nBQWcmJD/7pcMDEmBcmk8O1yUPIiFj5TMZqabjS9CQQN+jKHG+Bfi0BYlHg==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:59c6b95c02295edb7928ef187571d26d426993fd5aae0236a03c832afbd6072a&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=67018469815ee9f81e47cfb54dae39d71ed5f389&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:c7303e2d586614e47d7340ff8d7059c98c6c68fc8ca938b3448179fb8009372e&#34;,&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;include&#34;: [&#34;slsa_provenance_available&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-ioyw/dummy-public-key-pzagsmzkkp&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-06T07:12:20.293962361Z&#34;}----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9de664babf1c709d7b136866f9afe440-pod&#39;, container &#39;step-summary&#39;:&#xA;----- START -----{&#xA;  &#34;timestamp&#34;: &#34;1778051543&#34;,&#xA;  &#34;namespace&#34;: &#34;&#34;,&#xA;  &#34;successes&#34;: 0,&#xA;  &#34;failures&#34;: 2,&#xA;  &#34;warnings&#34;: 0,&#xA;  &#34;result&#34;: &#34;FAILURE&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9de664babf1c709d7b136866f9afe440-pod&#39;, container &#39;step-version&#39;:&#xA;----- START -----Version            v0.9.25&#xA;Source ID          b345847182602d9a5ce9e957fa76fe02575c8018&#xA;Change date        2026-04-27 12:52:43 +0000 UTC (1 week ago)&#xA;ECC                v0.1.7&#xA;OPA                v1.15.2&#xA;Conftest           v0.68.2&#xA;Cosign             v3.0.4&#xA;Sigstore           v1.10.4&#xA;Rekor              v1.5.0&#xA;Tekton Pipeline    v1.9.2&#xA;Kubernetes Client  v0.35.0&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9de664babf1c709d7b136866f9afe440-pod&#39;, container &#39;step-show-config&#39;:&#xA;----- START -----{&#xA;  &#34;policy&#34;: {&#xA;    &#34;name&#34;: &#34;Default&#34;,&#xA;    &#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#xA;    &#34;sources&#34;: [&#xA;      {&#xA;        &#34;name&#34;: &#34;Default&#34;,&#xA;        &#34;policy&#34;: [&#xA;          &#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:59c6b95c02295edb7928ef187571d26d426993fd5aae0236a03c832afbd6072a&#34;&#xA;        ],&#xA;        &#34;data&#34;: [&#xA;          &#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=67018469815ee9f81e47cfb54dae39d71ed5f389&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:c7303e2d586614e47d7340ff8d7059c98c6c68fc8ca938b3448179fb8009372e&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;&#xA;        ],&#xA;        &#34;config&#34;: {&#xA;          &#34;include&#34;: [&#xA;            &#34;slsa_provenance_available&#34;&#xA;          ]&#xA;        }&#xA;      }&#xA;    ],&#xA;    &#34;publicKey&#34;: &#34;k8s://chains-e2e-ioyw/dummy-public-key-pzagsmzkkp&#34;&#xA;  },&#xA;  &#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAENZxkE/d0fKvJ51dXHQmxXaRMTtVz\nBQWcmJD/7pcMDEmBcmk8O1yUPIiFj5TMZqabjS9CQQN+jKHG+Bfi0BYlHg==\n-----END PUBLIC KEY-----\n&#34;,&#xA;  &#34;effective-time&#34;: &#34;2026-05-06T07:12:20.293962361Z&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9de664babf1c709d7b136866f9afe440-pod&#39;, container &#39;step-detailed-report&#39;:&#xA;----- START -----Success: false&#xA;Result: FAILURE&#xA;Violations: 2, Warnings: 0, Successes: 0&#xA;Component: &#xA;ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#xA;&#xA;Results:&#xA;✕ [Violation] builtin.attestation.signature_check&#xA;  ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#xA;  Reason: No image attestations found matching the given public key. Verify the correct public key was provided, and one or more&#xA;  attestations were created. Error: no matching attestations: accepted signatures do not match threshold, Found: 0, Expected 1&#xA;  Title: Attestation signature check passed&#xA;  Description: The attestation signature matches available signing materials.&#xA;&#xA;✕ [Violation] builtin.image.signature_check&#xA;  ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:c7ee23e9a9dfade19e9ee69e99de27d044b1dde095377e7868975a53ccfeeca9&#xA;  Reason: No image signatures found matching the given public key. Verify the correct public key was provided, and a signature was&#xA;  created. Error: no matching signatures: invalid signature when validating ASN.1 encoded signature&#xA;   invalid signature when validating ASN.1 encoded signature&#xA;   invalid signature when validating ASN.1 encoded signature&#xA;  Title: Image signature check passed&#xA;  Description: The image signature matches available signing materials.&#xA;&#xA;For more information about policy issues, see the policy documentation: https://conforma.dev/docs/policy/&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9de664babf1c709d7b136866f9afe440-pod&#39;, container &#39;step-assert&#39;:&#xA;----- START -----false&#xA;----- END -----&#xA;Make sure TaskRun verify-enterprise-contract of PipelineRun verify-enterprise-contract-run-rqb9w failed&#xA;&lt; Exit [It] fails when unexpected signature is used - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:251 @ 05/06/26 07:12:27.745 (18.251s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:12:27.746&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:12:27.746 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task ec-cli command verifies ec cli has error handling [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="17.180623776">
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:12:27.747&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:12:27.768 (21ms)&#xA;&gt; Enter [It] verifies ec cli has error handling - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:279 @ 05/06/26 07:12:27.768&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-lmzq4&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-lmzq4&#34; to finish&#xA;*** Logs from pod &#39;verify-enterprise-contract-0b6ca3de2eb7dc95c0cfbcd03889b758-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: false,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:f1f3150e87adfcf44f0ea5fa468d4fe93b80e2c0d49ee31580407a5f1208d0a2&#34;,&#34;source&#34;: {},&#34;violations&#34;: [{&#34;msg&#34;: &#34;No image attestations found matching the given public key. Verify the correct public key was provided, and one or more attestations were created. Error: no matching attestations: accepted signatures do not match threshold, Found: 0, Expected 1&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;No image signatures found matching the given public key. Verify the correct public key was provided, and a signature was created. Error: no matching signatures: invalid signature when validating ASN.1 encoded signature&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}}],&#34;success&#34;: false},{&#34;name&#34;: &#34;-sha256:c100497badd3edd2f02b294411b511396e71caf701f4df45db448e6cdbc686b0-amd64&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:c100497badd3edd2f02b294411b511396e71caf701f4df45db448e6cdbc686b0&#34;,&#34;source&#34;: {},&#34;violations&#34;: [{&#34;msg&#34;: &#34;No image attestations found matching the given public key. Verify the correct public key was provided, and one or more attestations were created. Error: no matching attestations: accepted signatures do not match threshold, Found: 0, Expected 1&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;No image signatures found matching the given public key. Verify the correct public key was provided, and a signature was created. Error: no matching signatures: invalid signature when validating ASN.1 encoded signature\n invalid signature when validating ASN.1 encoded signature&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}}],&#34;success&#34;: false},{&#34;name&#34;: &#34;-sha256:9024c5db8db1fa036f7c56020829f0e239db7b660d5e5f6439af84ab66489d63-arm64&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:9024c5db8db1fa036f7c56020829f0e239db7b660d5e5f6439af84ab66489d63&#34;,&#34;source&#34;: {},&#34;violations&#34;: [{&#34;msg&#34;: &#34;No image attestations found matching the given public key. Verify the correct public key was provided, and one or more attestations were created. Error: no matching attestations: accepted signatures do not match threshold, Found: 0, Expected 1&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;No image signatures found matching the given public key. Verify the correct public key was provided, and a signature was created. Error: no matching signatures: invalid signature when validating ASN.1 encoded signature\n invalid signature when validating ASN.1 encoded signature&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}}],&#34;success&#34;: false}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEF1KPrbmgPwizdb09V4Tx2cuolTkR\n7bvG0CNUnt8llVgeI3i8FwpJavDhEIhOOd+Ug62XZMEQJkhn0x9upJLjbw==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:59c6b95c02295edb7928ef187571d26d426993fd5aae0236a03c832afbd6072a&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=67018469815ee9f81e47cfb54dae39d71ed5f389&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:c7303e2d586614e47d7340ff8d7059c98c6c68fc8ca938b3448179fb8009372e&#34;,&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;include&#34;: [&#34;slsa_provenance_available&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-ioyw/cosign-public-key&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-06T07:12:37.516295268Z&#34;}----- END -----&#xA;&lt; Exit [It] verifies ec cli has error handling - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:279 @ 05/06/26 07:12:44.927 (17.159s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:12:44.927&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:12:44.927 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task ec-cli command verifies ec validate accepts a list of image references [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="19.207279009">
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:12:44.928&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:12:44.96 (33ms)&#xA;&gt; Enter [It] verifies ec validate accepts a list of image references - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:301 @ 05/06/26 07:12:44.961&#xA;Update public key to verify golden images&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-b6sfp&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-b6sfp&#34; to finish&#xA;*** Logs from pod &#39;verify-enterprise-contract-03562da93b75aafc862450e925d99e09-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: true,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:f1f3150e87adfcf44f0ea5fa468d4fe93b80e2c0d49ee31580407a5f1208d0a2&#34;,&#34;source&#34;: {},&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.known_attestation_type&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.pipelinerun_attestation_found&#34;],&#34;description&#34;: &#34;Confirm the attestation found for the image has a known attestation type.&#34;,&#34;title&#34;: &#34;Known attestation type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.pipelinerun_attestation_found&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;description&#34;: &#34;Confirm at least one PipelineRun attestation is present.&#34;,&#34;title&#34;: &#34;PipelineRun attestation found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.allowed_builder_ids_provided&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_builder_ids` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed builder IDs provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_accepted&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set to one of the values in the `allowed_builder_ids` rule data, e.g. \&#34;https://tekton.dev/chains/v2\&#34;.&#34;,&#34;title&#34;: &#34;SLSA Builder ID is known and accepted&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set.&#34;,&#34;title&#34;: &#34;SLSA Builder ID found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_script_used&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicate.buildConfig.tasks.steps attribute for the task responsible for building and pushing the image is not empty.&#34;,&#34;title&#34;: &#34;Build task contains steps&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_task_image_results_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm that a build task exists and it has the expected IMAGE_DIGEST and IMAGE_URL task results.&#34;,&#34;title&#34;: &#34;Build task set image digest and url task results&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.subject_build_task_matches&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify the subject of the attestations matches the IMAGE_DIGEST and IMAGE_URL values from the build task.&#34;,&#34;title&#34;: &#34;Provenance subject matches build task image result&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.allowed_predicate_types_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_predicate_types` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed predicate types provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.attestation_predicate_type_accepted&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicateType field of the attestation indicates the in-toto SLSA Provenance format was used to attest the PipelineRun.&#34;,&#34;title&#34;: &#34;Expected attestation predicate type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.attested_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Attestation contains source reference.&#34;,&#34;title&#34;: &#34;Source reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.expected_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the provided source code reference is the one being attested.&#34;,&#34;title&#34;: &#34;Expected source code reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.rule_data_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the expected rule data keys have been provided in the expected format. The keys are `supported_vcs` and `supported_digests`.&#34;,&#34;title&#34;: &#34;Rule data provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_format_okay&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm at least one entry in the predicate.materials array of the attestation contains the expected attributes: uri and digest.sha1.&#34;,&#34;title&#34;: &#34;Materials have uri and digest&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_include_git_sha&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that each entry in the predicate.materials array with a SHA-1 digest includes a valid Git commit SHA.&#34;,&#34;title&#34;: &#34;Materials include git commit shas&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_uri_is_git_repo&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure each entry in the predicate.materials array with a SHA-1 digest includes a valid Git URI.&#34;,&#34;title&#34;: &#34;Material uri is a git repo&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.pipeline_has_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that at least one Task is present in the PipelineRun attestation.&#34;,&#34;title&#34;: &#34;Pipeline run includes at least one task&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.successful_pipeline_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;tasks.pipeline_has_tasks&#34;],&#34;description&#34;: &#34;Ensure that all of the Tasks in the Pipeline completed successfully. Note that skipped Tasks are not taken into account and do not influence the outcome.&#34;,&#34;title&#34;: &#34;Successful pipeline tasks&#34;}}],&#34;success&#34;: true,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIBq18yWVAorXyPPujnxOZ8mHF27hiJQ6EAno4Tjv33YSAiAcU67ZBZRjdijTh/A/83Fk9Ixw85yDTJBi/oDjYPGgMA==&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:IhiN7gY+Z3uSSd7tmj6w5Zfhqafzdhm3DZjIvGc6iYY&#34;,&#34;sig&#34;: &#34;MEUCIB3dH/CuxExH77jGOhngRyCwsNeug1KyBLQKKWqW0qF/AiEAw8EQ0dR5hgbJ/tlxqAA33VypQMBitTw6kMhgcR8Z/kM=&#34;}]}]},{&#34;name&#34;: &#34;-sha256:c100497badd3edd2f02b294411b511396e71caf701f4df45db448e6cdbc686b0-amd64&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:c100497badd3edd2f02b294411b511396e71caf701f4df45db448e6cdbc686b0&#34;,&#34;source&#34;: {},&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.known_attestation_type&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#xA;&#34;depends_on&#34;: [&#34;attestation_type.pipelinerun_attestation_found&#34;],&#34;description&#34;: &#34;Confirm the attestation found for the image has a known attestation type.&#34;,&#34;title&#34;: &#34;Known attestation type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.pipelinerun_attestation_found&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;description&#34;: &#34;Confirm at least one PipelineRun attestation is present.&#34;,&#34;title&#34;: &#34;PipelineRun attestation found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.allowed_builder_ids_provided&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_builder_ids` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed builder IDs provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_accepted&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set to one of the values in the `allowed_builder_ids` rule data, e.g. \&#34;https://tekton.dev/chains/v2\&#34;.&#34;,&#34;title&#34;: &#34;SLSA Builder ID is known and accepted&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set.&#34;,&#34;title&#34;: &#34;SLSA Builder ID found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_script_used&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicate.buildConfig.tasks.steps attribute for the task responsible for building and pushing the image is not empty.&#34;,&#34;title&#34;: &#34;Build task contains steps&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_task_image_results_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm that a build task exists and it has the expected IMAGE_DIGEST and IMAGE_URL task results.&#34;,&#34;title&#34;: &#34;Build task set image digest and url task results&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.subject_build_task_matches&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify the subject of the attestations matches the IMAGE_DIGEST and IMAGE_URL values from the build task.&#34;,&#34;title&#34;: &#34;Provenance subject matches build task image result&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.allowed_predicate_types_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_predicate_types` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed predicate types provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.attestation_predicate_type_accepted&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicateType field of the attestation indicates the in-toto SLSA Provenance format was used to attest the PipelineRun.&#34;,&#34;title&#34;: &#34;Expected attestation predicate type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.attested_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Attestation contains source reference.&#34;,&#34;title&#34;: &#34;Source reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.expected_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the provided source code reference is the one being attested.&#34;,&#34;title&#34;: &#34;Expected source code reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.rule_data_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the expected rule data keys have been provided in the expected format. The keys are `supported_vcs` and `supported_digests`.&#34;,&#34;title&#34;: &#34;Rule data provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_format_okay&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm at least one entry in the predicate.materials array of the attestation contains the expected attributes: uri and digest.sha1.&#34;,&#34;title&#34;: &#34;Materials have uri and digest&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_include_git_sha&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that each entry in the predicate.materials array with a SHA-1 digest includes a valid Git commit SHA.&#34;,&#34;title&#34;: &#34;Materials include git commit shas&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_uri_is_git_repo&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure each entry in the predicate.materials array with a SHA-1 digest includes a valid Git URI.&#34;,&#34;title&#34;: &#34;Material uri is a git repo&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.pipeline_has_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that at least one Task is present in the PipelineRun attestation.&#34;,&#34;title&#34;: &#34;Pipeline run includes at least one task&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.successful_pipeline_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;tasks.pipeline_has_tasks&#34;],&#34;description&#34;: &#34;Ensure that all of the Tasks in the Pipeline completed successfully. Note that skipped Tasks are not taken into account and do not influence the outcome.&#34;,&#34;title&#34;: &#34;Successful pipeline tasks&#34;}}],&#34;success&#34;: true,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIHxTtFk2bdTapnn7KctPkokRxcv93bMICQzKn39JKl0LAiBCxnJjATuj6BTcqLlA8wMoi6veCojTO4/4C5LttuGMHA==&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEYCIQC+dYCC62hMKwiuaN96kH3W0IDnI3Q0dORmRturzbbB4wIhAMZtr0VklbfgVlU56eO49dlwq8pKtye2zerYiC8NazW4&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:IhiN7gY+Z3uSSd7tmj6w5Zfhqafzdhm3DZjIvGc6iYY&#34;,&#34;sig&#34;: &#34;MEUCIB3dH/CuxExH77jGOhngRyCwsNeug1KyBLQKKWqW0qF/AiEAw8EQ0dR5hgbJ/tlxqAA33VypQMBitTw6kMhgcR8Z/kM=&#34;}]}]},{&#34;name&#34;: &#34;-sha256:9024c5db8db1fa036f7c56020829f0e239db7b660d5e5f6439af84ab66489d63-arm64&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:9024c5db8db1fa036f7c56020829f0e239db7b660d5e5f6439af84ab66489d63&#34;,&#34;source&#34;: {},&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.known_attestation_type&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.pipelinerun_attestation_found&#34;],&#34;description&#34;: &#34;Confirm the attestation found for the image has a known attestation type.&#34;,&#34;title&#34;: &#34;Known attestation type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#xA;&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.pipelinerun_attestation_found&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;description&#34;: &#34;Confirm at least one PipelineRun attestation is present.&#34;,&#34;title&#34;: &#34;PipelineRun attestation found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.allowed_builder_ids_provided&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_builder_ids` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed builder IDs provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_accepted&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set to one of the values in the `allowed_builder_ids` rule data, e.g. \&#34;https://tekton.dev/chains/v2\&#34;.&#34;,&#34;title&#34;: &#34;SLSA Builder ID is known and accepted&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set.&#34;,&#34;title&#34;: &#34;SLSA Builder ID found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_script_used&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicate.buildConfig.tasks.steps attribute for the task responsible for building and pushing the image is not empty.&#34;,&#34;title&#34;: &#34;Build task contains steps&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_task_image_results_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm that a build task exists and it has the expected IMAGE_DIGEST and IMAGE_URL task results.&#34;,&#34;title&#34;: &#34;Build task set image digest and url task results&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.subject_build_task_matches&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify the subject of the attestations matches the IMAGE_DIGEST and IMAGE_URL values from the build task.&#34;,&#34;title&#34;: &#34;Provenance subject matches build task image result&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.allowed_predicate_types_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_predicate_types` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed predicate types provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.attestation_predicate_type_accepted&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicateType field of the attestation indicates the in-toto SLSA Provenance format was used to attest the PipelineRun.&#34;,&#34;title&#34;: &#34;Expected attestation predicate type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.attested_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Attestation contains source reference.&#34;,&#34;title&#34;: &#34;Source reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.expected_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the provided source code reference is the one being attested.&#34;,&#34;title&#34;: &#34;Expected source code reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.rule_data_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the expected rule data keys have been provided in the expected format. The keys are `supported_vcs` and `supported_digests`.&#34;,&#34;title&#34;: &#34;Rule data provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_format_okay&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm at least one entry in the predicate.materials array of the attestation contains the expected attributes: uri and digest.sha1.&#34;,&#34;title&#34;: &#34;Materials have uri and digest&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_include_git_sha&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that each entry in the predicate.materials array with a SHA-1 digest includes a valid Git commit SHA.&#34;,&#34;title&#34;: &#34;Materials include git commit shas&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_uri_is_git_repo&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure each entry in the predicate.materials array with a SHA-1 digest includes a valid Git URI.&#34;,&#34;title&#34;: &#34;Material uri is a git repo&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.pipeline_has_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that at least one Task is present in the PipelineRun attestation.&#34;,&#34;title&#34;: &#34;Pipeline run includes at least one task&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.successful_pipeline_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;tasks.pipeline_has_tasks&#34;],&#34;description&#34;: &#34;Ensure that all of the Tasks in the Pipeline completed successfully. Note that skipped Tasks are not taken into account and do not influence the outcome.&#34;,&#34;title&#34;: &#34;Successful pipeline tasks&#34;}}],&#34;success&#34;: true,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIFQ78YKKqW5FcHcpAdeQwKgDS/Mo7tWGNvEsIaFU+8gaAiBaGO5O2kkl2eEedoP4ZiBaS720B45IeoIObcy+IgqRyQ==&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIHYpELtYjBZyeFW0mhT81Ko6wYTTi+Kr1iwU+pPtxOxeAiB6BJKk+Tmh9gdvkDL2snwVXBsjmPwd0rUaPseGWVHzCQ==&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:IhiN7gY+Z3uSSd7tmj6w5Zfhqafzdhm3DZjIvGc6iYY&#34;,&#34;sig&#34;: &#34;MEUCIB3dH/CuxExH77jGOhngRyCwsNeug1KyBLQKKWqW0qF/AiEAw8EQ0dR5hgbJ/tlxqAA33VypQMBitTw6kMhgcR8Z/kM=&#34;}]}]},{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:304040ca1911aa4d911bd7c6d6d07193c57dc49dbc43e63828b42ab204fb1b25&#34;,&#34;source&#34;: {},&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.known_attestation_type&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.pipelinerun_attestation_found&#34;],&#34;description&#34;: &#34;Confirm the attestation found for the image has a known attestation type.&#34;,&#34;title&#34;: &#34;Known attestation type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.pipelinerun_attestation_found&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;description&#34;: &#34;Confirm at least one PipelineRun attestation is present.&#34;,&#34;title&#34;: &#34;PipelineRun attestation found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#xA;&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.allowed_builder_ids_provided&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_builder_ids` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed builder IDs provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_accepted&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set to one of the values in the `allowed_builder_ids` rule data, e.g. \&#34;https://tekton.dev/chains/v2\&#34;.&#34;,&#34;title&#34;: &#34;SLSA Builder ID is known and accepted&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set.&#34;,&#34;title&#34;: &#34;SLSA Builder ID found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_script_used&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicate.buildConfig.tasks.steps attribute for the task responsible for building and pushing the image is not empty.&#34;,&#34;title&#34;: &#34;Build task contains steps&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_task_image_results_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm that a build task exists and it has the expected IMAGE_DIGEST and IMAGE_URL task results.&#34;,&#34;title&#34;: &#34;Build task set image digest and url task results&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.subject_build_task_matches&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify the subject of the attestations matches the IMAGE_DIGEST and IMAGE_URL values from the build task.&#34;,&#34;title&#34;: &#34;Provenance subject matches build task image result&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.allowed_predicate_types_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_predicate_types` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed predicate types provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.attestation_predicate_type_accepted&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicateType field of the attestation indicates the in-toto SLSA Provenance format was used to attest the PipelineRun.&#34;,&#34;title&#34;: &#34;Expected attestation predicate type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.attested_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Attestation contains source reference.&#34;,&#34;title&#34;: &#34;Source reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.expected_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the provided source code reference is the one being attested.&#34;,&#34;title&#34;: &#34;Expected source code reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.rule_data_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the expected rule data keys have been provided in the expected format. The keys are `supported_vcs` and `supported_digests`.&#34;,&#34;title&#34;: &#34;Rule data provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_format_okay&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm at least one entry in the predicate.materials array of the attestation contains the expected attributes: uri and digest.sha1.&#34;,&#34;title&#34;: &#34;Materials have uri and digest&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_include_git_sha&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that each entry in the predicate.materials array with a SHA-1 digest includes a valid Git commit SHA.&#34;,&#34;title&#34;: &#34;Materials include git commit shas&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_uri_is_git_repo&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure each entry in the predicate.materials array with a SHA-1 digest includes a valid Git URI.&#34;,&#34;title&#34;: &#34;Material uri is a git repo&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.pipeline_has_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that at least one Task is present in the PipelineRun attestation.&#34;,&#34;title&#34;: &#34;Pipeline run includes at least one task&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.successful_pipeline_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;tasks.pipeline_has_tasks&#34;],&#34;description&#34;: &#34;Ensure that all of the Tasks in the Pipeline completed successfully. Note that skipped Tasks are not taken into account and do not influence the outcome.&#34;,&#34;title&#34;: &#34;Successful pipeline tasks&#34;}}],&#34;success&#34;: true,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEUCIQD86lmOqCovYZDPKm0XxxsLgDQcFIFAv+QZxrFSHmCvQAIgTd1I005ox8MfABqsAen6PZEyg2MCEQNBCx1NLS3V0JQ=&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1beta1/TaskRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:IhiN7gY+Z3uSSd7tmj6w5Zfhqafzdhm3DZjIvGc6iYY&#34;,&#34;sig&#34;: &#34;MEUCIQDcgZIwEkLFqD7U9HrobgEC8Jo7wm+xJ5AoyO3qg+aj8QIgb9xDpjYGRMmpVk+QATeVKlHonzBiu51HtT3J+lQXPXc=&#34;}]},{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1beta1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:IhiN7gY+Z3uSSd7tmj6w5Zfhqafzdhm3DZjIvGc6iYY&#34;,&#34;sig&#34;: &#34;MEYCIQDKSihaAR/zAhJhR5GCqleDvfUUtvRw61vk0YeTBAnOSQIhAKa09B4yEfaSJronmWBFbu5cVPNxm17CMl/PElEz1POa&#34;}]}]}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEZP/0htjhVt2y0ohjgtIIgICOtQtA\nnaYJRuLprwIv6FDhZ5yFjYUEtsmoNcW7rx2KM6FOXGsCX3BNc7qhHELT+g==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:59c6b95c02295edb7928ef187571d26d426993fd5aae0236a03c832afbd6072a&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=67018469815ee9f81e47cfb54dae39d71ed5f389&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:c7303e2d586614e47d7340ff8d7059c98c6c68fc8ca938b3448179fb8009372e&#34;,&#xA;&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;exclude&#34;: [&#34;slsa_source_correlated.source_code_reference_provided&#34;],&#34;include&#34;: [&#34;@slsa3&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-ioyw/golden-image-public-keydhabltgfvn&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-06T07:12:51.867963036Z&#34;}----- END -----&#xA;&lt; Exit [It] verifies ec validate accepts a list of image references - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:301 @ 05/06/26 07:13:04.135 (19.174s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:13:04.135&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:13:04.135 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies redhat products pass the redhat policy rule collection before release  [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="29.171163488">
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:13:04.136&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:13:04.163 (27ms)&#xA;&gt; Enter [It] verifies redhat products pass the redhat policy rule collection before release  - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:345 @ 05/06/26 07:13:04.163&#xA;Update public key to verify golden images&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-rjr2l&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-rjr2l&#34; to finish&#xA;&lt; Exit [It] verifies redhat products pass the redhat policy rule collection before release  - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:345 @ 05/06/26 07:13:33.306 (29.144s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:13:33.307&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:13:33.307 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies the release policy: Task are trusted [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="14.168411604">
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:13:33.307&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:13:33.333 (26ms)&#xA;&gt; Enter [It] verifies the release policy: Task are trusted - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:382 @ 05/06/26 07:13:33.333&#xA;Update public key to verify golden images&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-58hcj&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-58hcj&#34; to finish&#xA;*** Logs from pod &#39;verify-enterprise-contract-8cd5662171c10e664b18311acc110803-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: false,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:304040ca1911aa4d911bd7c6d6d07193c57dc49dbc43e63828b42ab204fb1b25&#34;,&#34;source&#34;: {},&#34;violations&#34;: [{&#34;msg&#34;: &#34;PipelineTask \&#34;build-container\&#34; uses an untrusted task reference: oci://quay.io/redhat-appstudio-tekton-catalog/task-buildah:0.1@sha256:c3712257615d206ef40013bf1c5c681670fc8f7fd6aac9fa4c86f7afeff627ef. Please upgrade the task version to: sha256:73628c0497b9d1fb068dffb997cf7bea57ed6dfa04e892abf1d6fc7f6828050a&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.trusted&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Check the trust of the Tekton Tasks used in the build Pipeline. There are two modes in which trust is verified. The first mode is used if Trusted Artifacts are enabled. In this case, a chain of trust is established for all the Tasks involved in creating an artifact. If the chain contains an untrusted Task, then a violation is emitted. The second mode is used as a fallback when Trusted Artifacts are not enabled. In this case, **all** Tasks in the build Pipeline must be trusted. To exclude this rule add \&#34;trusted_task.trusted:buildah\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;If using Trusted Artifacts, be sure every Task in the build Pipeline responsible for producing a Trusted Artifact is trusted. Otherwise, ensure **all** Tasks in the build Pipeline are trusted. Note that trust is eventually revoked from Tasks when newer versions are made available.&#34;,&#34;term&#34;: &#34;buildah&#34;,&#34;title&#34;: &#34;Tasks are trusted&#34;}},{&#34;msg&#34;: &#34;PipelineTask \&#34;clair-scan\&#34; uses an untrusted task reference: oci://quay.io/redhat-appstudio-tekton-catalog/task-clair-scan:0.1@sha256:fba8170329ab00b864ee7d16e0358df4c4386880e10894fd7bbbb1457112477b. Please upgrade the task version to: sha256:d3af2290595378de7f8bc73b54aa7a5fac793090e2cef4f1822d31e18a64761f&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.trusted&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Check the trust of the Tekton Tasks used in the build Pipeline. There are two modes in which trust is verified. The first mode is used if Trusted Artifacts are enabled. In this case, a chain of trust is established for all the Tasks involved in creating an artifact. If the chain contains an untrusted Task, then a violation is emitted. The second mode is used as a fallback when Trusted Artifacts are not enabled. In this case, **all** Tasks in the build Pipeline must be trusted. To exclude this rule add \&#34;trusted_task.trusted:clair-scan\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;If using Trusted Artifacts, be sure every Task in the build Pipeline responsible for producing a Trusted Artifact is trusted. Otherwise, ensure **all** Tasks in the build Pipeline are trusted. Note that trust is eventually revoked from Tasks when newer versions are made available.&#34;,&#34;term&#34;: &#34;clair-scan&#34;,&#34;title&#34;: &#34;Tasks are trusted&#34;}},{&#34;msg&#34;: &#34;PipelineTask \&#34;clamav-scan\&#34; uses an untrusted task reference: oci://quay.io/redhat-appstudio-tekton-catalog/task-clamav-scan:0.1@sha256:28b425322aa84f988c6c4f8d503787b3fb301668b2ad6728846b8f8c45ba012b. Please upgrade the task version to: sha256:1b186d53eeab12f0ae1b7aa333e9cf2b2c9dcc9751f5e940ca935a168bba5a7d&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.trusted&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Check the trust of the Tekton Tasks used in the build Pipeline. There are two modes in which trust is verified. The first mode is used if Trusted Artifacts are enabled. In this case, a chain of trust is established for all the Tasks involved in creating an artifact. If the chain contains an untrusted Task, then a violation is emitted. The second mode is used as a fallback when Trusted Artifacts are not enabled. In this case, **all** Tasks in the build Pipeline must be trusted. To exclude this rule add \&#34;trusted_task.trusted:clamav-scan\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;If using Trusted Artifacts, be sure every Task in the build Pipeline responsible for producing a Trusted Artifact is trusted. Otherwise, ensure **all** Tasks in the build Pipeline are trusted. Note that trust is eventually revoked from Tasks when newer versions are made available.&#34;,&#34;term&#34;: &#34;clamav-scan&#34;,&#34;title&#34;: &#34;Tasks are trusted&#34;}},{&#34;msg&#34;: &#34;PipelineTask \&#34;deprecated-base-image-check\&#34; uses an untrusted task reference: oci://quay.io/redhat-appstudio-tekton-catalog/task-deprecated-image-check:0.1@sha256:28d724dd6f6c365b2a839d9e52baac91559fd78c160774769c1ec724301f78d4. Please upgrade the task version to: sha256:409efc4464663225f96518776b3811c31ea4e988a18493a3114eedf01e0a0a17&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.trusted&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Check the trust of the Tekton Tasks used in the build Pipeline. There are two modes in which trust is verified. The first mode is used if Trusted Artifacts are enabled. In this case, a chain of trust is established for all the Tasks involved in creating an artifact. If the chain contains an untrusted Task, then a violation is emitted. The second mode is used as a fallback when Trusted Artifacts are not enabled. In this case, **all** Tasks in the build Pipeline must be trusted. To exclude this rule add \&#34;trusted_task.trusted:deprecated-image-check\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;If using Trusted Artifacts, be sure every Task in the build Pipeline responsible for producing a Trusted Artifact is trusted. Otherwise, ensure **all** Tasks in the build Pipeline are trusted. Note that trust is eventually revoked from Tasks when newer versions are made available.&#34;,&#34;term&#34;: &#34;deprecated-image-check&#34;,&#34;title&#34;: &#34;Tasks are trusted&#34;}},{&#34;msg&#34;: &#34;PipelineTask \&#34;clone-repository\&#34; uses an untrusted task reference: oci://quay.io/redhat-appstudio-tekton-catalog/task-git-clone:0.1@sha256:f4e37778cba00296606ddfbc1c58181330899cafcaa1ee41c75a7cf8bed312f0. Please upgrade the task version to: sha256:2175fdd1ab932727d7a539ef260f32a127a004c61257f974ffaf23863763de9b&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.trusted&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Check the trust of the Tekton Tasks used in the build Pipeline. There are two modes in which trust is verified. The first mode is used if Trusted Artifacts are enabled. In this case, a chain of trust is established for all the Tasks involved in creating an artifact. If the chain contains an untrusted Task, then a violation is emitted. The second mode is used as a fallback when Trusted Artifacts are not enabled. In this case, **all** Tasks in the build Pipeline must be trusted. To exclude this rule add \&#34;trusted_task.trusted:git-clone\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;If using Trusted Artifacts, be sure every Task in the build Pipeline responsible for producing a Trusted Artifact is trusted. Otherwise, ensure **all** Tasks in the build Pipeline are trusted. Note that trust is eventually revoked from Tasks when newer versions are made available.&#34;,&#34;term&#34;: &#34;git-clone&#34;,&#34;title&#34;: &#34;Tasks are trusted&#34;}},{&#34;msg&#34;: &#34;PipelineTask \&#34;init\&#34; uses an untrusted task reference: oci://quay.io/redhat-appstudio-tekton-catalog/task-init:0.1@sha256:5ce77110e2a49407a69a7922042dc0859f7e8f5f75dc0cd0bcc2d17860469bdb. Please upgrade the task version to: sha256:60e0a74b7f4b1166cb62672d6b6f262b4284b20ade9157a387b4a52283ccada8&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.trusted&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Check the trust of the Tekton Tasks used in the build Pipeline. There are two modes in which trust is verified. The first mode is used if Trusted Artifacts are enabled. In this case, a chain of trust is established for all the Tasks involved in creating an artifact. If the chain contains an untrusted Task, then a violation is emitted. The second mode is used as a fallback when Trusted Artifacts are not enabled. In this case, **all** Tasks in the build Pipeline must be trusted. To exclude this rule add \&#34;trusted_task.trusted:init\&#34; to the `exclude` section of the policy configuration.&#34;,&#xA;&#34;solution&#34;: &#34;If using Trusted Artifacts, be sure every Task in the build Pipeline responsible for producing a Trusted Artifact is trusted. Otherwise, ensure **all** Tasks in the build Pipeline are trusted. Note that trust is eventually revoked from Tasks when newer versions are made available.&#34;,&#34;term&#34;: &#34;init&#34;,&#34;title&#34;: &#34;Tasks are trusted&#34;}},{&#34;msg&#34;: &#34;PipelineTask \&#34;sanity-inspect-image\&#34; uses an untrusted task reference: oci://quay.io/redhat-appstudio-tekton-catalog/task-sanity-inspect-image:0.1@sha256:fd4efd9d12eea3a8d47532c4226e685618845d0ba95abb98e008020243d96301. Please upgrade the task version to: sha256:b9ad0ed56be21c9e3c8e2e636275f92d887e57681c718cd36f117eb6fa547824&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.trusted&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Check the trust of the Tekton Tasks used in the build Pipeline. There are two modes in which trust is verified. The first mode is used if Trusted Artifacts are enabled. In this case, a chain of trust is established for all the Tasks involved in creating an artifact. If the chain contains an untrusted Task, then a violation is emitted. The second mode is used as a fallback when Trusted Artifacts are not enabled. In this case, **all** Tasks in the build Pipeline must be trusted. To exclude this rule add \&#34;trusted_task.trusted:sanity-inspect-image\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;If using Trusted Artifacts, be sure every Task in the build Pipeline responsible for producing a Trusted Artifact is trusted. Otherwise, ensure **all** Tasks in the build Pipeline are trusted. Note that trust is eventually revoked from Tasks when newer versions are made available.&#34;,&#34;term&#34;: &#34;sanity-inspect-image&#34;,&#34;title&#34;: &#34;Tasks are trusted&#34;}},{&#34;msg&#34;: &#34;PipelineTask \&#34;sanity-label-check\&#34; uses an untrusted task reference: oci://quay.io/redhat-appstudio-tekton-catalog/task-sanity-label-check:0.1@sha256:534770bf7a7c10277ab5f9c1e7b766abbffb343cc864dd9545aecc5278257dc3. Please upgrade the task version to: sha256:dd49667be76c81264a7fb28e3b43f72c527507e5691720c6262575255cb60689&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.trusted&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Check the trust of the Tekton Tasks used in the build Pipeline. There are two modes in which trust is verified. The first mode is used if Trusted Artifacts are enabled. In this case, a chain of trust is established for all the Tasks involved in creating an artifact. If the chain contains an untrusted Task, then a violation is emitted. The second mode is used as a fallback when Trusted Artifacts are not enabled. In this case, **all** Tasks in the build Pipeline must be trusted. To exclude this rule add \&#34;trusted_task.trusted:sanity-label-check\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;If using Trusted Artifacts, be sure every Task in the build Pipeline responsible for producing a Trusted Artifact is trusted. Otherwise, ensure **all** Tasks in the build Pipeline are trusted. Note that trust is eventually revoked from Tasks when newer versions are made available.&#34;,&#34;term&#34;: &#34;sanity-label-check&#34;,&#34;title&#34;: &#34;Tasks are trusted&#34;}},{&#34;msg&#34;: &#34;PipelineTask \&#34;sanity-optional-label-check\&#34; uses an untrusted task reference: oci://quay.io/redhat-appstudio-tekton-catalog/task-sanity-label-check:0.1@sha256:534770bf7a7c10277ab5f9c1e7b766abbffb343cc864dd9545aecc5278257dc3. Please upgrade the task version to: sha256:dd49667be76c81264a7fb28e3b43f72c527507e5691720c6262575255cb60689&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.trusted&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Check the trust of the Tekton Tasks used in the build Pipeline. There are two modes in which trust is verified. The first mode is used if Trusted Artifacts are enabled. In this case, a chain of trust is established for all the Tasks involved in creating an artifact. If the chain contains an untrusted Task, then a violation is emitted. The second mode is used as a fallback when Trusted Artifacts are not enabled. In this case, **all** Tasks in the build Pipeline must be trusted. To exclude this rule add \&#34;trusted_task.trusted:sanity-label-check\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;If using Trusted Artifacts, be sure every Task in the build Pipeline responsible for producing a Trusted Artifact is trusted. Otherwise, ensure **all** Tasks in the build Pipeline are trusted. Note that trust is eventually revoked from Tasks when newer versions are made available.&#34;,&#34;term&#34;: &#34;sanity-label-check&#34;,&#34;title&#34;: &#34;Tasks are trusted&#34;}},{&#34;msg&#34;: &#34;PipelineTask \&#34;sbom-json-check\&#34; uses an untrusted task reference: oci://quay.io/redhat-appstudio-tekton-catalog/task-sbom-json-check:0.1@sha256:ce6a0932da9b41080108284d1366fc2de8374fca5137500138e16ad9e04610c6. Please upgrade the task version to: sha256:32a7b681f947179b4df11f2e9f05f27478001247e519fa0b1a211cbf9562a205&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.trusted&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Check the trust of the Tekton Tasks used in the build Pipeline. There are two modes in which trust is verified. The first mode is used if Trusted Artifacts are enabled. In this case, a chain of trust is established for all the Tasks involved in creating an artifact. If the chain contains an untrusted Task, then a violation is emitted. The second mode is used as a fallback when Trusted Artifacts are not enabled. In this case, **all** Tasks in the build Pipeline must be trusted. To exclude this rule add \&#34;trusted_task.trusted:sbom-json-check\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;If using Trusted Artifacts, be sure every Task in the build Pipeline responsible for producing a Trusted Artifact is trusted. Otherwise, ensure **all** Tasks in the build Pipeline are trusted. Note that trust is eventually revoked from Tasks when newer versions are made available.&#34;,&#34;term&#34;: &#34;sbom-json-check&#34;,&#34;title&#34;: &#34;Tasks are trusted&#34;}},{&#34;msg&#34;: &#34;PipelineTask \&#34;show-summary\&#34; uses an untrusted task reference: oci://quay.io/redhat-appstudio-tekton-catalog/task-summary:0.1@sha256:c0f66b28c338426774e34a8d4a00349fbab798b19df5841a95727148d5ef3c65. Please upgrade the task version to: sha256:4d7a2201ce4cb6dca8a48f4d9d4e02d5d3b57ef8eb99009675f1a34f2923ae49&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.trusted&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Check the trust of the Tekton Tasks used in the build Pipeline. There are two modes in which trust is verified. The first mode is used if Trusted Artifacts are enabled. In this case, a chain of trust is established for all the Tasks involved in creating an artifact. If the chain contains an untrusted Task, then a violation is emitted. The second mode is used as a fallback when Trusted Artifacts are not enabled. In this case, **all** Tasks in the build Pipeline must be trusted. To exclude this rule add \&#34;trusted_task.trusted:summary\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;If using Trusted Artifacts, be sure every Task in the build Pipeline responsible for producing a Trusted Artifact is trusted. Otherwise, ensure **all** Tasks in the build Pipeline are trusted. Note that trust is eventually revoked from Tasks when newer versions are made available.&#34;,&#34;term&#34;: &#34;summary&#34;,&#34;title&#34;: &#34;Tasks are trusted&#34;}}],&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}}],&#34;success&#34;: false,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEUCIQD86lmOqCovYZDPKm0XxxsLgDQcFIFAv+QZxrFSHmCvQAIgTd1I005ox8MfABqsAen6PZEyg2MCEQNBCx1NLS3V0JQ=&#34;}],&#34;attestations&#34;: [{&#xA;&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1beta1/TaskRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:IhiN7gY+Z3uSSd7tmj6w5Zfhqafzdhm3DZjIvGc6iYY&#34;,&#34;sig&#34;: &#34;MEUCIQDcgZIwEkLFqD7U9HrobgEC8Jo7wm+xJ5AoyO3qg+aj8QIgb9xDpjYGRMmpVk+QATeVKlHonzBiu51HtT3J+lQXPXc=&#34;}]},{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1beta1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:IhiN7gY+Z3uSSd7tmj6w5Zfhqafzdhm3DZjIvGc6iYY&#34;,&#34;sig&#34;: &#34;MEYCIQDKSihaAR/zAhJhR5GCqleDvfUUtvRw61vk0YeTBAnOSQIhAKa09B4yEfaSJronmWBFbu5cVPNxm17CMl/PElEz1POa&#34;}]}]}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEZP/0htjhVt2y0ohjgtIIgICOtQtA\nnaYJRuLprwIv6FDhZ5yFjYUEtsmoNcW7rx2KM6FOXGsCX3BNc7qhHELT+g==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:59c6b95c02295edb7928ef187571d26d426993fd5aae0236a03c832afbd6072a&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=67018469815ee9f81e47cfb54dae39d71ed5f389&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:c7303e2d586614e47d7340ff8d7059c98c6c68fc8ca938b3448179fb8009372e&#34;,&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;include&#34;: [&#34;trusted_task.trusted&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-ioyw/golden-image-public-keyqreitnosvj&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-06T07:13:38.887053918Z&#34;}----- END -----&#xA;&lt; Exit [It] verifies the release policy: Task are trusted - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:382 @ 05/06/26 07:13:47.475 (14.142s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:13:47.475&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:13:47.475 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies the release policy: Task references are pinned [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="15.130458244">
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:13:47.476&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:154 @ 05/06/26 07:13:47.492 (16ms)&#xA;&gt; Enter [It] verifies the release policy: Task references are pinned - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:422 @ 05/06/26 07:13:47.492&#xA;Update public &lt;key to verify unpinned task image&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-6sk95&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-6sk95&#34; to finish&#xA;*** Logs from pod &#39;verify-enterprise-contract-5cc4ee65bc3048e09ee0c8ff77f3e8e3-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: true,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/enterprise-contract-tests@sha256:c1a2330b0117c4ccd642ba95539a499ae54f0282b124f0514ee57b274d674f10&#34;,&#34;source&#34;: {},&#34;warnings&#34;: [{&#34;msg&#34;: &#34;Pipeline task \&#34;build-container\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-1@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;buildah&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;clamav-scan\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-1@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;clamav-scan&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;appstudio-configure-build\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-1@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;configure-build&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;conftest-clair\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-1@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;conftest-clair&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;deprecated-base-image-check\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-1@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;deprecated-image-check&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;get-clair-results\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-1@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;get-clair-scan&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;clone-repository\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-1@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;git-clone&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;hacbs-test-evaluation\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-1@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;hacbs-test-evaluation&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;appstudio-init\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-1@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;init&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;sanity-inspect-image\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-2@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;sanity-inspect-image&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;sanity-label-check\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-2@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#xA;&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;sanity-label-check&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;sanity-optional-label-check\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-2@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;sanity-label-check&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;sast-go\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-2@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;sast-go&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;sast-java-sec-check\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-2@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;sast-java-sec-check&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;sast-snyk-check\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-2@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;sast-snyk-check&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}},{&#34;msg&#34;: &#34;Pipeline task \&#34;show-summary\&#34; uses an unpinned task reference, oci://quay.io/redhat-appstudio/appstudio-tasks:8be37c13984bc3f8af4d6314d87b1ec5e494b6ca-2@&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;trusted_task.pinned&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;description&#34;: &#34;Check if all Tekton Tasks use a Task definition by a pinned reference. When using the git resolver, a commit ID is expected for the revision parameter. When using the bundles resolver, the bundle parameter is expected to include an image reference with a digest.&#34;,&#34;solution&#34;: &#34;Update the Pipeline definition so that all Task references have a pinned value as mentioned in the description.&#34;,&#34;term&#34;: &#34;summary&#34;,&#34;title&#34;: &#34;Task references are pinned&#34;}}],&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}}],&#34;success&#34;: true,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEYCIQD0M+eFk8KPeOHvC6GNIQkaJGZvtOvvDqBvzi+qYgiS2gIhAP7stpq7Nl9vpF4tjqLC7/gr6t5yXc9Y353Btfe3DcEM&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEUCIDkj9PKADlbayhD4DIUm5SRw2pCzSTeak1dJHAZOyQyQAiEApp4BQneeSKSbKbojFEzeJbVTPGBQrA7QnTzTblnU7nE=&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;https://tekton.dev/attestations/chains@v2&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:w1ABTR6Lt6NlJapY8sIR8F2BvXZ6qn2q+GrC+jWwpqE&#34;,&#34;sig&#34;: &#34;MEQCICXkO7VwYxRHIYd+EbSeIvN+tKMyM4YSZkbUewMSefclAiBCoWnkdF5X4z6rY2YnOlwF5NrrPJh4f/tIvGJe1E3HIQ==&#34;}]},{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;https://tekton.dev/attestations/chains@v2&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:w1ABTR6Lt6NlJapY8sIR8F2BvXZ6qn2q+GrC+jWwpqE&#34;,&#34;sig&#34;: &#34;MEUCIQCmcnxF+boyOwR1RSLnZHUJgGtuQ5y0pm+hBjAhyb9TOwIgTtn/WYNIDWeW9WEALawsVBBtcsdeG91wuwIHpYo2zpc=&#34;}]},{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;https://tekton.dev/attestations/chains/pipelinerun@v2&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:w1ABTR6Lt6NlJapY8sIR8F2BvXZ6qn2q+GrC+jWwpqE&#34;,&#34;sig&#34;: &#34;MEUCIQCrK8Zvo5I45A0j/gvxmsJV30nb6/iQxQVeOMhELH964AIgXm12BtB+JHO5YWoFZAAAR+yMrpgeNBvn5vvVLYoYpHA=&#34;}]}]}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEPfwkY/ru2JRd6FSqIp7lT3gzjaEC\nEAg+paWtlme2KNcostCsmIbwz+bc2aFV+AxCOpRjRpp3vYrbS5KhkmgC1Q==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:59c6b95c02295edb7928ef187571d26d426993fd5aae0236a03c832afbd6072a&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=67018469815ee9f81e47cfb54dae39d71ed5f389&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:c7303e2d586614e47d7340ff8d7059c98c6c68fc8ca938b3448179fb8009372e&#34;,&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;include&#34;: [&#34;trusted_task.pinned&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-ioyw/unpinned-task-bundle-public-keyurpdbswdja&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-06T07:13:54.002995241Z&#34;}----- END -----&#xA;&lt; Exit [It] verifies the release policy: Task references are pinned - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:422 @ 05/06/26 07:14:02.606 (15.114s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:14:02.606&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/enterprise-contract/contract.go:29 @ 05/06/26 07:14:02.606 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created triggers a Build PipelineRun [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="101.387134126">
              <system-err>&gt; Enter [BeforeAll] Gitlab with status reporting of Integration tests in the assosiated merge request - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:45 @ 05/06/26 07:02:05.767&#xA;&lt; Exit [BeforeAll] Gitlab with status reporting of Integration tests in the assosiated merge request - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:45 @ 05/06/26 07:02:46.917 (41.15s)&#xA;&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:109 @ 05/06/26 07:02:46.917&#xA;Image repository for component test-comp-pac-gitlab-numpid in namespace gitlab-rep-bjaj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component test-comp-pac-gitlab-numpid in namespace gitlab-rep-bjaj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:109 @ 05/06/26 07:03:07.055 (20.139s)&#xA;&gt; Enter [It] triggers a Build PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:130 @ 05/06/26 07:03:07.056&#xA;Build PipelineRun has not been created yet for the component gitlab-rep-bjaj/test-comp-pac-gitlab-numpid&#xA;Build PipelineRun has not been created yet for the component gitlab-rep-bjaj/test-comp-pac-gitlab-numpid&#xA;&lt; Exit [It] triggers a Build PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:130 @ 05/06/26 07:03:47.153 (40.098s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:03:47.154&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:03:47.154 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created does not contain an annotation with a Snapshot Name [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000375241">
              <system-err>&gt; Enter [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:144 @ 05/06/26 07:03:47.154&#xA;&lt; Exit [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:144 @ 05/06/26 07:03:47.154 (0s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:03:47.155&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:03:47.155 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created should lead to build PipelineRun finishing successfully [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="743.977823895">
              <system-err>&gt; Enter [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:148 @ 05/06/26 07:03:47.155&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-gwrv6 found for Component gitlab-rep-bjaj/test-comp-pac-gitlab-numpid&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-gwrv6 reason: ResolvingTaskRef&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-gwrv6 reason: Cancelled&#xA;an error happened during storing pipelineRun log gitlab-rep-bjaj:test-comp-pac-gitlab-numpid-on-pull-request-gwrv6: container &#34;prepare&#34; in pod &#34;test-comp-pac-gitlab-numpid-on-pull-request-mvlcd-init-pod&#34; is waiting to start: PodInitializing&#xA;failed to get logs for PipelineRun gitlab-rep-bjaj:test-comp-pac-gitlab-numpid-on-pull-request-gwrv6: container &#34;prepare&#34; in pod &#34;test-comp-pac-gitlab-numpid-on-pull-request-mvlcd-init-pod&#34; is waiting to start: PodInitializing&#xA;attempt 1/3: PipelineRun &#34;test-comp-pac-gitlab-numpid-on-pull-request-gwrv6&#34; failed: &#xA; pod: test-comp-pac-gitlab-numpid-on-pull-request-mvlcd-init-pod | init container: prepare&#xA;New PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 found after retrigger for component gitlab-rep-bjaj/test-comp-pac-gitlab-numpid&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 found for Component gitlab-rep-bjaj/test-comp-pac-gitlab-numpid&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: ResolvingTaskRef&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-mhqr8 reason: Failed&#xA;attempt 2/3: PipelineRun &#34;test-comp-pac-gitlab-numpid-on-pull-request-mhqr8&#34; failed: &#xA; pod: test-comp-pac-gitlab-numpid-on-pull-request-mhqr8-init-pod | init container: prepare&#xA;2026/05/06 07:04:34 Entrypoint initialization&#xA;&#xA;pod: test-comp-pac-gitlab-numpid-on-pull-request-mhqr8-init-pod | container step-init: &#xA;time=&#34;2026-05-06T07:04:37Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-06T07:04:37Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-06T07:04:37Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-06T07:04:37Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-06T07:04:37Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-06T07:04:37Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:04:37Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-06T07:04:37Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-06T07:04:37Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: test-comp-pac-gitlab-numpid-on-pull-request-mvlcd-init-pod | init container: prepare&#xA;2026/05/06 07:04:10 Entrypoint initialization&#xA;&#xA;pod: test-comp-pac-gitlab-numpid-on-pull-request-mvlcd-init-pod | container step-init: &#xA;time=&#34;2026-05-06T07:04:12Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-06T07:04:12Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-06T07:04:12Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-06T07:04:12Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-06T07:04:12Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-06T07:04:12Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:04:12Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-06T07:04:12Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-06T07:04:12Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: test-comp-pac-gitlab-numpid4c4a3706607d6e1d446c06fda6140309-pod | init container: prepare&#xA;2026/05/06 07:09:06 Entrypoint initialization&#xA;&#xA; pod: test-comp-pac-gitlab-numpid4c4a3706607d6e1d446c06fda6140309-pod | init container: place-scripts&#xA;2026/05/06 07:09:07 Decoded script /tekton/scripts/script-0-8ll5l&#xA;2026/05/06 07:09:07 Decoded script /tekton/scripts/script-1-4sdz2&#xA;2026/05/06 07:09:07 Decoded script /tekton/scripts/script-2-2jjc4&#xA;2026/05/06 07:09:07 Decoded script /tekton/scripts/script-3-mt7kh&#xA;2026/05/06 07:09:07 Decoded script /tekton/scripts/script-4-hlj6m&#xA;2026/05/06 07:09:07 Decoded script /tekton/scripts/script-5-2sbmw&#xA;&#xA;pod: test-comp-pac-gitlab-numpid4c4a3706607d6e1d446c06fda6140309-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid:on-pr-3088a88a301aa20bd4aeaef2824009a65fb436be&#xA;The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid:on-pr-3088a88a301aa20bd4aeaef2824009a65fb436be&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: test-comp-pac-gitlab-numpid4c4a3706607d6e1d446c06fda6140309-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid:on-pr-3088a88a301aa20bd4aeaef2824009a65fb436be&#xA;Using token for quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: test-comp-pac-gitlab-numpid4c4a3706607d6e1d446c06fda6140309-pod | container step-set-skip-for-bundles: &#xA;2026/05/06 07:09:13 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: test-comp-pac-gitlab-numpid4c4a3706607d6e1d446c06fda6140309-pod | container step-app-check: &#xA;time=&#34;2026-05-06T07:09:13Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.17.2 &lt;commit: eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&gt;&#34;&#xA;time=&#34;2026-05-06T07:09:13Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid:on-pr-3088a88a301aa20bd4aeaef2824009a65fb436be for platform amd64&#34;&#xA;time=&#34;2026-05-06T07:09:13Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid:on-pr-3088a88a301aa20bd4aeaef2824009a65fb436be&#34;&#xA;time=&#34;2026-05-06T07:09:21Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-3110943014/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-05-06T07:09:21Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-05-06T07:09:21Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-05-06T07:09:21Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-05-06T07:09:21Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages result=PASSED&#xA;time=&#34;2026-05-06T07:09:21Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=PASSED&#xA;time=&#34;2026-05-06T07:09:21Z&#34; level=info msg=&#34;USER 185 specified that is non-root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-06T07:09:21Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=PASSED&#xA;time=&#34;2026-05-06T07:09:30Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-05-06T07:09:30Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=PASSED&#xA;time=&#34;2026-05-06T07:09:30Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-3088a88a301aa20bd4aeaef2824009a65fb436be will be paired with digest sha256:d43206831ebce8c74b49a5483ba53a9d22b3fdcfd89f75be787c566537d82558 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid:on-pr-3088a88a301aa20bd4aeaef2824009a65fb436be&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.17.2&#34;,&#xA;        &#34;commit&#34;: &#34;eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 37,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 8762,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 151,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: []&#xA;    }&#xA;}&#xA;time=&#34;2026-05-06T07:09:30Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;&#xA;pod: test-comp-pac-gitlab-numpid4c4a3706607d6e1d446c06fda6140309-pod | container step-app-set-outcome: &#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1778051370&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid:on-pr-3088a88a301aa20bd4aeaef2824009a65fb436be&#xA;&#xA;pod: test-comp-pac-gitlab-numpid4c4a3706607d6e1d446c06fda6140309-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1778051370&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}&#xA; pod: test-comp-pac-gitlab-numpid5c407873bd66b517d517e1437f4ceabe-pod | init container: prepare&#xA;2026/05/06 07:08:43 Entrypoint initialization&#xA;&#xA; pod: test-comp-pac-gitlab-numpid5c407873bd66b517d517e1437f4ceabe-pod | init container: place-scripts&#xA;2026/05/06 07:09:05 Decoded script /tekton/scripts/script-0-sm7hw&#xA;2026/05/06 07:09:05 Decoded script /tekton/scripts/script-1-th44w&#xA;&#xA;pod: test-comp-pac-gitlab-numpid5c407873bd66b517d517e1437f4ceabe-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid@sha256:d43206831ebce8c74b49a5483ba53a9d22b3fdcfd89f75be787c566537d82558.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 52.026 sec (0 m 52 s)&#xA;Start Date: 2026:05:06 07:09:24&#xA;End Date:   2026:05:06 07:10:16&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27992/Tue May  5 06:26:41 2026 Database version: 27992&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1778051416&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778051416&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778051416&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid:on-pr-3088a88a301aa20bd4aeaef2824009a65fb436be&#34;, &#34;digests&#34;: [&#34;sha256:d43206831ebce8c74b49a5483ba53a9d22b3fdcfd89f75be787c566537d82558&#34;]}}&#xA;&#xA;pod: test-comp-pac-gitlab-numpid5c407873bd66b517d517e1437f4ceabe-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid&#xA;Attaching to quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid:on-pr-3088a88a301aa20bd4aeaef2824009a65fb436be&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid:on-pr-3088a88a301aa20bd4aeaef2824009a65fb436be@sha256:d43206831ebce8c74b49a5483ba53a9d22b3fdcfd89f75be787c566537d82558 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Uploading 5970aef73ef5 clamscan-result-amd64.log&#xA;Uploading bf10ea7901d8 clamscan-ec-test-amd64.json&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploaded  bf10ea7901d8 clamscan-ec-test-amd64.json&#xA;Uploaded  5970aef73ef5 clamscan-result-amd64.log&#xA;Uploading 0c705502812f application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  0c705502812f application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid:on-pr-3088a88a301aa20bd4aeaef2824009a65fb436be@sha256:d43206831ebce8c74b49a5483ba53a9d22b3fdcfd89f75be787c566537d82558&#xA;Digest: sha256:0c705502812f3aad717b91e26554c4c4007493ea98ef6fae5ad23e0528ee266f&#xA;&#xA; pod: test-comp-pac-gitlab-numpid97629d0c74bd490dfdc6bb5a889c6946-pod | init container: prepare&#xA;2026/05/06 07:08:27 Entrypoint initialization&#xA;&#xA;pod: test-comp-pac-gitlab-numpid97629d0c74bd490dfdc6bb5a889c6946-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-05-06T07:08:29Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/gitlab-rep-bjaj/test-comp-pac-gitlab-numpid:on-pr-3088a88a301aa20bd4aeaef2824009a65fb436be&#34;&#xA;time=&#34;2026-05-06T07:08:29Z&#34; level=info msg=&#34;[param] digest: sha256:d43206831ebce8c74b49a5483ba53a9d22b3fdcfd89f75be787c566537d82558&#34;&#xA;time=&#34;2026-05-06T07:08:29Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-05-06T07:08:30Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}New PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 found after retrigger for component gitlab-rep-bjaj/test-comp-pac-gitlab-numpid&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 found for Component gitlab-rep-bjaj/test-comp-pac-gitlab-numpid&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 reason: ResolvingTaskRef&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-numpid-on-pull-request-dc8p8 reason: Completed&#xA;&lt; Exit [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:148 @ 05/06/26 07:16:11.132 (12m23.977s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:11.133&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:11.133 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created should have a related PaC init MR is created [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.661232662">
              <system-err>&gt; Enter [It] should have a related PaC init MR is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:153 @ 05/06/26 07:16:11.133&#xA;&lt; Exit [It] should have a related PaC init MR is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:153 @ 05/06/26 07:16:11.794 (661ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:11.794&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:11.794 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully for component  [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.099235108">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for component  - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:172 @ 05/06/26 07:16:11.795&#xA;PipelineRun my-integration-test-fvnu-knrwl found for Component gitlab-rep-bjaj/test-comp-pac-gitlab-numpid&#xA;PipelineRun my-integration-test-fvnu-knrwl reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for component  - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:172 @ 05/06/26 07:16:11.894 (99ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:11.894&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:11.894 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.202513881">
              <system-err>&gt; Enter [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:179 @ 05/06/26 07:16:11.895&#xA;&lt; Exit [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:179 @ 05/06/26 07:16:12.097 (202ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.097&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.097 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the Snapshot is created [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.012386911">
              <system-err>&gt; Enter [It] checks if the Snapshot is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:183 @ 05/06/26 07:16:12.098&#xA;&lt; Exit [It] checks if the Snapshot is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:183 @ 05/06/26 07:16:12.11 (12ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.11&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.11 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.18623024">
              <system-err>&gt; Enter [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:188 @ 05/06/26 07:16:12.111&#xA;&lt; Exit [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:188 @ 05/06/26 07:16:12.297 (186ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.297&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.297 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the Snapshot was created should find the Integration Test Scenario PipelineRun [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007008829">
              <system-err>&gt; Enter [It] should find the Integration Test Scenario PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:194 @ 05/06/26 07:16:12.297&#xA;&lt; Exit [It] should find the Integration Test Scenario PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:194 @ 05/06/26 07:16:12.304 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.304&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.304 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created should eventually complete successfully [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.091639153">
              <system-err>&gt; Enter [It] should eventually complete successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:207 @ 05/06/26 07:16:12.305&#xA;PipelineRun my-integration-test-fvnu-knrwl reason: Succeeded&#xA;PipelineRun my-integration-test-qzke-rcdnb reason: Succeeded&#xA;&lt; Exit [It] should eventually complete successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:207 @ 05/06/26 07:16:12.396 (91ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.396&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.396 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.152446834">
              <system-err>&gt; Enter [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:212 @ 05/06/26 07:16:12.397&#xA;&lt; Exit [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:212 @ 05/06/26 07:16:12.549 (152ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.549&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.549 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.277000379">
              <system-err>&gt; Enter [It] eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:229 @ 05/06/26 07:16:12.55&#xA;&lt; Exit [It] eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:229 @ 05/06/26 07:16:12.826 (277ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.826&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.827 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.15014658">
              <system-err>&gt; Enter [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:233 @ 05/06/26 07:16:12.827&#xA;&lt; Exit [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:233 @ 05/06/26 07:16:12.977 (150ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.977&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:12.977 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.265554825">
              <system-err>&gt; Enter [It] eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:250 @ 05/06/26 07:16:12.977&#xA;&lt; Exit [It] eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:250 @ 05/06/26 07:16:13.243 (265ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:13.243&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:13.243 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates at least one MR note contains the final integration test result [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.144556891">
              <system-err>&gt; Enter [It] validates at least one MR note contains the final integration test result - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:254 @ 05/06/26 07:16:13.243&#xA;&lt; Exit [It] validates at least one MR note contains the final integration test result - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:254 @ 05/06/26 07:16:13.388 (144ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:13.388&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:13.388 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created merging the PR should be successful [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="1.231874101">
              <system-err>&gt; Enter [It] merging the PR should be successful - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:278 @ 05/06/26 07:16:13.388&#xA;merged result sha: 0fccf00bc6542ab66815878d895546313b62afb7 for MR #17513&#xA;&lt; Exit [It] merging the PR should be successful - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:278 @ 05/06/26 07:16:14.62 (1.231s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:14.62&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:14.62 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created leads to triggering on push PipelineRun [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.088292199">
              <system-err>&gt; Enter [It] leads to triggering on push PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:288 @ 05/06/26 07:16:14.621&#xA;&lt; Exit [It] leads to triggering on push PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:288 @ 05/06/26 07:16:14.709 (88ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:14.709&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:14.709 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR should eventually complete successfully [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.099473685">
              <system-err>&gt; Enter [It] should eventually complete successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:303 @ 05/06/26 07:16:14.709&#xA;PipelineRun my-integration-test-fvnu-knrwl reason: Succeeded&#xA;PipelineRun my-integration-test-qzke-rcdnb reason: Succeeded&#xA;&lt; Exit [It] should eventually complete successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:303 @ 05/06/26 07:16:14.809 (99ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:14.809&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:14.809 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.226843059">
              <system-err>&gt; Enter [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:308 @ 05/06/26 07:16:14.809&#xA;&lt; Exit [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:308 @ 05/06/26 07:16:15.036 (226ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:15.036&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:15.036 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.348926765">
              <system-err>&gt; Enter [It] eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:325 @ 05/06/26 07:16:15.037&#xA;&lt; Exit [It] eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:325 @ 05/06/26 07:16:15.385 (348ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:15.386&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:15.386 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.163103976">
              <system-err>&gt; Enter [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:329 @ 05/06/26 07:16:15.386&#xA;&lt; Exit [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:329 @ 05/06/26 07:16:15.549 (163ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:15.549&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:15.549 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="3.877225292">
              <system-err>&gt; Enter [It] eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:346 @ 05/06/26 07:16:15.55&#xA;&lt; Exit [It] eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:346 @ 05/06/26 07:16:15.876 (326ms)&#xA;&gt; Enter [AfterAll] Gitlab with status reporting of Integration tests in the assosiated merge request - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:94 @ 05/06/26 07:16:15.876&#xA;&lt; Exit [AfterAll] Gitlab with status reporting of Integration tests in the assosiated merge request - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:94 @ 05/06/26 07:16:19.426 (3.551s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:19.427&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/06/26 07:16:19.427 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created triggers a build PipelineRun [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="119.164358314">
              <system-err>&gt; Enter [BeforeAll] with happy path for general flow of Integration service - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:52 @ 05/06/26 07:02:05.762&#xA;Image repository for component test-component-pac-uxaxuy in namespace integration1-kgjp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component test-component-pac-uxaxuy in namespace integration1-kgjp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component test-component-pac-uxaxuy in namespace integration1-kgjp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;&lt; Exit [BeforeAll] with happy path for general flow of Integration service - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:52 @ 05/06/26 07:03:24.891 (1m19.13s)&#xA;&gt; Enter [It] triggers a build PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:85 @ 05/06/26 07:03:24.891&#xA;no pipelinerun found for component test-component-pac-uxaxuy (application: integ-app-jnmm, namespace: integration1-kgjp)no pipelinerun found for component test-component-pac-uxaxuy (application: integ-app-jnmm, namespace: integration1-kgjp)&#xA;&lt; Exit [It] triggers a build PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:85 @ 05/06/26 07:04:04.925 (40.034s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:04:04.926&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:04:04.926 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created verifies if the build PipelineRun contains the finalizer [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.115828913">
              <system-err>&gt; Enter [It] verifies if the build PipelineRun contains the finalizer - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:90 @ 05/06/26 07:04:04.926&#xA;&lt; Exit [It] verifies if the build PipelineRun contains the finalizer - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:90 @ 05/06/26 07:04:05.042 (115ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:04:05.042&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:04:05.042 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created waits for build PipelineRun to succeed [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="571.077478413">
              <system-err>&gt; Enter [It] waits for build PipelineRun to succeed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:101 @ 05/06/26 07:04:05.042&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-p8pzw found for Component integration1-kgjp/test-component-pac-uxaxuy&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-p8pzw reason: ResolvingTaskRef&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-p8pzw reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-p8pzw reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-p8pzw reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-p8pzw reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-p8pzw reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-p8pzw reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-p8pzw reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-p8pzw reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-p8pzw reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-p8pzw reason: Failed&#xA;attempt 1/3: PipelineRun &#34;test-component-pac-uxaxuy-on-pull-request-p8pzw&#34; failed: &#xA; pod: test-component-pac-uxaxuy-o8a358e57681445c9d96a3d8e46d441d6-pod | init container: prepare&#xA;2026/05/06 07:05:05 Entrypoint initialization&#xA;&#xA; pod: test-component-pac-uxaxuy-o8a358e57681445c9d96a3d8e46d441d6-pod | init container: place-scripts&#xA;2026/05/06 07:05:05 Decoded script /tekton/scripts/script-0-z5t9g&#xA;2026/05/06 07:05:05 Decoded script /tekton/scripts/script-1-wtgjf&#xA;2026/05/06 07:05:05 Decoded script /tekton/scripts/script-2-5rrx8&#xA;2026/05/06 07:05:06 Decoded script /tekton/scripts/script-3-4gdxl&#xA;2026/05/06 07:05:06 Decoded script /tekton/scripts/script-4-w7kg2&#xA;&#xA; pod: test-component-pac-uxaxuy-o8a358e57681445c9d96a3d8e46d441d6-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-component-pac-uxaxuy-o8a358e57681445c9d96a3d8e46d441d6-pod | container step-build: &#xA;[2026-05-06T07:05:13,116397940+00:00] Validate context path&#xA;[2026-05-06T07:05:13,119592851+00:00] Update CA trust&#xA;[2026-05-06T07:05:13,120659490+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-06T07:05:15,209676157+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-06T07:05:15,215876790+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-06T07:05:15,333545556+00:00] Setup prefetched&#xA;Trying to pull registry.access.redhat.com/ubi8/openjdk-17-runtime:1.23...&#xA;Getting image source signatures&#xA;Checking if image destination supports signatures&#xA;Copying blob sha256:8dbc54dd3ba8deb60962e0faf1bcd1d23c09867cffbce92e091a1094578f09fc&#xA;Copying blob sha256:c942205fe656068a84bcea3282a340025bcb04ccf5ac11554c341b816c9e156e&#xA;Copying config sha256:8979a2d87e9502962b699677c4df3cb444e670d02cddf2f83fd6da795feab96e&#xA;Writing manifest to image destination&#xA;Storing signatures&#xA;[2026-05-06T07:05:41,516674880+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-06T07:05:15Z&#34;,&#xA;  &#34;com.redhat.component&#34;: &#34;openjdk-17-runtime-ubi8-container&#34;,&#xA;  &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;  &#34;cpe&#34;: &#34;cpe:/a:redhat:enterprise_linux:8::appstream&#34;,&#xA;  &#34;description&#34;: &#34;Image for Red Hat OpenShift providing OpenJDK 17 runtime&#34;,&#xA;  &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;  &#34;io.cekit.version&#34;: &#34;4.13.0.dev0&#34;,&#xA;  &#34;io.k8s.description&#34;: &#34;Platform for running plain Java applications (fat-jar and flat classpath)&#34;,&#xA;  &#34;io.k8s.display-name&#34;: &#34;Java Applications&#34;,&#xA;  &#34;io.openshift.expose-services&#34;: &#34;&#34;,&#xA;  &#34;io.openshift.tags&#34;: &#34;java&#34;,&#xA;  &#34;maintainer&#34;: &#34;Red Hat OpenJDK &lt;openjdk@redhat.com&gt;&#34;,&#xA;  &#34;name&#34;: &#34;ubi8/openjdk-17-runtime&#34;,&#xA;  &#34;org.jboss.product&#34;: &#34;openjdk&#34;,&#xA;  &#34;org.jboss.product.openjdk.version&#34;: &#34;17&#34;,&#xA;  &#34;org.jboss.product.version&#34;: &#34;17&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-06T07:05:15Z&#34;,&#xA;  &#34;org.opencontainers.image.documentation&#34;: &#34;https://rh-openjdk.github.io/redhat-openjdk-containers/&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;6b9bd461df01d5c46c036b89582454398a302598&#34;,&#xA;  &#34;release&#34;: &#34;4.1777859697&#34;,&#xA;  &#34;summary&#34;: &#34;Image for Red Hat OpenShift providing OpenJDK 17 runtime&#34;,&#xA;  &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/ubi8/openjdk-17-runtime/images/1.23-4.1777859697&#34;,&#xA;  &#34;usage&#34;: &#34;https://rh-openjdk.github.io/redhat-openjdk-containers/&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;6b9bd461df01d5c46c036b89582454398a302598&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;version&#34;: &#34;1.23&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/konflux-test-integration&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;6h&#34;&#xA;}&#xA;[2026-05-06T07:05:41,564054141+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-06T07:05:41,567286012+00:00] Add secrets&#xA;[2026-05-06T07:05:41,574707615+00:00] Run buildah build&#xA;[2026-05-06T07:05:41,575847880+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=6b9bd461df01d5c46c036b89582454398a302598 --label org.opencontainers.image.revision=6b9bd461df01d5c46c036b89582454398a302598 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/konflux-test-integration --label quay.expires-after=6h --label build-date=2026-05-06T07:05:15Z --label org.opencontainers.image.created=2026-05-06T07:05:15Z --annotation org.opencontainers.image.revision=6b9bd461df01d5c46c036b89582454398a302598 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/konflux-test-integration --annotation org.opencontainers.image.created=2026-05-06T07:05:15Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.3Ti7IU -t quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy:on-pr-6b9bd461df01d5c46c036b89582454398a302598 . &#xA;[1/2] STEP 1/5: FROM registry.access.redhat.com/ubi8/openjdk-17:1.23 AS builder&#xA;Trying to pull registry.access.redhat.com/ubi8/openjdk-17:1.23...&#xA;Getting image source signatures&#xA;Checking if image destination supports signatures&#xA;Copying blob sha256:a12a82751b6fcca1bc1b9cde9e1848176a23a409694729a4a814f963fc33fb81&#xA;Copying blob sha256:c942205fe656068a84bcea3282a340025bcb04ccf5ac11554c341b816c9e156e&#xA;Copying config sha256:575ea09fb2e3a7e2587a6187fc17be1a0a5da89bcb3f41e3dd33087a2ffc3bcb&#xA;Writing manifest to image destination&#xA;Storing signatures&#xA;[1/2] STEP 2/5: WORKDIR /work&#xA;[1/2] STEP 3/5: COPY . .&#xA;[1/2] STEP 4/5: USER 0&#xA;[1/2] STEP 5/5: RUN mvn clean package -DskipTests -DskipDocsGen&#xA;[INFO] Scanning for projects...&#xA;[INFO] &#xA;[INFO] ------------------&lt; org.example:simple-java-project &gt;-------------------&#xA;[INFO] Building simple-java-project 1.0-SNAPSHOT&#xA;[INFO] --------------------------------[ jar ]---------------------------------&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-shade-plugin/3.2.4/maven-shade-plugin-3.2.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-shade-plugin/3.2.4/maven-shade-plugin-3.2.4.pom (11 kB at 50 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/34/maven-plugins-34.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/34/maven-plugins-34.pom (11 kB at 237 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/34/maven-parent-34.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 43 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/34/maven-parent-34.pom (43 kB at 765 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/23/apache-23.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 18 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/23/apache-23.pom (18 kB at 354 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-shade-plugin/3.2.4/maven-shade-plugin-3.2.4.jar&#xA;Progress (1): 2.3/134 kB&#xD;Progress (1): 5.0/134 kB&#xD;Progress (1): 7.7/134 kB&#xD;Progress (1): 10/134 kB &#xD;Progress (1): 13/134 kB&#xD;Progress (1): 16/134 kB&#xD;Progress (1): 19/134 kB&#xD;Progress (1): 21/134 kB&#xD;Progress (1): 24/134 kB&#xD;Progress (1): 28/134 kB&#xD;Progress (1): 32/134 kB&#xD;Progress (1): 36/134 kB&#xD;Progress (1): 41/134 kB&#xD;Progress (1): 45/134 kB&#xD;Progress (1): 49/134 kB&#xD;Progress (1): 53/134 kB&#xD;Progress (1): 57/134 kB&#xD;Progress (1): 61/134 kB&#xD;Progress (1): 65/134 kB&#xD;Progress (1): 69/134 kB&#xD;Progress (1): 73/134 kB&#xD;Progress (1): 77/134 kB&#xD;Progress (1): 80/134 kB&#xD;Progress (1): 84/134 kB&#xD;Progress (1): 88/134 kB&#xD;Progress (1): 92/134 kB&#xD;Progress (1): 96/134 kB&#xD;Progress (1): 100/134 kB&#xD;Progress (1): 104/134 kB&#xD;Progress (1): 108/134 kB&#xD;Progress (1): 112/134 kB&#xD;Progress (1): 116/134 kB&#xD;Progress (1): 121/134 kB&#xD;Progress (1): 125/134 kB&#xD;Progress (1): 129/134 kB&#xD;Progress (1): 133/134 kB&#xD;Progress (1): 134 kB    &#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-shade-plugin/3.2.4/maven-shade-plugin-3.2.4.jar (134 kB at 2.0 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-clean-plugin/2.5/maven-clean-plugin-2.5.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-clean-plugin/2.5/maven-clean-plugin-2.5.pom (3.9 kB at 62 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/22/maven-plugins-22.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 13 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/22/maven-plugins-22.pom (13 kB at 251 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/21/maven-parent-21.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 26 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/21/maven-parent-21.pom (26 kB at 393 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/10/apache-10.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/10/apache-10.pom (15 kB at 269 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-clean-plugin/2.5/maven-clean-plugin-2.5.jar&#xA;Progress (1): 4.1/25 kB&#xD;Progress (1): 7.7/25 kB&#xD;Progress (1): 12/25 kB &#xD;Progress (1): 16/25 kB&#xD;Progress (1): 20/25 kB&#xD;Progress (1): 24/25 kB&#xD;Progress (1): 25 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-clean-plugin/2.5/maven-clean-plugin-2.5.jar (25 kB at 425 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-resources-plugin/2.6/maven-resources-plugin-2.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-resources-plugin/2.6/maven-resources-plugin-2.6.pom (8.1 kB at 159 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/23/maven-plugins-23.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/23/maven-plugins-23.pom (9.2 kB at 180 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/22/maven-parent-22.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 30 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/22/maven-parent-22.pom (30 kB at 647 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/11/apache-11.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/11/apache-11.pom (15 kB at 296 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-resources-plugin/2.6/maven-resources-plugin-2.6.jar&#xA;Progress (1): 4.1/30 kB&#xD;Progress (1): 7.7/30 kB&#xD;Progress (1): 12/30 kB &#xD;Progress (1): 16/30 kB&#xD;Progress (1): 20/30 kB&#xD;Progress (1): 24/30 kB&#xD;Progress (1): 28/30 kB&#xD;Progress (1): 30 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-resources-plugin/2.6/maven-resources-plugin-2.6.jar (30 kB at 642 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-compiler-plugin/3.1/maven-compiler-plugin-3.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 10 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-compiler-plugin/3.1/maven-compiler-plugin-3.1.pom (10 kB at 227 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/24/maven-plugins-24.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/24/maven-plugins-24.pom (11 kB at 264 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/23/maven-parent-23.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/23/maven-parent-23.pom (33 kB at 679 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/13/apache-13.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/13/apache-13.pom (14 kB at 318 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-compiler-plugin/3.1/maven-compiler-plugin-3.1.jar&#xA;Progress (1): 4.1/43 kB&#xD;Progress (1): 7.7/43 kB&#xD;Progress (1): 12/43 kB &#xD;Progress (1): 16/43 kB&#xD;Progress (1): 20/43 kB&#xD;Progress (1): 24/43 kB&#xD;Progress (1): 28/43 kB&#xD;Progress (1): 32/43 kB&#xD;Progress (1): 36/43 kB&#xD;Progress (1): 40/43 kB&#xD;Progress (1): 43 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-compiler-plugin/3.1/maven-compiler-plugin-3.1.jar (43 kB at 1.0 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-surefire-plugin/2.12.4/maven-surefire-plugin-2.12.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 10 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-surefire-plugin/2.12.4/maven-surefire-plugin-2.12.4.pom (10 kB at 244 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire/2.12.4/surefire-2.12.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire/2.12.4/surefire-2.12.4.pom (14 kB at 328 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-surefire-plugin/2.12.4/maven-surefire-plugin-2.12.4.jar&#xA;Progress (1): 4.1/30 kB&#xD;Progress (1): 7.7/30 kB&#xD;Progress (1): 12/30 kB &#xD;Progress (1): 16/30 kB&#xD;Progress (1): 20/30 kB&#xD;Progress (1): 24/30 kB&#xD;Progress (1): 28/30 kB&#xD;Progress (1): 30 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-surefire-plugin/2.12.4/maven-surefire-plugin-2.12.4.jar (30 kB at 725 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-jar-plugin/3.3.0/maven-jar-plugin-3.3.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-jar-plugin/3.3.0/maven-jar-plugin-3.3.0.pom (6.8 kB at 161 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/37/maven-plugins-37.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/37/maven-plugins-37.pom (9.9 kB at 206 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/37/maven-parent-37.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 46 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/37/maven-parent-37.pom (46 kB at 748 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/27/apache-27.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/27/apache-27.pom (20 kB at 497 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-jar-plugin/3.3.0/maven-jar-plugin-3.3.0.jar&#xA;Progress (1): 4.1/27 kB&#xD;Progress (1): 7.7/27 kB&#xD;Progress (1): 12/27 kB &#xD;Progress (1): 15/27 kB&#xD;Progress (1): 20/27 kB&#xD;Progress (1): 24/27 kB&#xD;Progress (1): 27 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-jar-plugin/3.3.0/maven-jar-plugin-3.3.0.jar (27 kB at 636 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk17/0.1.2/simple-jdk17-0.1.2.pom&#xA;Progress (1): 3.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk17/0.1.2/simple-jdk17-0.1.2.pom (3.6 kB at 67 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/shaded/shaded-jdk11/1.9/shaded-jdk11-1.9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/shaded/shaded-jdk11/1.9/shaded-jdk11-1.9.pom (5.0 kB at 106 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk8/1.2.4/simple-jdk8-1.2.4.pom&#xA;Progress (1): 3.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk8/1.2.4/simple-jdk8-1.2.4.pom (3.6 kB at 90 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/gradle/hacbs-test-simple-gradle-jdk8/1.1/hacbs-test-simple-gradle-jdk8-1.1.pom&#xA;Progress (1): 1.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/gradle/hacbs-test-simple-gradle-jdk8/1.1/hacbs-test-simple-gradle-jdk8-1.1.pom (1.8 kB at 38 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk17/0.1.2/simple-jdk17-0.1.2.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/shaded/shaded-jdk11/1.9/shaded-jdk11-1.9.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk8/1.2.4/simple-jdk8-1.2.4.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/gradle/hacbs-test-simple-gradle-jdk8/1.1/hacbs-test-simple-gradle-jdk8-1.1.jar&#xA;Progress (1): 3.6 kB&#xD;Progress (2): 3.6 kB | 2.3/7.1 kB&#xD;Progress (2): 3.6 kB | 5.0/7.1 kB&#xD;Progress (2): 3.6 kB | 7.1 kB    &#xD;Progress (3): 3.6 kB | 7.1 kB | 2.3/3.6 kB&#xD;Progress (3): 3.6 kB | 7.1 kB | 3.6 kB    &#xD;                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk17/0.1.2/simple-jdk17-0.1.2.jar (3.6 kB at 82 kB/s)&#xA;Progress (3): 7.1 kB | 3.6 kB | 2.0 kB&#xD;                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk8/1.2.4/simple-jdk8-1.2.4.jar (3.6 kB at 66 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/gradle/hacbs-test-simple-gradle-jdk8/1.1/hacbs-test-simple-gradle-jdk8-1.1.jar (2.0 kB at 28 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/shaded/shaded-jdk11/1.9/shaded-jdk11-1.9.jar (7.1 kB at 50 kB/s)&#xA;[INFO] &#xA;[INFO] --- maven-clean-plugin:2.5:clean (default-clean) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.6/maven-plugin-api-2.0.6.pom&#xA;Progress (1): 1.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.6/maven-plugin-api-2.0.6.pom (1.5 kB at 44 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.0.6/maven-2.0.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.0.6/maven-2.0.6.pom (9.0 kB at 274 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/5/maven-parent-5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/5/maven-parent-5.pom (15 kB at 412 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/3/apache-3.pom&#xA;Progress (1): 3.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/3/apache-3.pom (3.4 kB at 111 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.pom&#xA;Progress (1): 4.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.pom (4.1 kB at 107 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/16/spice-parent-16.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/16/spice-parent-16.pom (8.4 kB at 261 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/5/forge-parent-5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/5/forge-parent-5.pom (8.4 kB at 246 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.6/maven-plugin-api-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.jar&#xA;Progress (1): 2.3/13 kB&#xD;Progress (1): 5.0/13 kB&#xD;Progress (1): 7.7/13 kB&#xD;Progress (1): 10/13 kB &#xD;Progress (1): 13 kB   &#xD;Progress (2): 13 kB | 2.3/226 kB&#xD;Progress (2): 13 kB | 5.0/226 kB&#xD;Progress (2): 13 kB | 7.7/226 kB&#xD;Progress (2): 13 kB | 10/226 kB &#xD;Progress (2): 13 kB | 13/226 kB&#xD;Progress (2): 13 kB | 15/226 kB&#xD;Progress (2): 13 kB | 18/226 kB&#xD;Progress (2): 13 kB | 21/226 kB&#xD;Progress (2): 13 kB | 24/226 kB&#xD;Progress (2): 13 kB | 26/226 kB&#xD;Progress (2): 13 kB | 29/226 kB&#xD;Progress (2): 13 kB | 32/226 kB&#xD;Progress (2): 13 kB | 35/226 kB&#xD;Progress (2): 13 kB | 37/226 kB&#xD;Progress (2): 13 kB | 40/226 kB&#xD;Progress (2): 13 kB | 43/226 kB&#xD;Progress (2): 13 kB | 46/226 kB&#xD;Progress (2): 13 kB | 48/226 kB&#xD;Progress (2): 13 kB | 52/226 kB&#xD;Progress (2): 13 kB | 57/226 kB&#xD;Progress (2): 13 kB | 61/226 kB&#xD;Progress (2): 13 kB | 65/226 kB&#xD;Progress (2): 13 kB | 69/226 kB&#xD;Progress (2): 13 kB | 73/226 kB&#xD;Progress (2): 13 kB | 75/226 kB&#xD;Progress (2): 13 kB | 79/226 kB&#xD;Progress (2): 13 kB | 83/226 kB&#xD;Progress (2): 13 kB | 87/226 kB&#xD;Progress (2): 13 kB | 91/226 kB&#xD;Progress (2): 13 kB | 96/226 kB&#xD;Progress (2): 13 kB | 100/226 kB&#xD;Progress (2): 13 kB | 104/226 kB&#xD;Progress (2): 13 kB | 108/226 kB&#xD;Progress (2): 13 kB | 112/226 kB&#xD;Progress (2): 13 kB | 116/226 kB&#xD;Progress (2): 13 kB | 120/226 kB&#xD;Progress (2): 13 kB | 124/226 kB&#xD;Progress (2): 13 kB | 128/226 kB&#xD;Progress (2): 13 kB | 132/226 kB&#xD;Progress (2): 13 kB | 135/226 kB&#xD;                                &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.6/maven-plugin-api-2.0.6.jar (13 kB at 443 kB/s)&#xA;Progress (1): 139/226 kB&#xD;Progress (1): 143/226 kB&#xD;Progress (1): 147/226 kB&#xD;Progress (1): 151/226 kB&#xD;Progress (1): 155/226 kB&#xD;Progress (1): 159/226 kB&#xD;Progress (1): 163/226 kB&#xD;Progress (1): 167/226 kB&#xD;Progress (1): 171/226 kB&#xD;Progress (1): 175/226 kB&#xD;Progress (1): 180/226 kB&#xD;Progress (1): 184/226 kB&#xD;Progress (1): 188/226 kB&#xD;Progress (1): 192/226 kB&#xD;Progress (1): 196/226 kB&#xD;Progress (1): 200/226 kB&#xD;Progress (1): 202/226 kB&#xD;Progress (1): 206/226 kB&#xD;Progress (1): 210/226 kB&#xD;Progress (1): 214/226 kB&#xD;Progress (1): 219/226 kB&#xD;Progress (1): 223/226 kB&#xD;Progress (1): 226 kB    &#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.jar (226 kB at 4.7 MB/s)&#xA;[INFO] &#xA;[INFO] --- maven-resources-plugin:2.6:resources (default-resources) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.6/maven-project-2.0.6.pom&#xA;Progress (1): 2.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.6/maven-project-2.0.6.pom (2.6 kB at 82 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.6/maven-settings-2.0.6.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.6/maven-settings-2.0.6.pom (2.0 kB at 54 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.6/maven-model-2.0.6.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.6/maven-model-2.0.6.pom (3.0 kB at 98 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.4.1/plexus-utils-1.4.1.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.4.1/plexus-utils-1.4.1.pom (1.9 kB at 66 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/1.0.11/plexus-1.0.11.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/1.0.11/plexus-1.0.11.pom (9.0 kB at 320 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9-stable-1/plexus-container-default-1.0-alpha-9-stable-1.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9-stable-1/plexus-container-default-1.0-alpha-9-stable-1.pom (3.9 kB at 120 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/1.0.3/plexus-containers-1.0.3.pom&#xA;Progress (1): 492 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/1.0.3/plexus-containers-1.0.3.pom (492 B at 15 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/1.0.4/plexus-1.0.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/1.0.4/plexus-1.0.4.pom (5.7 kB at 198 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.1/junit-3.8.1.pom&#xA;Progress (1): 998 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.1/junit-3.8.1.pom (998 B at 36 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.0.4/plexus-utils-1.0.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.0.4/plexus-utils-1.0.4.pom (6.9 kB at 202 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1-alpha-2/classworlds-1.1-alpha-2.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1-alpha-2/classworlds-1.1-alpha-2.pom (3.1 kB at 95 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.6/maven-profile-2.0.6.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.6/maven-profile-2.0.6.pom (2.0 kB at 68 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.6/maven-artifact-manager-2.0.6.pom&#xA;Progress (1): 2.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.6/maven-artifact-manager-2.0.6.pom (2.6 kB at 90 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.6/maven-repository-metadata-2.0.6.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.6/maven-repository-metadata-2.0.6.pom (1.9 kB at 56 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.6/maven-artifact-2.0.6.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.6/maven-artifact-2.0.6.pom (1.6 kB at 14 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.6/maven-plugin-registry-2.0.6.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.6/maven-plugin-registry-2.0.6.pom (1.9 kB at 63 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.6/maven-core-2.0.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.6/maven-core-2.0.6.pom (6.7 kB at 210 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.6/maven-plugin-parameter-documenter-2.0.6.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.6/maven-plugin-parameter-documenter-2.0.6.pom (1.9 kB at 66 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.6/maven-reporting-api-2.0.6.pom&#xA;Progress (1): 1.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.6/maven-reporting-api-2.0.6.pom (1.8 kB at 57 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting/2.0.6/maven-reporting-2.0.6.pom&#xA;Progress (1): 1.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting/2.0.6/maven-reporting-2.0.6.pom (1.4 kB at 53 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia-sink-api/1.0-alpha-7/doxia-sink-api-1.0-alpha-7.pom&#xA;Progress (1): 424 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia-sink-api/1.0-alpha-7/doxia-sink-api-1.0-alpha-7.pom (424 B at 13 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia/1.0-alpha-7/doxia-1.0-alpha-7.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia/1.0-alpha-7/doxia-1.0-alpha-7.pom (3.9 kB at 130 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.6/maven-error-diagnostics-2.0.6.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.6/maven-error-diagnostics-2.0.6.pom (1.7 kB at 61 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-cli/commons-cli/1.0/commons-cli-1.0.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-cli/commons-cli/1.0/commons-cli-1.0.pom (2.1 kB at 78 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.6/maven-plugin-descriptor-2.0.6.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.6/maven-plugin-descriptor-2.0.6.pom (2.0 kB at 67 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interactivity-api/1.0-alpha-4/plexus-interactivity-api-1.0-alpha-4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interactivity-api/1.0-alpha-4/plexus-interactivity-api-1.0-alpha-4.pom (7.1 kB at 197 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.6/maven-monitor-2.0.6.pom&#xA;Progress (1): 1.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.6/maven-monitor-2.0.6.pom (1.3 kB at 45 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1/classworlds-1.1.pom&#xA;Progress (1): 3.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1/classworlds-1.1.pom (3.3 kB at 95 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.5/plexus-utils-2.0.5.pom&#xA;Progress (1): 3.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.5/plexus-utils-2.0.5.pom (3.3 kB at 111 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.6/plexus-2.0.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 17 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.6/plexus-2.0.6.pom (17 kB at 541 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-filtering/1.1/maven-filtering-1.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-filtering/1.1/maven-filtering-1.1.pom (5.8 kB at 181 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/17/maven-shared-components-17.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/17/maven-shared-components-17.pom (8.7 kB at 311 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.15/plexus-utils-1.5.15.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.15/plexus-utils-1.5.15.pom (6.8 kB at 228 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.2/plexus-2.0.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.2/plexus-2.0.2.pom (12 kB at 430 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.12/plexus-interpolation-1.12.pom&#xA;Progress (1): 889 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.12/plexus-interpolation-1.12.pom (889 B at 25 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.14/plexus-components-1.1.14.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.14/plexus-components-1.1.14.pom (5.8 kB at 201 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-build-api/0.0.4/plexus-build-api-0.0.4.pom&#xA;Progress (1): 2.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-build-api/0.0.4/plexus-build-api-0.0.4.pom (2.9 kB at 102 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/10/spice-parent-10.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/10/spice-parent-10.pom (3.0 kB at 108 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/3/forge-parent-3.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/3/forge-parent-3.pom (5.0 kB at 168 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.8/plexus-utils-1.5.8.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.8/plexus-utils-1.5.8.pom (8.1 kB at 288 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.13/plexus-interpolation-1.13.pom&#xA;Progress (1): 890 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.13/plexus-interpolation-1.13.pom (890 B at 30 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.15/plexus-components-1.1.15.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.15/plexus-components-1.1.15.pom (2.8 kB at 98 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.3/plexus-2.0.3.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.3/plexus-2.0.3.pom (15 kB at 499 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.6/maven-project-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.6/maven-profile-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.6/maven-artifact-manager-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.6/maven-plugin-registry-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.6/maven-core-2.0.6.jar&#xA;Progress (1): 4.1/116 kB&#xD;Progress (1): 7.7/116 kB&#xD;Progress (1): 12/116 kB &#xD;Progress (1): 16/116 kB&#xD;Progress (1): 20/116 kB&#xD;Progress (1): 24/116 kB&#xD;Progress (2): 24/116 kB | 3.8/35 kB&#xD;Progress (2): 28/116 kB | 3.8/35 kB&#xD;Progress (2): 32/116 kB | 3.8/35 kB&#xD;Progress (2): 36/116 kB | 3.8/35 kB&#xD;Progress (2): 40/116 kB | 3.8/35 kB&#xD;Progress (2): 40/116 kB | 7.8/35 kB&#xD;Progress (2): 40/116 kB | 12/35 kB &#xD;Progress (2): 40/116 kB | 16/35 kB&#xD;Progress (2): 45/116 kB | 16/35 kB&#xD;Progress (2): 49/116 kB | 16/35 kB&#xD;Progress (2): 49/116 kB | 20/35 kB&#xD;Progress (2): 53/116 kB | 20/35 kB&#xD;Progress (2): 57/116 kB | 20/35 kB&#xD;Progress (2): 61/116 kB | 20/35 kB&#xD;Progress (2): 65/116 kB | 20/35 kB&#xD;Progress (2): 69/116 kB | 20/35 kB&#xD;Progress (2): 73/116 kB | 20/35 kB&#xD;Progress (2): 77/116 kB | 20/35 kB&#xD;Progress (2): 81/116 kB | 20/35 kB&#xD;Progress (2): 86/116 kB | 20/35 kB&#xD;Progress (2): 86/116 kB | 24/35 kB&#xD;Progress (2): 90/116 kB | 24/35 kB&#xD;Progress (2): 90/116 kB | 28/35 kB&#xD;Progress (2): 90/116 kB | 32/35 kB&#xD;Progress (2): 90/116 kB | 35 kB   &#xD;Progress (2): 94/116 kB | 35 kB&#xD;Progress (2): 98/116 kB | 35 kB&#xD;Progress (2): 102/116 kB | 35 kB&#xD;Progress (2): 106/116 kB | 35 kB&#xD;Progress (2): 110/116 kB | 35 kB&#xD;Progress (2): 114/116 kB | 35 kB&#xD;Progress (2): 116 kB | 35 kB    &#xD;Progress (3): 116 kB | 35 kB | 2.3/29 kB&#xD;Progress (3): 116 kB | 35 kB | 4.5/29 kB&#xD;Progress (3): 116 kB | 35 kB | 7.3/29 kB&#xD;Progress (3): 116 kB | 35 kB | 10/29 kB &#xD;Progress (3): 116 kB | 35 kB | 13/29 kB&#xD;Progress (3): 116 kB | 35 kB | 15/29 kB&#xD;Progress (3): 116 kB | 35 kB | 18/29 kB&#xD;Progress (3): 116 kB | 35 kB | 21/29 kB&#xD;Progress (3): 116 kB | 35 kB | 24/29 kB&#xD;Progress (3): 116 kB | 35 kB | 26/29 kB&#xD;Progress (4): 116 kB | 35 kB | 26/29 kB | 4.1/57 kB&#xD;Progress (4): 116 kB | 35 kB | 29 kB | 4.1/57 kB   &#xD;Progress (4): 116 kB | 35 kB | 29 kB | 7.7/57 kB&#xD;Progress (4): 116 kB | 35 kB | 29 kB | 12/57 kB &#xD;Progress (4): 116 kB | 35 kB | 29 kB | 16/57 kB&#xD;Progress (4): 116 kB | 35 kB | 29 kB | 20/57 kB&#xD;Progress (4): 116 kB | 35 kB | 29 kB | 24/57 kB&#xD;Progress (4): 116 kB | 35 kB | 29 kB | 28/57 kB&#xD;Progress (4): 116 kB | 35 kB | 29 kB | 32/57 kB&#xD;Progress (4): 116 kB | 35 kB | 29 kB | 36/57 kB&#xD;Progress (4): 116 kB | 35 kB | 29 kB | 40/57 kB&#xD;Progress (4): 116 kB | 35 kB | 29 kB | 44/57 kB&#xD;Progress (4): 116 kB | 35 kB | 29 kB | 48/57 kB&#xD;Progress (4): 116 kB | 35 kB | 29 kB | 52/57 kB&#xD;Progress (4): 116 kB | 35 kB | 29 kB | 56/57 kB&#xD;Progress (4): 116 kB | 35 kB | 29 kB | 57 kB   &#xD;                                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.6/maven-project-2.0.6.jar (116 kB at 3.6 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.6/maven-profile-2.0.6.jar (35 kB at 1.1 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.6/maven-plugin-parameter-documenter-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.6/maven-reporting-api-2.0.6.jar&#xA;Progress (3): 29 kB | 57 kB | 2.3/152 kB&#xD;Progress (3): 29 kB | 57 kB | 5.5/152 kB&#xD;Progress (3): 29 kB | 57 kB | 8.2/152 kB&#xD;Progress (3): 29 kB | 57 kB | 11/152 kB &#xD;Progress (3): 29 kB | 57 kB | 14/152 kB&#xD;Progress (3): 29 kB | 57 kB | 16/152 kB&#xD;Progress (3): 29 kB | 57 kB | 19/152 kB&#xD;Progress (3): 29 kB | 57 kB | 22/152 kB&#xD;Progress (3): 29 kB | 57 kB | 25/152 kB&#xD;Progress (3): 29 kB | 57 kB | 27/152 kB&#xD;Progress (3): 29 kB | 57 kB | 30/152 kB&#xD;Progress (3): 29 kB | 57 kB | 33/152 kB&#xD;Progress (3): 29 kB | 57 kB | 36/152 kB&#xD;Progress (3): 29 kB | 57 kB | 38/152 kB&#xD;Progress (3): 29 kB | 57 kB | 41/152 kB&#xD;Progress (3): 29 kB | 57 kB | 44/152 kB&#xD;Progress (3): 29 kB | 57 kB | 46/152 kB&#xD;Progress (3): 29 kB | 57 kB | 49/152 kB&#xD;Progress (3): 29 kB | 57 kB | 52/152 kB&#xD;                                       &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.6/maven-plugin-registry-2.0.6.jar (29 kB at 782 kB/s)&#xA;Progress (2): 57 kB | 55/152 kB&#xD;                               &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia-sink-api/1.0-alpha-7/doxia-sink-api-1.0-alpha-7.jar&#xA;Progress (2): 57 kB | 59/152 kB&#xD;Progress (2): 57 kB | 63/152 kB&#xD;Progress (2): 57 kB | 66/152 kB&#xD;Progress (2): 57 kB | 70/152 kB&#xD;Progress (2): 57 kB | 74/152 kB&#xD;Progress (2): 57 kB | 78/152 kB&#xD;Progress (2): 57 kB | 82/152 kB&#xD;Progress (2): 57 kB | 86/152 kB&#xD;Progress (2): 57 kB | 90/152 kB&#xD;Progress (2): 57 kB | 94/152 kB&#xD;Progress (2): 57 kB | 98/152 kB&#xD;Progress (2): 57 kB | 102/152 kB&#xD;Progress (2): 57 kB | 106/152 kB&#xD;Progress (2): 57 kB | 111/152 kB&#xD;Progress (2): 57 kB | 115/152 kB&#xD;Progress (2): 57 kB | 119/152 kB&#xD;Progress (2): 57 kB | 123/152 kB&#xD;Progress (2): 57 kB | 127/152 kB&#xD;Progress (2): 57 kB | 131/152 kB&#xD;Progress (2): 57 kB | 135/152 kB&#xD;                                &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.6/maven-artifact-manager-2.0.6.jar (57 kB at 1.3 MB/s)&#xA;Progress (1): 139/152 kB&#xD;                        &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.6/maven-repository-metadata-2.0.6.jar&#xA;Progress (1): 143/152 kB&#xD;Progress (1): 147/152 kB&#xD;Progress (1): 152/152 kB&#xD;Progress (1): 152 kB    &#xD;Progress (2): 152 kB | 3.8/9.9 kB&#xD;Progress (2): 152 kB | 7.8/9.9 kB&#xD;Progress (2): 152 kB | 9.9 kB    &#xD;Progress (3): 152 kB | 9.9 kB | 3.2/21 kB&#xD;Progress (3): 152 kB | 9.9 kB | 7.3/21 kB&#xD;Progress (3): 152 kB | 9.9 kB | 11/21 kB &#xD;Progress (3): 152 kB | 9.9 kB | 15/21 kB&#xD;Progress (3): 152 kB | 9.9 kB | 20/21 kB&#xD;Progress (3): 152 kB | 9.9 kB | 21 kB   &#xD;Progress (4): 152 kB | 9.9 kB | 21 kB | 2.3/5.9 kB&#xD;Progress (4): 152 kB | 9.9 kB | 21 kB | 5.0/5.9 kB&#xD;Progress (4): 152 kB | 9.9 kB | 21 kB | 5.9 kB    &#xD;                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.6/maven-core-2.0.6.jar (152 kB at 2.6 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.6/maven-error-diagnostics-2.0.6.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.6/maven-reporting-api-2.0.6.jar (9.9 kB at 166 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-cli/commons-cli/1.0/commons-cli-1.0.jar&#xA;Progress (3): 21 kB | 5.9 kB | 4.1/24 kB&#xD;Progress (3): 21 kB | 5.9 kB | 7.3/24 kB&#xD;Progress (3): 21 kB | 5.9 kB | 11/24 kB &#xD;Progress (3): 21 kB | 5.9 kB | 15/24 kB&#xD;Progress (3): 21 kB | 5.9 kB | 20/24 kB&#xD;Progress (3): 21 kB | 5.9 kB | 24/24 kB&#xD;Progress (3): 21 kB | 5.9 kB | 24 kB   &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia-sink-api/1.0-alpha-7/doxia-sink-api-1.0-alpha-7.jar (5.9 kB at 87 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.6/maven-plugin-descriptor-2.0.6.jar&#xA;Progress (3): 21 kB | 24 kB | 3.8/14 kB&#xD;Progress (3): 21 kB | 24 kB | 7.8/14 kB&#xD;Progress (3): 21 kB | 24 kB | 12/14 kB &#xD;Progress (3): 21 kB | 24 kB | 14 kB   &#xD;                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.6/maven-plugin-parameter-documenter-2.0.6.jar (21 kB at 277 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interactivity-api/1.0-alpha-4/plexus-interactivity-api-1.0-alpha-4.jar&#xA;Progress (3): 24 kB | 14 kB | 3.2/30 kB&#xD;Progress (3): 24 kB | 14 kB | 7.3/30 kB&#xD;Progress (3): 24 kB | 14 kB | 11/30 kB &#xD;Progress (3): 24 kB | 14 kB | 15/30 kB&#xD;Progress (3): 24 kB | 14 kB | 20/30 kB&#xD;Progress (3): 24 kB | 14 kB | 24/30 kB&#xD;Progress (3): 24 kB | 14 kB | 28/30 kB&#xD;Progress (3): 24 kB | 14 kB | 30 kB   &#xD;                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.6/maven-repository-metadata-2.0.6.jar (24 kB at 298 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1/classworlds-1.1.jar&#xA;Progress (3): 14 kB | 30 kB | 2.3/37 kB&#xD;Progress (3): 14 kB | 30 kB | 5.0/37 kB&#xD;Progress (3): 14 kB | 30 kB | 7.7/37 kB&#xD;Progress (3): 14 kB | 30 kB | 11/37 kB &#xD;Progress (3): 14 kB | 30 kB | 15/37 kB&#xD;Progress (3): 14 kB | 30 kB | 20/37 kB&#xD;Progress (3): 14 kB | 30 kB | 24/37 kB&#xD;Progress (3): 14 kB | 30 kB | 28/37 kB&#xD;Progress (3): 14 kB | 30 kB | 32/37 kB&#xD;Progress (3): 14 kB | 30 kB | 36/37 kB&#xD;Progress (3): 14 kB | 30 kB | 37 kB   &#xD;                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.6/maven-error-diagnostics-2.0.6.jar (14 kB at 155 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.6/maven-artifact-2.0.6.jar&#xA;Progress (3): 30 kB | 37 kB | 4.1/13 kB&#xD;Progress (3): 30 kB | 37 kB | 7.7/13 kB&#xD;Progress (3): 30 kB | 37 kB | 12/13 kB &#xD;Progress (3): 30 kB | 37 kB | 13 kB   &#xD;                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-cli/commons-cli/1.0/commons-cli-1.0.jar (30 kB at 331 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.6/maven-settings-2.0.6.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.6/maven-plugin-descriptor-2.0.6.jar (37 kB at 365 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.6/maven-model-2.0.6.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interactivity-api/1.0-alpha-4/plexus-interactivity-api-1.0-alpha-4.jar (13 kB at 131 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.6/maven-monitor-2.0.6.jar&#xA;Progress (1): 4.1/38 kB&#xD;Progress (1): 7.7/38 kB&#xD;Progress (1): 12/38 kB &#xD;Progress (1): 16/38 kB&#xD;Progress (1): 20/38 kB&#xD;Progress (1): 24/38 kB&#xD;Progress (1): 28/38 kB&#xD;Progress (1): 32/38 kB&#xD;Progress (1): 36/38 kB&#xD;Progress (1): 38 kB   &#xD;Progress (2): 38 kB | 3.8/49 kB&#xD;Progress (2): 38 kB | 7.8/49 kB&#xD;Progress (2): 38 kB | 12/49 kB &#xD;Progress (2): 38 kB | 16/49 kB&#xD;Progress (3): 38 kB | 16/49 kB | 3.2/87 kB&#xD;Progress (3): 38 kB | 20/49 kB | 3.2/87 kB&#xD;Progress (3): 38 kB | 24/49 kB | 3.2/87 kB&#xD;Progress (3): 38 kB | 24/49 kB | 7.3/87 kB&#xD;Progress (3): 38 kB | 28/49 kB | 7.3/87 kB&#xD;Progress (3): 38 kB | 28/49 kB | 11/87 kB &#xD;Progress (3): 38 kB | 32/49 kB | 11/87 kB&#xD;Progress (3): 38 kB | 37/49 kB | 11/87 kB&#xD;Progress (3): 38 kB | 37/49 kB | 15/87 kB&#xD;Progress (3): 38 kB | 41/49 kB | 15/87 kB&#xD;Progress (3): 38 kB | 41/49 kB | 20/87 kB&#xD;Progress (3): 38 kB | 45/49 kB | 20/87 kB&#xD;Progress (3): 38 kB | 45/49 kB | 24/87 kB&#xD;Progress (3): 38 kB | 49/49 kB | 24/87 kB&#xD;Progress (3): 38 kB | 49 kB | 24/87 kB   &#xD;Progress (3): 38 kB | 49 kB | 28/87 kB&#xD;Progress (3): 38 kB | 49 kB | 32/87 kB&#xD;Progress (3): 38 kB | 49 kB | 36/87 kB&#xD;Progress (3): 38 kB | 49 kB | 40/87 kB&#xD;Progress (3): 38 kB | 49 kB | 44/87 kB&#xD;Progress (3): 38 kB | 49 kB | 48/87 kB&#xD;Progress (3): 38 kB | 49 kB | 52/87 kB&#xD;Progress (3): 38 kB | 49 kB | 56/87 kB&#xD;Progress (3): 38 kB | 49 kB | 61/87 kB&#xD;Progress (3): 38 kB | 49 kB | 65/87 kB&#xD;Progress (3): 38 kB | 49 kB | 69/87 kB&#xD;Progress (3): 38 kB | 49 kB | 73/87 kB&#xD;Progress (3): 38 kB | 49 kB | 77/87 kB&#xD;Progress (3): 38 kB | 49 kB | 81/87 kB&#xD;Progress (3): 38 kB | 49 kB | 85/87 kB&#xD;Progress (3): 38 kB | 49 kB | 87 kB   &#xD;Progress (4): 38 kB | 49 kB | 87 kB | 3.8/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 7.8/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 12/86 kB &#xD;Progress (4): 38 kB | 49 kB | 87 kB | 16/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 20/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 24/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 28/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 32/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 37/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 41/86 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 41/86 kB | 4.1/10 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 45/86 kB | 4.1/10 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 45/86 kB | 7.7/10 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 45/86 kB | 10 kB    &#xD;Progress (5): 38 kB | 49 kB | 87 kB | 49/86 kB | 10 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 53/86 kB | 10 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 57/86 kB | 10 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 61/86 kB | 10 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 65/86 kB | 10 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 69/86 kB | 10 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 73/86 kB | 10 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 77/86 kB | 10 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 81/86 kB | 10 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 86/86 kB | 10 kB&#xD;Progress (5): 38 kB | 49 kB | 87 kB | 86 kB | 10 kB   &#xD;                                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.6/maven-artifact-2.0.6.jar (87 kB at 699 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9-stable-1/plexus-container-default-1.0-alpha-9-stable-1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1/classworlds-1.1.jar (38 kB at 303 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.1/junit-3.8.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.6/maven-settings-2.0.6.jar (49 kB at 372 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.5/plexus-utils-2.0.5.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.6/maven-monitor-2.0.6.jar (10 kB at 77 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-filtering/1.1/maven-filtering-1.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.6/maven-model-2.0.6.jar (86 kB at 631 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-build-api/0.0.4/plexus-build-api-0.0.4.jar&#xA;Progress (1): 4.1/194 kB&#xD;Progress (1): 7.7/194 kB&#xD;Progress (1): 12/194 kB &#xD;Progress (1): 16/194 kB&#xD;Progress (2): 16/194 kB | 4.1/121 kB&#xD;Progress (2): 16/194 kB | 7.7/121 kB&#xD;Progress (2): 16/194 kB | 12/121 kB &#xD;Progress (2): 16/194 kB | 15/121 kB&#xD;Progress (3): 16/194 kB | 15/121 kB | 3.8/223 kB&#xD;Progress (3): 20/194 kB | 15/121 kB | 3.8/223 kB&#xD;Progress (3): 24/194 kB | 15/121 kB | 3.8/223 kB&#xD;Progress (3): 28/194 kB | 15/121 kB | 3.8/223 kB&#xD;Progress (3): 32/194 kB | 15/121 kB | 3.8/223 kB&#xD;Progress (3): 32/194 kB | 15/121 kB | 7.8/223 kB&#xD;Progress (3): 32/194 kB | 20/121 kB | 7.8/223 kB&#xD;Progress (3): 32/194 kB | 20/121 kB | 12/223 kB &#xD;Progress (3): 32/194 kB | 24/121 kB | 12/223 kB&#xD;Progress (3): 32/194 kB | 24/121 kB | 15/223 kB&#xD;Progress (3): 32/194 kB | 28/121 kB | 15/223 kB&#xD;Progress (3): 32/194 kB | 32/121 kB | 15/223 kB&#xD;Progress (3): 36/194 kB | 32/121 kB | 15/223 kB&#xD;Progress (3): 40/194 kB | 32/121 kB | 15/223 kB&#xD;Progress (4): 40/194 kB | 32/121 kB | 15/223 kB | 4.1/43 kB&#xD;Progress (4): 40/194 kB | 32/121 kB | 20/223 kB | 4.1/43 kB&#xD;Progress (4): 45/194 kB | 32/121 kB | 20/223 kB | 4.1/43 kB&#xD;Progress (4): 45/194 kB | 32/121 kB | 24/223 kB | 4.1/43 kB&#xD;Progress (4): 49/194 kB | 32/121 kB | 24/223 kB | 4.1/43 kB&#xD;Progress (4): 49/194 kB | 36/121 kB | 24/223 kB | 4.1/43 kB&#xD;Progress (4): 49/194 kB | 36/121 kB | 28/223 kB | 4.1/43 kB&#xD;Progress (4): 49/194 kB | 36/121 kB | 28/223 kB | 8.2/43 kB&#xD;Progress (4): 49/194 kB | 40/121 kB | 28/223 kB | 8.2/43 kB&#xD;Progress (4): 49/194 kB | 40/121 kB | 28/223 kB | 12/43 kB &#xD;Progress (4): 49/194 kB | 40/121 kB | 32/223 kB | 12/43 kB&#xD;Progress (4): 49/194 kB | 40/121 kB | 32/223 kB | 16/43 kB&#xD;Progress (4): 49/194 kB | 44/121 kB | 32/223 kB | 16/43 kB&#xD;Progress (4): 49/194 kB | 44/121 kB | 32/223 kB | 20/43 kB&#xD;Progress (4): 49/194 kB | 48/121 kB | 32/223 kB | 20/43 kB&#xD;Progress (4): 49/194 kB | 48/121 kB | 32/223 kB | 25/43 kB&#xD;Progress (4): 49/194 kB | 48/121 kB | 32/223 kB | 29/43 kB&#xD;Progress (4): 49/194 kB | 48/121 kB | 32/223 kB | 33/43 kB&#xD;Progress (4): 49/194 kB | 48/121 kB | 36/223 kB | 33/43 kB&#xD;Progress (4): 49/194 kB | 48/121 kB | 36/223 kB | 37/43 kB&#xD;Progress (4): 49/194 kB | 52/121 kB | 36/223 kB | 37/43 kB&#xD;Progress (4): 49/194 kB | 52/121 kB | 40/223 kB | 37/43 kB&#xD;Progress (4): 49/194 kB | 56/121 kB | 40/223 kB | 37/43 kB&#xD;Progress (4): 49/194 kB | 56/121 kB | 40/223 kB | 41/43 kB&#xD;Progress (4): 49/194 kB | 56/121 kB | 44/223 kB | 41/43 kB&#xD;Progress (4): 49/194 kB | 56/121 kB | 44/223 kB | 43 kB   &#xD;Progress (4): 49/194 kB | 61/121 kB | 44/223 kB | 43 kB&#xD;Progress (4): 53/194 kB | 61/121 kB | 44/223 kB | 43 kB&#xD;Progress (4): 53/194 kB | 61/121 kB | 48/223 kB | 43 kB&#xD;Progress (4): 57/194 kB | 61/121 kB | 48/223 kB | 43 kB&#xD;Progress (4): 57/194 kB | 65/121 kB | 48/223 kB | 43 kB&#xD;Progress (4): 61/194 kB | 65/121 kB | 48/223 kB | 43 kB&#xD;Progress (4): 65/194 kB | 65/121 kB | 48/223 kB | 43 kB&#xD;Progress (4): 65/194 kB | 65/121 kB | 52/223 kB | 43 kB&#xD;Progress (4): 65/194 kB | 69/121 kB | 52/223 kB | 43 kB&#xD;Progress (4): 65/194 kB | 69/121 kB | 56/223 kB | 43 kB&#xD;Progress (4): 69/194 kB | 69/121 kB | 56/223 kB | 43 kB&#xD;Progress (4): 69/194 kB | 73/121 kB | 56/223 kB | 43 kB&#xD;Progress (4): 73/194 kB | 73/121 kB | 56/223 kB | 43 kB&#xD;Progress (4): 73/194 kB | 73/121 kB | 61/223 kB | 43 kB&#xD;Progress (4): 77/194 kB | 73/121 kB | 61/223 kB | 43 kB&#xD;Progress (4): 77/194 kB | 77/121 kB | 61/223 kB | 43 kB&#xD;Progress (4): 81/194 kB | 77/121 kB | 61/223 kB | 43 kB&#xD;Progress (4): 81/194 kB | 77/121 kB | 65/223 kB | 43 kB&#xD;Progress (4): 81/194 kB | 81/121 kB | 65/223 kB | 43 kB&#xD;Progress (4): 81/194 kB | 81/121 kB | 69/223 kB | 43 kB&#xD;Progress (4): 81/194 kB | 85/121 kB | 69/223 kB | 43 kB&#xD;Progress (4): 86/194 kB | 85/121 kB | 69/223 kB | 43 kB&#xD;Progress (4): 86/194 kB | 85/121 kB | 73/223 kB | 43 kB&#xD;Progress (4): 90/194 kB | 85/121 kB | 73/223 kB | 43 kB&#xD;Progress (4): 90/194 kB | 89/121 kB | 73/223 kB | 43 kB&#xD;Progress (4): 94/194 kB | 89/121 kB | 73/223 kB | 43 kB&#xD;Progress (4): 94/194 kB | 89/121 kB | 77/223 kB | 43 kB&#xD;Progress (4): 98/194 kB | 89/121 kB | 77/223 kB | 43 kB&#xD;Progress (4): 98/194 kB | 93/121 kB | 77/223 kB | 43 kB&#xD;Progress (4): 98/194 kB | 93/121 kB | 81/223 kB | 43 kB&#xD;Progress (4): 98/194 kB | 97/121 kB | 81/223 kB | 43 kB&#xD;Progress (5): 98/194 kB | 97/121 kB | 81/223 kB | 43 kB | 3.8/6.8 kB&#xD;Progress (5): 102/194 kB | 97/121 kB | 81/223 kB | 43 kB | 3.8/6.8 kB&#xD;Progress (5): 106/194 kB | 97/121 kB | 81/223 kB | 43 kB | 3.8/6.8 kB&#xD;Progress (5): 106/194 kB | 97/121 kB | 85/223 kB | 43 kB | 3.8/6.8 kB&#xD;Progress (5): 106/194 kB | 101/121 kB | 85/223 kB | 43 kB | 3.8/6.8 kB&#xD;Progress (5): 106/194 kB | 101/121 kB | 85/223 kB | 43 kB | 6.8 kB    &#xD;Progress (5): 106/194 kB | 106/121 kB | 85/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 106/194 kB | 106/121 kB | 89/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 110/194 kB | 106/121 kB | 89/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 110/194 kB | 106/121 kB | 93/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 110/194 kB | 110/121 kB | 93/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 110/194 kB | 110/121 kB | 97/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 114/194 kB | 110/121 kB | 97/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 114/194 kB | 114/121 kB | 97/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 114/194 kB | 118/121 kB | 97/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 114/194 kB | 121 kB | 97/223 kB | 43 kB | 6.8 kB    &#xD;Progress (5): 114/194 kB | 121 kB | 102/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 114/194 kB | 121 kB | 106/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 114/194 kB | 121 kB | 110/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 118/194 kB | 121 kB | 110/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 118/194 kB | 121 kB | 114/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 122/194 kB | 121 kB | 114/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 126/194 kB | 121 kB | 114/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 131/194 kB | 121 kB | 114/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 131/194 kB | 121 kB | 118/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 131/194 kB | 121 kB | 122/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 131/194 kB | 121 kB | 126/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 131/194 kB | 121 kB | 130/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 135/194 kB | 121 kB | 130/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 135/194 kB | 121 kB | 134/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 139/194 kB | 121 kB | 134/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 139/194 kB | 121 kB | 138/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 143/194 kB | 121 kB | 138/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 143/194 kB | 121 kB | 142/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 147/194 kB | 121 kB | 142/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 147/194 kB | 121 kB | 147/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 147/194 kB | 121 kB | 151/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 147/194 kB | 121 kB | 155/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 151/194 kB | 121 kB | 155/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 151/194 kB | 121 kB | 159/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 155/194 kB | 121 kB | 159/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 155/194 kB | 121 kB | 163/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 159/194 kB | 121 kB | 163/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 163/194 kB | 121 kB | 163/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 163/194 kB | 121 kB | 167/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 163/194 kB | 121 kB | 171/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 163/194 kB | 121 kB | 175/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 167/194 kB | 121 kB | 175/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 167/194 kB | 121 kB | 179/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 172/194 kB | 121 kB | 179/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 176/194 kB | 121 kB | 179/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 180/194 kB | 121 kB | 179/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 180/194 kB | 121 kB | 183/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 180/194 kB | 121 kB | 188/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 180/194 kB | 121 kB | 192/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 184/194 kB | 121 kB | 192/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 184/194 kB | 121 kB | 196/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 188/194 kB | 121 kB | 196/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 192/194 kB | 121 kB | 196/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 194 kB | 121 kB | 196/223 kB | 43 kB | 6.8 kB    &#xD;Progress (5): 194 kB | 121 kB | 200/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 194 kB | 121 kB | 204/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 194 kB | 121 kB | 208/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 194 kB | 121 kB | 212/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 194 kB | 121 kB | 216/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 194 kB | 121 kB | 220/223 kB | 43 kB | 6.8 kB&#xD;Progress (5): 194 kB | 121 kB | 223 kB | 43 kB | 6.8 kB    &#xD;                                                       &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-filtering/1.1/maven-filtering-1.1.jar (43 kB at 261 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.13/plexus-interpolation-1.13.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-build-api/0.0.4/plexus-build-api-0.0.4.jar (6.8 kB at 41 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.1/junit-3.8.1.jar (121 kB at 712 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.5/plexus-utils-2.0.5.jar (223 kB at 1.3 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9-stable-1/plexus-container-default-1.0-alpha-9-stable-1.jar (194 kB at 1.1 MB/s)&#xA;Progress (1): 4.1/61 kB&#xD;Progress (1): 7.7/61 kB&#xD;Progress (1): 11/61 kB &#xD;Progress (1): 15/61 kB&#xD;Progress (1): 20/61 kB&#xD;Progress (1): 24/61 kB&#xD;Progress (1): 28/61 kB&#xD;Progress (1): 32/61 kB&#xD;Progress (1): 36/61 kB&#xD;Progress (1): 40/61 kB&#xD;Progress (1): 44/61 kB&#xD;Progress (1): 48/61 kB&#xD;Progress (1): 52/61 kB&#xD;Progress (1): 56/61 kB&#xD;Progress (1): 61/61 kB&#xD;Progress (1): 61 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.13/plexus-interpolation-1.13.jar (61 kB at 312 kB/s)&#xA;[WARNING] Using platform encoding (UTF-8 actually) to copy filtered resources, i.e. build is platform dependent!&#xA;[INFO] skip non existing resourceDirectory /work/src/main/resources&#xA;[INFO] &#xA;[INFO] --- maven-compiler-plugin:3.1:compile (default-compile) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.9/maven-plugin-api-2.0.9.pom&#xA;Progress (1): 1.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.9/maven-plugin-api-2.0.9.pom (1.5 kB at 48 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.0.9/maven-2.0.9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 19 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.0.9/maven-2.0.9.pom (19 kB at 630 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/8/maven-parent-8.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 24 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/8/maven-parent-8.pom (24 kB at 731 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/4/apache-4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/4/apache-4.pom (4.5 kB at 166 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.9/maven-artifact-2.0.9.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.9/maven-artifact-2.0.9.pom (1.6 kB at 60 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.1/plexus-utils-1.5.1.pom&#xA;Progress (1): 2.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.1/plexus-utils-1.5.1.pom (2.3 kB at 53 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.9/maven-core-2.0.9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.9/maven-core-2.0.9.pom (7.8 kB at 195 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.9/maven-settings-2.0.9.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.9/maven-settings-2.0.9.pom (2.1 kB at 54 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.9/maven-model-2.0.9.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.9/maven-model-2.0.9.pom (3.1 kB at 101 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.9/maven-plugin-parameter-documenter-2.0.9.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.9/maven-plugin-parameter-documenter-2.0.9.pom (2.0 kB at 45 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.9/maven-profile-2.0.9.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.9/maven-profile-2.0.9.pom (2.0 kB at 57 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.9/maven-repository-metadata-2.0.9.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.9/maven-repository-metadata-2.0.9.pom (1.9 kB at 56 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.9/maven-error-diagnostics-2.0.9.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.9/maven-error-diagnostics-2.0.9.pom (1.7 kB at 54 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.9/maven-project-2.0.9.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.9/maven-project-2.0.9.pom (2.7 kB at 90 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.9/maven-artifact-manager-2.0.9.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.9/maven-artifact-manager-2.0.9.pom (2.7 kB at 84 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.9/maven-plugin-registry-2.0.9.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.9/maven-plugin-registry-2.0.9.pom (2.0 kB at 51 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.9/maven-plugin-descriptor-2.0.9.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.9/maven-plugin-descriptor-2.0.9.pom (2.1 kB at 67 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.9/maven-monitor-2.0.9.pom&#xA;Progress (1): 1.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.9/maven-monitor-2.0.9.pom (1.3 kB at 48 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/1.0/maven-toolchain-1.0.pom&#xA;Progress (1): 3.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/1.0/maven-toolchain-1.0.pom (3.4 kB at 110 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/0.1/maven-shared-utils-0.1.pom&#xA;Progress (1): 4.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/0.1/maven-shared-utils-0.1.pom (4.0 kB at 123 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/18/maven-shared-components-18.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/18/maven-shared-components-18.pom (4.9 kB at 141 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/2.0.1/jsr305-2.0.1.pom&#xA;Progress (1): 965 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/2.0.1/jsr305-2.0.1.pom (965 B at 28 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-incremental/1.1/maven-shared-incremental-1.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-incremental/1.1/maven-shared-incremental-1.1.pom (4.7 kB at 153 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/19/maven-shared-components-19.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/19/maven-shared-components-19.pom (6.4 kB at 199 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.2.1/maven-plugin-api-2.2.1.pom&#xA;Progress (1): 1.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.2.1/maven-plugin-api-2.2.1.pom (1.5 kB at 44 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.2.1/maven-2.2.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 22 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.2.1/maven-2.2.1.pom (22 kB at 723 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/11/maven-parent-11.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 32 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/11/maven-parent-11.pom (32 kB at 1.0 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/5/apache-5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/5/apache-5.pom (4.1 kB at 137 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.2.1/maven-core-2.2.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.2.1/maven-core-2.2.1.pom (12 kB at 364 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.2.1/maven-settings-2.2.1.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.2.1/maven-settings-2.2.1.pom (2.2 kB at 57 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.2.1/maven-model-2.2.1.pom&#xA;Progress (1): 3.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.2.1/maven-model-2.2.1.pom (3.2 kB at 98 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.11/plexus-interpolation-1.11.pom&#xA;Progress (1): 889 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.11/plexus-interpolation-1.11.pom (889 B at 28 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.2.1/maven-plugin-parameter-documenter-2.2.1.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.2.1/maven-plugin-parameter-documenter-2.2.1.pom (2.0 kB at 61 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-jdk14/1.5.6/slf4j-jdk14-1.5.6.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-jdk14/1.5.6/slf4j-jdk14-1.5.6.pom (1.9 kB at 70 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.5.6/slf4j-parent-1.5.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.5.6/slf4j-parent-1.5.6.pom (7.9 kB at 283 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.5.6/slf4j-api-1.5.6.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.5.6/slf4j-api-1.5.6.pom (3.0 kB at 103 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/jcl-over-slf4j/1.5.6/jcl-over-slf4j-1.5.6.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/jcl-over-slf4j/1.5.6/jcl-over-slf4j-1.5.6.pom (2.2 kB at 72 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.2.1/maven-profile-2.2.1.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.2.1/maven-profile-2.2.1.pom (2.2 kB at 78 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.2.1/maven-artifact-2.2.1.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.2.1/maven-artifact-2.2.1.pom (1.6 kB at 61 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.2.1/maven-repository-metadata-2.2.1.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.2.1/maven-repository-metadata-2.2.1.pom (1.9 kB at 65 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.2.1/maven-error-diagnostics-2.2.1.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.2.1/maven-error-diagnostics-2.2.1.pom (1.7 kB at 59 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.2.1/maven-project-2.2.1.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.2.1/maven-project-2.2.1.pom (2.8 kB at 99 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.2.1/maven-artifact-manager-2.2.1.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.2.1/maven-artifact-manager-2.2.1.pom (3.1 kB at 111 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/backport-util-concurrent/backport-util-concurrent/3.1/backport-util-concurrent-3.1.pom&#xA;Progress (1): 880 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/backport-util-concurrent/backport-util-concurrent/3.1/backport-util-concurrent-3.1.pom (880 B at 28 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.2.1/maven-plugin-registry-2.2.1.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.2.1/maven-plugin-registry-2.2.1.pom (1.9 kB at 69 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.2.1/maven-plugin-descriptor-2.2.1.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.2.1/maven-plugin-descriptor-2.2.1.pom (2.1 kB at 67 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.2.1/maven-monitor-2.2.1.pom&#xA;Progress (1): 1.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.2.1/maven-monitor-2.2.1.pom (1.3 kB at 42 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-sec-dispatcher/1.3/plexus-sec-dispatcher-1.3.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-sec-dispatcher/1.3/plexus-sec-dispatcher-1.3.pom (3.0 kB at 90 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/12/spice-parent-12.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/12/spice-parent-12.pom (6.8 kB at 166 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/4/forge-parent-4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/4/forge-parent-4.pom (8.4 kB at 280 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.5/plexus-utils-1.5.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.5/plexus-utils-1.5.5.pom (5.1 kB at 166 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-cipher/1.4/plexus-cipher-1.4.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-cipher/1.4/plexus-cipher-1.4.pom (2.1 kB at 61 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/1.5.5/plexus-component-annotations-1.5.5.pom&#xA;Progress (1): 815 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/1.5.5/plexus-component-annotations-1.5.5.pom (815 B at 26 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/1.5.5/plexus-containers-1.5.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/1.5.5/plexus-containers-1.5.5.pom (4.2 kB at 121 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.7/plexus-2.0.7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 17 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.7/plexus-2.0.7.pom (17 kB at 540 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-api/2.2/plexus-compiler-api-2.2.pom&#xA;Progress (1): 865 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-api/2.2/plexus-compiler-api-2.2.pom (865 B at 26 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler/2.2/plexus-compiler-2.2.pom&#xA;Progress (1): 3.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler/2.2/plexus-compiler-2.2.pom (3.6 kB at 103 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.3.1/plexus-components-1.3.1.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.3.1/plexus-components-1.3.1.pom (3.1 kB at 106 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/3.3.1/plexus-3.3.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/3.3.1/plexus-3.3.1.pom (20 kB at 757 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/17/spice-parent-17.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/17/spice-parent-17.pom (6.8 kB at 218 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/10/forge-parent-10.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/10/forge-parent-10.pom (14 kB at 339 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0.8/plexus-utils-3.0.8.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0.8/plexus-utils-3.0.8.pom (3.1 kB at 105 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/3.2/plexus-3.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 19 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/3.2/plexus-3.2.pom (19 kB at 521 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-manager/2.2/plexus-compiler-manager-2.2.pom&#xA;Progress (1): 690 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-manager/2.2/plexus-compiler-manager-2.2.pom (690 B at 23 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-javac/2.2/plexus-compiler-javac-2.2.pom&#xA;Progress (1): 769 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-javac/2.2/plexus-compiler-javac-2.2.pom (769 B at 26 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compilers/2.2/plexus-compilers-2.2.pom&#xA;Progress (1): 1.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compilers/2.2/plexus-compilers-2.2.pom (1.2 kB at 40 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.5.5/plexus-container-default-1.5.5.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.5.5/plexus-container-default-1.5.5.pom (2.8 kB at 92 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.4.5/plexus-utils-1.4.5.pom&#xA;Progress (1): 2.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.4.5/plexus-utils-1.4.5.pom (2.3 kB at 76 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.2/plexus-classworlds-2.2.2.pom&#xA;Progress (1): 4.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.2/plexus-classworlds-2.2.2.pom (4.0 kB at 130 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean-reflect/3.4/xbean-reflect-3.4.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean-reflect/3.4/xbean-reflect-3.4.pom (2.8 kB at 67 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean/3.4/xbean-3.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 19 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean/3.4/xbean-3.4.pom (19 kB at 618 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/log4j/log4j/1.2.12/log4j-1.2.12.pom&#xA;Progress (1): 145 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/log4j/log4j/1.2.12/log4j-1.2.12.pom (145 B at 4.5 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-logging/commons-logging-api/1.1/commons-logging-api-1.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-logging/commons-logging-api/1.1/commons-logging-api-1.1.pom (5.3 kB at 172 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/collections/google-collections/1.0/google-collections-1.0.pom&#xA;Progress (1): 2.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/collections/google-collections/1.0/google-collections-1.0.pom (2.5 kB at 69 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/google/1/google-1.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/google/1/google-1.pom (1.6 kB at 50 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.2/junit-3.8.2.pom&#xA;Progress (1): 747 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.2/junit-3.8.2.pom (747 B at 28 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.9/maven-plugin-api-2.0.9.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.9/maven-artifact-2.0.9.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.1/plexus-utils-1.5.1.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.9/maven-core-2.0.9.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.9/maven-settings-2.0.9.jar&#xA;Progress (1): 4.1/13 kB&#xD;Progress (1): 7.7/13 kB&#xD;Progress (1): 12/13 kB &#xD;Progress (1): 13 kB   &#xD;Progress (2): 13 kB | 3.8/49 kB&#xD;Progress (2): 13 kB | 7.7/49 kB&#xD;Progress (2): 13 kB | 12/49 kB &#xD;Progress (2): 13 kB | 16/49 kB&#xD;Progress (2): 13 kB | 20/49 kB&#xD;Progress (2): 13 kB | 24/49 kB&#xD;Progress (2): 13 kB | 28/49 kB&#xD;Progress (2): 13 kB | 32/49 kB&#xD;Progress (2): 13 kB | 36/49 kB&#xD;Progress (2): 13 kB | 40/49 kB&#xD;Progress (2): 13 kB | 45/49 kB&#xD;Progress (2): 13 kB | 49/49 kB&#xD;Progress (2): 13 kB | 49 kB   &#xD;Progress (3): 13 kB | 49 kB | 4.1/211 kB&#xD;Progress (3): 13 kB | 49 kB | 7.7/211 kB&#xD;Progress (3): 13 kB | 49 kB | 12/211 kB &#xD;Progress (3): 13 kB | 49 kB | 16/211 kB&#xD;Progress (3): 13 kB | 49 kB | 20/211 kB&#xD;Progress (3): 13 kB | 49 kB | 24/211 kB&#xD;Progress (3): 13 kB | 49 kB | 28/211 kB&#xD;Progress (3): 13 kB | 49 kB | 32/211 kB&#xD;Progress (3): 13 kB | 49 kB | 36/211 kB&#xD;Progress (3): 13 kB | 49 kB | 40/211 kB&#xD;Progress (3): 13 kB | 49 kB | 45/211 kB&#xD;Progress (3): 13 kB | 49 kB | 49/211 kB&#xD;Progress (3): 13 kB | 49 kB | 53/211 kB&#xD;Progress (3): 13 kB | 49 kB | 57/211 kB&#xD;Progress (3): 13 kB | 49 kB | 61/211 kB&#xD;Progress (3): 13 kB | 49 kB | 65/211 kB&#xD;Progress (3): 13 kB | 49 kB | 69/211 kB&#xD;Progress (3): 13 kB | 49 kB | 73/211 kB&#xD;Progress (3): 13 kB | 49 kB | 77/211 kB&#xD;Progress (3): 13 kB | 49 kB | 81/211 kB&#xD;Progress (3): 13 kB | 49 kB | 86/211 kB&#xD;Progress (3): 13 kB | 49 kB | 90/211 kB&#xD;Progress (3): 13 kB | 49 kB | 94/211 kB&#xD;Progress (3): 13 kB | 49 kB | 98/211 kB&#xD;Progress (3): 13 kB | 49 kB | 102/211 kB&#xD;Progress (3): 13 kB | 49 kB | 106/211 kB&#xD;Progress (3): 13 kB | 49 kB | 110/211 kB&#xD;Progress (3): 13 kB | 49 kB | 114/211 kB&#xD;Progress (3): 13 kB | 49 kB | 118/211 kB&#xD;Progress (3): 13 kB | 49 kB | 122/211 kB&#xD;Progress (3): 13 kB | 49 kB | 126/211 kB&#xD;Progress (3): 13 kB | 49 kB | 131/211 kB&#xD;Progress (3): 13 kB | 49 kB | 135/211 kB&#xD;Progress (3): 13 kB | 49 kB | 139/211 kB&#xD;Progress (3): 13 kB | 49 kB | 143/211 kB&#xD;Progress (3): 13 kB | 49 kB | 147/211 kB&#xD;Progress (4): 13 kB | 49 kB | 147/211 kB | 4.1/160 kB&#xD;Progress (4): 13 kB | 49 kB | 151/211 kB | 4.1/160 kB&#xD;Progress (4): 13 kB | 49 kB | 155/211 kB | 4.1/160 kB&#xD;Progress (4): 13 kB | 49 kB | 155/211 kB | 7.7/160 kB&#xD;Progress (4): 13 kB | 49 kB | 159/211 kB | 7.7/160 kB&#xD;Progress (4): 13 kB | 49 kB | 159/211 kB | 12/160 kB &#xD;Progress (4): 13 kB | 49 kB | 159/211 kB | 16/160 kB&#xD;Progress (4): 13 kB | 49 kB | 163/211 kB | 16/160 kB&#xD;Progress (4): 13 kB | 49 kB | 167/211 kB | 16/160 kB&#xD;Progress (4): 13 kB | 49 kB | 172/211 kB | 16/160 kB&#xD;Progress (4): 13 kB | 49 kB | 172/211 kB | 20/160 kB&#xD;Progress (4): 13 kB | 49 kB | 176/211 kB | 20/160 kB&#xD;Progress (4): 13 kB | 49 kB | 176/211 kB | 24/160 kB&#xD;Progress (4): 13 kB | 49 kB | 180/211 kB | 24/160 kB&#xD;Progress (4): 13 kB | 49 kB | 184/211 kB | 24/160 kB&#xD;Progress (4): 13 kB | 49 kB | 188/211 kB | 24/160 kB&#xD;Progress (4): 13 kB | 49 kB | 188/211 kB | 28/160 kB&#xD;Progress (4): 13 kB | 49 kB | 192/211 kB | 28/160 kB&#xD;Progress (4): 13 kB | 49 kB | 192/211 kB | 32/160 kB&#xD;Progress (4): 13 kB | 49 kB | 192/211 kB | 36/160 kB&#xD;Progress (4): 13 kB | 49 kB | 196/211 kB | 36/160 kB&#xD;Progress (4): 13 kB | 49 kB | 196/211 kB | 40/160 kB&#xD;Progress (4): 13 kB | 49 kB | 200/211 kB | 40/160 kB&#xD;Progress (4): 13 kB | 49 kB | 204/211 kB | 40/160 kB&#xD;Progress (4): 13 kB | 49 kB | 208/211 kB | 40/160 kB&#xD;Progress (4): 13 kB | 49 kB | 208/211 kB | 45/160 kB&#xD;Progress (4): 13 kB | 49 kB | 211 kB | 45/160 kB    &#xD;Progress (4): 13 kB | 49 kB | 211 kB | 49/160 kB&#xD;Progress (4): 13 kB | 49 kB | 211 kB | 53/160 kB&#xD;Progress (4): 13 kB | 49 kB | 211 kB | 57/160 kB&#xD;Progress (4): 13 kB | 49 kB | 211 kB | 61/160 kB&#xD;Progress (4): 13 kB | 49 kB | 211 kB | 65/160 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 65/160 kB | 4.1/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 69/160 kB | 4.1/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 73/160 kB | 4.1/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 73/160 kB | 7.7/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 73/160 kB | 12/89 kB &#xD;Progress (5): 13 kB | 49 kB | 211 kB | 77/160 kB | 12/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 77/160 kB | 16/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 81/160 kB | 16/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 86/160 kB | 16/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 86/160 kB | 20/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 90/160 kB | 20/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 90/160 kB | 24/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 90/160 kB | 28/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 94/160 kB | 28/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 98/160 kB | 28/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 98/160 kB | 32/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 102/160 kB | 32/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 102/160 kB | 36/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 106/160 kB | 36/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 106/160 kB | 40/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 106/160 kB | 44/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 110/160 kB | 44/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 114/160 kB | 44/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 118/160 kB | 44/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 122/160 kB | 44/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 122/160 kB | 48/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 126/160 kB | 48/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 126/160 kB | 52/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 131/160 kB | 52/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 131/160 kB | 56/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 131/160 kB | 61/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 131/160 kB | 65/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 131/160 kB | 69/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 131/160 kB | 73/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 131/160 kB | 77/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 135/160 kB | 77/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 139/160 kB | 77/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 143/160 kB | 77/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 147/160 kB | 77/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 151/160 kB | 77/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 155/160 kB | 77/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 159/160 kB | 77/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 160 kB | 77/89 kB    &#xD;Progress (5): 13 kB | 49 kB | 211 kB | 160 kB | 81/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 160 kB | 85/89 kB&#xD;Progress (5): 13 kB | 49 kB | 211 kB | 160 kB | 89 kB   &#xD;                                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.9/maven-plugin-api-2.0.9.jar (13 kB at 477 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.9/maven-plugin-parameter-documenter-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.9/maven-settings-2.0.9.jar (49 kB at 1.5 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.9/maven-profile-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.1/plexus-utils-1.5.1.jar (211 kB at 6.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.9/maven-model-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.9/maven-artifact-2.0.9.jar (89 kB at 2.3 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.9/maven-repository-metadata-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.9/maven-core-2.0.9.jar (160 kB at 3.9 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.9/maven-error-diagnostics-2.0.9.jar&#xA;Progress (1): 4.1/21 kB&#xD;Progress (1): 7.7/21 kB&#xD;Progress (1): 12/21 kB &#xD;Progress (1): 16/21 kB&#xD;Progress (1): 20/21 kB&#xD;Progress (1): 21 kB   &#xD;Progress (2): 21 kB | 4.1/35 kB&#xD;Progress (2): 21 kB | 7.7/35 kB&#xD;Progress (2): 21 kB | 12/35 kB &#xD;Progress (2): 21 kB | 16/35 kB&#xD;Progress (2): 21 kB | 20/35 kB&#xD;Progress (2): 21 kB | 24/35 kB&#xD;Progress (2): 21 kB | 28/35 kB&#xD;Progress (2): 21 kB | 32/35 kB&#xD;Progress (2): 21 kB | 35 kB   &#xD;Progress (3): 21 kB | 35 kB | 4.1/87 kB&#xD;Progress (3): 21 kB | 35 kB | 7.7/87 kB&#xD;Progress (3): 21 kB | 35 kB | 12/87 kB &#xD;Progress (3): 21 kB | 35 kB | 16/87 kB&#xD;Progress (3): 21 kB | 35 kB | 20/87 kB&#xD;Progress (3): 21 kB | 35 kB | 24/87 kB&#xD;Progress (3): 21 kB | 35 kB | 28/87 kB&#xD;Progress (3): 21 kB | 35 kB | 32/87 kB&#xD;Progress (3): 21 kB | 35 kB | 36/87 kB&#xD;Progress (3): 21 kB | 35 kB | 40/87 kB&#xD;Progress (3): 21 kB | 35 kB | 45/87 kB&#xD;Progress (3): 21 kB | 35 kB | 49/87 kB&#xD;Progress (3): 21 kB | 35 kB | 53/87 kB&#xD;Progress (3): 21 kB | 35 kB | 57/87 kB&#xD;Progress (3): 21 kB | 35 kB | 61/87 kB&#xD;Progress (3): 21 kB | 35 kB | 65/87 kB&#xD;Progress (3): 21 kB | 35 kB | 69/87 kB&#xD;Progress (3): 21 kB | 35 kB | 73/87 kB&#xD;Progress (3): 21 kB | 35 kB | 77/87 kB&#xD;Progress (3): 21 kB | 35 kB | 81/87 kB&#xD;Progress (3): 21 kB | 35 kB | 86/87 kB&#xD;Progress (3): 21 kB | 35 kB | 87 kB   &#xD;Progress (4): 21 kB | 35 kB | 87 kB | 4.1/25 kB&#xD;Progress (4): 21 kB | 35 kB | 87 kB | 7.7/25 kB&#xD;Progress (4): 21 kB | 35 kB | 87 kB | 11/25 kB &#xD;Progress (4): 21 kB | 35 kB | 87 kB | 15/25 kB&#xD;Progress (4): 21 kB | 35 kB | 87 kB | 20/25 kB&#xD;Progress (4): 21 kB | 35 kB | 87 kB | 24/25 kB&#xD;Progress (4): 21 kB | 35 kB | 87 kB | 25 kB   &#xD;                                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.9/maven-plugin-parameter-documenter-2.0.9.jar (21 kB at 366 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.9/maven-project-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.9/maven-profile-2.0.9.jar (35 kB at 580 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.9/maven-plugin-registry-2.0.9.jar&#xA;Progress (3): 87 kB | 25 kB | 4.1/14 kB&#xD;Progress (3): 87 kB | 25 kB | 7.7/14 kB&#xD;Progress (3): 87 kB | 25 kB | 11/14 kB &#xD;Progress (3): 87 kB | 25 kB | 14 kB   &#xD;                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.9/maven-model-2.0.9.jar (87 kB at 1.3 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.9/maven-plugin-descriptor-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.9/maven-repository-metadata-2.0.9.jar (25 kB at 351 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.9/maven-artifact-manager-2.0.9.jar&#xA;Progress (2): 14 kB | 4.1/29 kB&#xD;Progress (3): 14 kB | 4.1/29 kB | 4.1/122 kB&#xD;Progress (3): 14 kB | 7.7/29 kB | 4.1/122 kB&#xD;Progress (3): 14 kB | 7.7/29 kB | 7.7/122 kB&#xD;Progress (3): 14 kB | 11/29 kB | 7.7/122 kB &#xD;Progress (3): 14 kB | 11/29 kB | 12/122 kB &#xD;Progress (3): 14 kB | 11/29 kB | 15/122 kB&#xD;Progress (3): 14 kB | 15/29 kB | 15/122 kB&#xD;Progress (3): 14 kB | 20/29 kB | 15/122 kB&#xD;Progress (3): 14 kB | 24/29 kB | 15/122 kB&#xD;Progress (3): 14 kB | 24/29 kB | 20/122 kB&#xD;Progress (3): 14 kB | 28/29 kB | 20/122 kB&#xD;Progress (3): 14 kB | 28/29 kB | 24/122 kB&#xD;Progress (3): 14 kB | 29 kB | 24/122 kB   &#xD;Progress (3): 14 kB | 29 kB | 28/122 kB&#xD;Progress (3): 14 kB | 29 kB | 32/122 kB&#xD;Progress (3): 14 kB | 29 kB | 36/122 kB&#xD;Progress (3): 14 kB | 29 kB | 40/122 kB&#xD;Progress (3): 14 kB | 29 kB | 44/122 kB&#xD;Progress (3): 14 kB | 29 kB | 48/122 kB&#xD;Progress (3): 14 kB | 29 kB | 52/122 kB&#xD;Progress (3): 14 kB | 29 kB | 56/122 kB&#xD;Progress (3): 14 kB | 29 kB | 61/122 kB&#xD;Progress (3): 14 kB | 29 kB | 65/122 kB&#xD;Progress (3): 14 kB | 29 kB | 69/122 kB&#xD;Progress (3): 14 kB | 29 kB | 73/122 kB&#xD;Progress (3): 14 kB | 29 kB | 77/122 kB&#xD;Progress (3): 14 kB | 29 kB | 81/122 kB&#xD;Progress (3): 14 kB | 29 kB | 85/122 kB&#xD;Progress (3): 14 kB | 29 kB | 89/122 kB&#xD;Progress (3): 14 kB | 29 kB | 93/122 kB&#xD;Progress (3): 14 kB | 29 kB | 97/122 kB&#xD;Progress (3): 14 kB | 29 kB | 102/122 kB&#xD;Progress (3): 14 kB | 29 kB | 106/122 kB&#xD;Progress (3): 14 kB | 29 kB | 110/122 kB&#xD;Progress (3): 14 kB | 29 kB | 114/122 kB&#xD;Progress (3): 14 kB | 29 kB | 118/122 kB&#xD;Progress (3): 14 kB | 29 kB | 122 kB    &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.9/maven-error-diagnostics-2.0.9.jar (14 kB at 175 kB/s)&#xA;Progress (3): 29 kB | 122 kB | 4.1/37 kB&#xD;                                        &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.9/maven-monitor-2.0.9.jar&#xA;Progress (3): 29 kB | 122 kB | 7.7/37 kB&#xD;Progress (3): 29 kB | 122 kB | 12/37 kB &#xD;Progress (3): 29 kB | 122 kB | 16/37 kB&#xD;Progress (3): 29 kB | 122 kB | 20/37 kB&#xD;Progress (3): 29 kB | 122 kB | 24/37 kB&#xD;Progress (3): 29 kB | 122 kB | 28/37 kB&#xD;Progress (3): 29 kB | 122 kB | 32/37 kB&#xD;Progress (3): 29 kB | 122 kB | 36/37 kB&#xD;Progress (3): 29 kB | 122 kB | 37 kB   &#xD;Progress (4): 29 kB | 122 kB | 37 kB | 4.1/58 kB&#xD;Progress (4): 29 kB | 122 kB | 37 kB | 7.7/58 kB&#xD;Progress (4): 29 kB | 122 kB | 37 kB | 12/58 kB &#xD;Progress (4): 29 kB | 122 kB | 37 kB | 16/58 kB&#xD;Progress (4): 29 kB | 122 kB | 37 kB | 20/58 kB&#xD;Progress (4): 29 kB | 122 kB | 37 kB | 24/58 kB&#xD;Progress (4): 29 kB | 122 kB | 37 kB | 28/58 kB&#xD;Progress (4): 29 kB | 122 kB | 37 kB | 32/58 kB&#xD;                                               &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.9/maven-plugin-registry-2.0.9.jar (29 kB at 338 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/1.0/maven-toolchain-1.0.jar&#xA;Progress (3): 122 kB | 37 kB | 36/58 kB&#xD;Progress (3): 122 kB | 37 kB | 40/58 kB&#xD;Progress (3): 122 kB | 37 kB | 45/58 kB&#xD;Progress (3): 122 kB | 37 kB | 49/58 kB&#xD;Progress (3): 122 kB | 37 kB | 53/58 kB&#xD;Progress (3): 122 kB | 37 kB | 57/58 kB&#xD;Progress (3): 122 kB | 37 kB | 58 kB   &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.9/maven-plugin-descriptor-2.0.9.jar (37 kB at 398 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/0.1/maven-shared-utils-0.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.9/maven-project-2.0.9.jar (122 kB at 1.3 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/2.0.1/jsr305-2.0.1.jar&#xA;Progress (2): 58 kB | 4.1/10 kB&#xD;Progress (2): 58 kB | 7.7/10 kB&#xD;Progress (2): 58 kB | 10 kB    &#xD;                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.9/maven-artifact-manager-2.0.9.jar (58 kB at 573 kB/s)&#xA;Progress (2): 10 kB | 4.1/33 kB&#xD;                               &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-incremental/1.1/maven-shared-incremental-1.1.jar&#xA;Progress (2): 10 kB | 7.7/33 kB&#xD;Progress (2): 10 kB | 12/33 kB &#xD;Progress (2): 10 kB | 16/33 kB&#xD;Progress (2): 10 kB | 20/33 kB&#xD;Progress (2): 10 kB | 24/33 kB&#xD;Progress (2): 10 kB | 28/33 kB&#xD;Progress (2): 10 kB | 32/33 kB&#xD;Progress (2): 10 kB | 33 kB   &#xD;Progress (3): 10 kB | 33 kB | 4.1/155 kB&#xD;Progress (3): 10 kB | 33 kB | 7.7/155 kB&#xD;Progress (3): 10 kB | 33 kB | 12/155 kB &#xD;Progress (3): 10 kB | 33 kB | 16/155 kB&#xD;Progress (3): 10 kB | 33 kB | 20/155 kB&#xD;Progress (3): 10 kB | 33 kB | 24/155 kB&#xD;Progress (3): 10 kB | 33 kB | 28/155 kB&#xD;Progress (3): 10 kB | 33 kB | 32/155 kB&#xD;Progress (3): 10 kB | 33 kB | 36/155 kB&#xD;Progress (3): 10 kB | 33 kB | 40/155 kB&#xD;Progress (3): 10 kB | 33 kB | 45/155 kB&#xD;Progress (3): 10 kB | 33 kB | 49/155 kB&#xD;Progress (3): 10 kB | 33 kB | 53/155 kB&#xD;Progress (3): 10 kB | 33 kB | 57/155 kB&#xD;Progress (3): 10 kB | 33 kB | 61/155 kB&#xD;Progress (3): 10 kB | 33 kB | 65/155 kB&#xD;Progress (3): 10 kB | 33 kB | 69/155 kB&#xD;Progress (3): 10 kB | 33 kB | 73/155 kB&#xD;Progress (3): 10 kB | 33 kB | 77/155 kB&#xD;Progress (3): 10 kB | 33 kB | 81/155 kB&#xD;Progress (3): 10 kB | 33 kB | 86/155 kB&#xD;Progress (3): 10 kB | 33 kB | 90/155 kB&#xD;Progress (3): 10 kB | 33 kB | 94/155 kB&#xD;Progress (3): 10 kB | 33 kB | 98/155 kB&#xD;Progress (3): 10 kB | 33 kB | 102/155 kB&#xD;Progress (3): 10 kB | 33 kB | 106/155 kB&#xD;Progress (3): 10 kB | 33 kB | 110/155 kB&#xD;Progress (3): 10 kB | 33 kB | 114/155 kB&#xD;Progress (3): 10 kB | 33 kB | 118/155 kB&#xD;Progress (3): 10 kB | 33 kB | 122/155 kB&#xD;Progress (3): 10 kB | 33 kB | 126/155 kB&#xD;Progress (3): 10 kB | 33 kB | 131/155 kB&#xD;Progress (3): 10 kB | 33 kB | 135/155 kB&#xD;Progress (3): 10 kB | 33 kB | 139/155 kB&#xD;Progress (3): 10 kB | 33 kB | 143/155 kB&#xD;Progress (3): 10 kB | 33 kB | 147/155 kB&#xD;Progress (3): 10 kB | 33 kB | 151/155 kB&#xD;Progress (3): 10 kB | 33 kB | 155 kB    &#xD;Progress (4): 10 kB | 33 kB | 155 kB | 4.1/32 kB&#xD;Progress (4): 10 kB | 33 kB | 155 kB | 7.7/32 kB&#xD;Progress (4): 10 kB | 33 kB | 155 kB | 12/32 kB &#xD;Progress (4): 10 kB | 33 kB | 155 kB | 16/32 kB&#xD;Progress (4): 10 kB | 33 kB | 155 kB | 20/32 kB&#xD;Progress (4): 10 kB | 33 kB | 155 kB | 24/32 kB&#xD;Progress (4): 10 kB | 33 kB | 155 kB | 28/32 kB&#xD;Progress (4): 10 kB | 33 kB | 155 kB | 32 kB   &#xD;Progress (5): 10 kB | 33 kB | 155 kB | 32 kB | 4.1/14 kB&#xD;Progress (5): 10 kB | 33 kB | 155 kB | 32 kB | 7.7/14 kB&#xD;Progress (5): 10 kB | 33 kB | 155 kB | 32 kB | 12/14 kB &#xD;Progress (5): 10 kB | 33 kB | 155 kB | 32 kB | 14 kB   &#xD;                                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.9/maven-monitor-2.0.9.jar (10 kB at 89 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/1.5.5/plexus-component-annotations-1.5.5.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/1.0/maven-toolchain-1.0.jar (33 kB at 279 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-api/2.2/plexus-compiler-api-2.2.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/2.0.1/jsr305-2.0.1.jar (32 kB at 247 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-manager/2.2/plexus-compiler-manager-2.2.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/0.1/maven-shared-utils-0.1.jar (155 kB at 1.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-javac/2.2/plexus-compiler-javac-2.2.jar&#xA;Progress (2): 14 kB | 4.1/4.2 kB&#xD;Progress (2): 14 kB | 4.2 kB    &#xD;                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-incremental/1.1/maven-shared-incremental-1.1.jar (14 kB at 100 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.5.5/plexus-container-default-1.5.5.jar&#xA;Progress (2): 4.2 kB | 4.1/25 kB&#xD;Progress (2): 4.2 kB | 7.7/25 kB&#xD;Progress (2): 4.2 kB | 12/25 kB &#xD;Progress (2): 4.2 kB | 16/25 kB&#xD;Progress (2): 4.2 kB | 20/25 kB&#xD;Progress (2): 4.2 kB | 24/25 kB&#xD;Progress (2): 4.2 kB | 25 kB   &#xD;Progress (3): 4.2 kB | 25 kB | 4.1/19 kB&#xD;Progress (3): 4.2 kB | 25 kB | 7.7/19 kB&#xD;Progress (3): 4.2 kB | 25 kB | 12/19 kB &#xD;Progress (3): 4.2 kB | 25 kB | 16/19 kB&#xD;Progress (3): 4.2 kB | 25 kB | 19 kB   &#xD;Progress (4): 4.2 kB | 25 kB | 19 kB | 4.1/4.6 kB&#xD;Progress (4): 4.2 kB | 25 kB | 19 kB | 4.6 kB    &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/1.5.5/plexus-component-annotations-1.5.5.jar (4.2 kB at 28 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.2/plexus-classworlds-2.2.2.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-api/2.2/plexus-compiler-api-2.2.jar (25 kB at 168 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean-reflect/3.4/xbean-reflect-3.4.jar&#xA;Progress (3): 19 kB | 4.6 kB | 4.1/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 7.7/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 12/217 kB &#xD;Progress (3): 19 kB | 4.6 kB | 16/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 20/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 24/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 28/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 32/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 36/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 40/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 44/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 48/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 52/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 56/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 61/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 65/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 69/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 73/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 77/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 81/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 85/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 89/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 93/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 97/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 101/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 106/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 110/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 114/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 118/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 122/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 126/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 130/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 134/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 138/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 142/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 147/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 151/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 155/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 159/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 163/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 167/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 171/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 175/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 179/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 183/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 187/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 192/217 kB&#xD;Progress (3): 19 kB | 4.6 kB | 196/217 kB&#xD;                                         &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-manager/2.2/plexus-compiler-manager-2.2.jar (4.6 kB at 28 kB/s)&#xA;Progress (2): 19 kB | 200/217 kB&#xD;                                &#xD;Downloading from central: https://repo.maven.apache.org/maven2/log4j/log4j/1.2.12/log4j-1.2.12.jar&#xA;Progress (2): 19 kB | 204/217 kB&#xD;Progress (2): 19 kB | 208/217 kB&#xD;Progress (2): 19 kB | 212/217 kB&#xD;Progress (2): 19 kB | 216/217 kB&#xD;Progress (2): 19 kB | 217 kB    &#xD;                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-javac/2.2/plexus-compiler-javac-2.2.jar (19 kB at 118 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-logging/commons-logging-api/1.1/commons-logging-api-1.1.jar&#xA;Progress (2): 217 kB | 4.1/134 kB&#xD;Progress (2): 217 kB | 7.7/134 kB&#xD;Progress (2): 217 kB | 12/134 kB &#xD;Progress (2): 217 kB | 16/134 kB&#xD;Progress (2): 217 kB | 20/134 kB&#xD;Progress (2): 217 kB | 24/134 kB&#xD;Progress (2): 217 kB | 28/134 kB&#xD;Progress (2): 217 kB | 32/134 kB&#xD;Progress (2): 217 kB | 36/134 kB&#xD;Progress (2): 217 kB | 40/134 kB&#xD;Progress (2): 217 kB | 45/134 kB&#xD;Progress (2): 217 kB | 49/134 kB&#xD;Progress (2): 217 kB | 53/134 kB&#xD;Progress (2): 217 kB | 57/134 kB&#xD;Progress (2): 217 kB | 61/134 kB&#xD;Progress (2): 217 kB | 65/134 kB&#xD;Progress (2): 217 kB | 69/134 kB&#xD;Progress (2): 217 kB | 73/134 kB&#xD;Progress (2): 217 kB | 77/134 kB&#xD;Progress (2): 217 kB | 81/134 kB&#xD;Progress (2): 217 kB | 86/134 kB&#xD;Progress (2): 217 kB | 90/134 kB&#xD;Progress (2): 217 kB | 94/134 kB&#xD;Progress (2): 217 kB | 98/134 kB&#xD;Progress (2): 217 kB | 102/134 kB&#xD;Progress (2): 217 kB | 106/134 kB&#xD;Progress (3): 217 kB | 106/134 kB | 4.1/46 kB&#xD;Progress (3): 217 kB | 106/134 kB | 7.7/46 kB&#xD;Progress (3): 217 kB | 110/134 kB | 7.7/46 kB&#xD;Progress (3): 217 kB | 110/134 kB | 12/46 kB &#xD;Progress (3): 217 kB | 114/134 kB | 12/46 kB&#xD;Progress (3): 217 kB | 114/134 kB | 16/46 kB&#xD;Progress (3): 217 kB | 118/134 kB | 16/46 kB&#xD;Progress (3): 217 kB | 122/134 kB | 16/46 kB&#xD;Progress (3): 217 kB | 122/134 kB | 20/46 kB&#xD;Progress (3): 217 kB | 126/134 kB | 20/46 kB&#xD;Progress (3): 217 kB | 126/134 kB | 24/46 kB&#xD;Progress (3): 217 kB | 131/134 kB | 24/46 kB&#xD;Progress (3): 217 kB | 131/134 kB | 28/46 kB&#xD;Progress (3): 217 kB | 134 kB | 28/46 kB    &#xD;Progress (3): 217 kB | 134 kB | 32/46 kB&#xD;Progress (3): 217 kB | 134 kB | 36/46 kB&#xD;Progress (3): 217 kB | 134 kB | 40/46 kB&#xD;Progress (3): 217 kB | 134 kB | 44/46 kB&#xD;Progress (3): 217 kB | 134 kB | 46 kB   &#xD;Progress (4): 217 kB | 134 kB | 46 kB | 4.1/45 kB&#xD;Progress (4): 217 kB | 134 kB | 46 kB | 7.7/45 kB&#xD;Progress (4): 217 kB | 134 kB | 46 kB | 12/45 kB &#xD;Progress (4): 217 kB | 134 kB | 46 kB | 16/45 kB&#xD;Progress (4): 217 kB | 134 kB | 46 kB | 20/45 kB&#xD;Progress (4): 217 kB | 134 kB | 46 kB | 24/45 kB&#xD;Progress (4): 217 kB | 134 kB | 46 kB | 28/45 kB&#xD;Progress (4): 217 kB | 134 kB | 46 kB | 32/45 kB&#xD;Progress (4): 217 kB | 134 kB | 46 kB | 36/45 kB&#xD;Progress (4): 217 kB | 134 kB | 46 kB | 40/45 kB&#xD;Progress (4): 217 kB | 134 kB | 46 kB | 45/45 kB&#xD;                                                &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.5.5/plexus-container-default-1.5.5.jar (217 kB at 1.2 MB/s)&#xA;Progress (3): 134 kB | 46 kB | 45 kB&#xD;                                    &#xD;Downloading from central: https://repo.maven.apache.org/maven2/com/google/collections/google-collections/1.0/google-collections-1.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean-reflect/3.4/xbean-reflect-3.4.jar (134 kB at 748 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.2/junit-3.8.2.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.2/plexus-classworlds-2.2.2.jar (46 kB at 253 kB/s)&#xA;Progress (2): 45 kB | 4.1/358 kB&#xD;Progress (2): 45 kB | 7.7/358 kB&#xD;Progress (2): 45 kB | 12/358 kB &#xD;Progress (2): 45 kB | 16/358 kB&#xD;Progress (2): 45 kB | 20/358 kB&#xD;Progress (2): 45 kB | 24/358 kB&#xD;Progress (2): 45 kB | 28/358 kB&#xD;Progress (2): 45 kB | 32/358 kB&#xD;Progress (2): 45 kB | 36/358 kB&#xD;Progress (2): 45 kB | 40/358 kB&#xD;Progress (2): 45 kB | 44/358 kB&#xD;Progress (2): 45 kB | 48/358 kB&#xD;Progress (2): 45 kB | 52/358 kB&#xD;Progress (2): 45 kB | 56/358 kB&#xD;Progress (2): 45 kB | 61/358 kB&#xD;Progress (2): 45 kB | 65/358 kB&#xD;Progress (2): 45 kB | 69/358 kB&#xD;Progress (2): 45 kB | 73/358 kB&#xD;Progress (2): 45 kB | 77/358 kB&#xD;Progress (2): 45 kB | 81/358 kB&#xD;Progress (2): 45 kB | 85/358 kB&#xD;Progress (2): 45 kB | 89/358 kB&#xD;Progress (2): 45 kB | 93/358 kB&#xD;Progress (2): 45 kB | 97/358 kB&#xD;Progress (2): 45 kB | 102/358 kB&#xD;Progress (2): 45 kB | 106/358 kB&#xD;Progress (2): 45 kB | 110/358 kB&#xD;Progress (2): 45 kB | 114/358 kB&#xD;Progress (2): 45 kB | 118/358 kB&#xD;Progress (2): 45 kB | 122/358 kB&#xD;Progress (2): 45 kB | 126/358 kB&#xD;Progress (2): 45 kB | 130/358 kB&#xD;Progress (2): 45 kB | 134/358 kB&#xD;Progress (2): 45 kB | 138/358 kB&#xD;Progress (2): 45 kB | 142/358 kB&#xD;Progress (2): 45 kB | 147/358 kB&#xD;Progress (2): 45 kB | 151/358 kB&#xD;Progress (2): 45 kB | 155/358 kB&#xD;Progress (2): 45 kB | 159/358 kB&#xD;Progress (2): 45 kB | 163/358 kB&#xD;Progress (2): 45 kB | 167/358 kB&#xD;Progress (2): 45 kB | 171/358 kB&#xD;Progress (2): 45 kB | 175/358 kB&#xD;Progress (2): 45 kB | 179/358 kB&#xD;Progress (2): 45 kB | 183/358 kB&#xD;Progress (2): 45 kB | 188/358 kB&#xD;Progress (2): 45 kB | 192/358 kB&#xD;Progress (2): 45 kB | 196/358 kB&#xD;Progress (2): 45 kB | 200/358 kB&#xD;Progress (2): 45 kB | 204/358 kB&#xD;Progress (2): 45 kB | 208/358 kB&#xD;Progress (2): 45 kB | 212/358 kB&#xD;Progress (2): 45 kB | 216/358 kB&#xD;Progress (2): 45 kB | 220/358 kB&#xD;Progress (2): 45 kB | 224/358 kB&#xD;Progress (2): 45 kB | 228/358 kB&#xD;Progress (2): 45 kB | 233/358 kB&#xD;Progress (2): 45 kB | 237/358 kB&#xD;Progress (2): 45 kB | 241/358 kB&#xD;Progress (2): 45 kB | 245/358 kB&#xD;Progress (2): 45 kB | 249/358 kB&#xD;Progress (2): 45 kB | 253/358 kB&#xD;Progress (2): 45 kB | 257/358 kB&#xD;Progress (2): 45 kB | 261/358 kB&#xD;Progress (2): 45 kB | 265/358 kB&#xD;Progress (2): 45 kB | 269/358 kB&#xD;Progress (2): 45 kB | 274/358 kB&#xD;Progress (2): 45 kB | 278/358 kB&#xD;Progress (2): 45 kB | 282/358 kB&#xD;Progress (2): 45 kB | 286/358 kB&#xD;Progress (2): 45 kB | 290/358 kB&#xD;Progress (2): 45 kB | 294/358 kB&#xD;Progress (2): 45 kB | 298/358 kB&#xD;Progress (2): 45 kB | 302/358 kB&#xD;Progress (2): 45 kB | 306/358 kB&#xD;Progress (2): 45 kB | 310/358 kB&#xD;Progress (2): 45 kB | 314/358 kB&#xD;Progress (2): 45 kB | 319/358 kB&#xD;Progress (2): 45 kB | 323/358 kB&#xD;Progress (2): 45 kB | 327/358 kB&#xD;Progress (2): 45 kB | 331/358 kB&#xD;Progress (2): 45 kB | 335/358 kB&#xD;Progress (2): 45 kB | 339/358 kB&#xD;Progress (2): 45 kB | 343/358 kB&#xD;Progress (2): 45 kB | 347/358 kB&#xD;Progress (2): 45 kB | 351/358 kB&#xD;Progress (2): 45 kB | 355/358 kB&#xD;Progress (2): 45 kB | 358 kB    &#xD;Progress (3): 45 kB | 358 kB | 4.1/121 kB&#xD;Progress (3): 45 kB | 358 kB | 7.7/121 kB&#xD;Progress (3): 45 kB | 358 kB | 12/121 kB &#xD;Progress (3): 45 kB | 358 kB | 16/121 kB&#xD;Progress (3): 45 kB | 358 kB | 20/121 kB&#xD;Progress (3): 45 kB | 358 kB | 24/121 kB&#xD;                                        &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-logging/commons-logging-api/1.1/commons-logging-api-1.1.jar (45 kB at 229 kB/s)&#xA;Progress (2): 358 kB | 28/121 kB&#xD;Progress (2): 358 kB | 32/121 kB&#xD;Progress (2): 358 kB | 36/121 kB&#xD;Progress (2): 358 kB | 40/121 kB&#xD;Progress (2): 358 kB | 45/121 kB&#xD;Progress (2): 358 kB | 49/121 kB&#xD;Progress (2): 358 kB | 53/121 kB&#xD;Progress (2): 358 kB | 57/121 kB&#xD;Progress (3): 358 kB | 57/121 kB | 4.1/640 kB&#xD;Progress (3): 358 kB | 61/121 kB | 4.1/640 kB&#xD;Progress (3): 358 kB | 61/121 kB | 7.7/640 kB&#xD;Progress (3): 358 kB | 65/121 kB | 7.7/640 kB&#xD;Progress (3): 358 kB | 65/121 kB | 12/640 kB &#xD;Progress (3): 358 kB | 69/121 kB | 12/640 kB&#xD;Progress (3): 358 kB | 69/121 kB | 16/640 kB&#xD;Progress (3): 358 kB | 73/121 kB | 16/640 kB&#xD;Progress (3): 358 kB | 77/121 kB | 16/640 kB&#xD;Progress (3): 358 kB | 77/121 kB | 20/640 kB&#xD;Progress (3): 358 kB | 81/121 kB | 20/640 kB&#xD;Progress (3): 358 kB | 81/121 kB | 24/640 kB&#xD;Progress (3): 358 kB | 86/121 kB | 24/640 kB&#xD;Progress (3): 358 kB | 86/121 kB | 28/640 kB&#xD;Progress (3): 358 kB | 90/121 kB | 28/640 kB&#xD;Progress (3): 358 kB | 90/121 kB | 32/640 kB&#xD;Progress (3): 358 kB | 94/121 kB | 32/640 kB&#xD;Progress (3): 358 kB | 98/121 kB | 32/640 kB&#xD;Progress (3): 358 kB | 98/121 kB | 36/640 kB&#xD;Progress (3): 358 kB | 102/121 kB | 36/640 kB&#xD;Progress (3): 358 kB | 102/121 kB | 40/640 kB&#xD;Progress (3): 358 kB | 106/121 kB | 40/640 kB&#xD;Progress (3): 358 kB | 106/121 kB | 45/640 kB&#xD;Progress (3): 358 kB | 106/121 kB | 49/640 kB&#xD;Progress (3): 358 kB | 110/121 kB | 49/640 kB&#xD;Progress (3): 358 kB | 114/121 kB | 49/640 kB&#xD;Progress (3): 358 kB | 114/121 kB | 53/640 kB&#xD;Progress (3): 358 kB | 118/121 kB | 53/640 kB&#xD;Progress (3): 358 kB | 118/121 kB | 57/640 kB&#xD;Progress (3): 358 kB | 121 kB | 57/640 kB    &#xD;Progress (3): 358 kB | 121 kB | 61/640 kB&#xD;Progress (3): 358 kB | 121 kB | 65/640 kB&#xD;Progress (3): 358 kB | 121 kB | 69/640 kB&#xD;Progress (3): 358 kB | 121 kB | 73/640 kB&#xD;Progress (3): 358 kB | 121 kB | 77/640 kB&#xD;Progress (3): 358 kB | 121 kB | 81/640 kB&#xD;Progress (3): 358 kB | 121 kB | 86/640 kB&#xD;Progress (3): 358 kB | 121 kB | 90/640 kB&#xD;Progress (3): 358 kB | 121 kB | 94/640 kB&#xD;Progress (3): 358 kB | 121 kB | 98/640 kB&#xD;Progress (3): 358 kB | 121 kB | 102/640 kB&#xD;Progress (3): 358 kB | 121 kB | 106/640 kB&#xD;Progress (3): 358 kB | 121 kB | 110/640 kB&#xD;Progress (3): 358 kB | 121 kB | 114/640 kB&#xD;Progress (3): 358 kB | 121 kB | 118/640 kB&#xD;Progress (3): 358 kB | 121 kB | 122/640 kB&#xD;Progress (3): 358 kB | 121 kB | 126/640 kB&#xD;Progress (3): 358 kB | 121 kB | 131/640 kB&#xD;Progress (3): 358 kB | 121 kB | 135/640 kB&#xD;Progress (3): 358 kB | 121 kB | 139/640 kB&#xD;Progress (3): 358 kB | 121 kB | 143/640 kB&#xD;Progress (3): 358 kB | 121 kB | 147/640 kB&#xD;Progress (3): 358 kB | 121 kB | 151/640 kB&#xD;Progress (3): 358 kB | 121 kB | 155/640 kB&#xD;Progress (3): 358 kB | 121 kB | 159/640 kB&#xD;Progress (3): 358 kB | 121 kB | 163/640 kB&#xD;Progress (3): 358 kB | 121 kB | 167/640 kB&#xD;Progress (3): 358 kB | 121 kB | 172/640 kB&#xD;Progress (3): 358 kB | 121 kB | 176/640 kB&#xD;Progress (3): 358 kB | 121 kB | 180/640 kB&#xD;Progress (3): 358 kB | 121 kB | 184/640 kB&#xD;Progress (3): 358 kB | 121 kB | 188/640 kB&#xD;Progress (3): 358 kB | 121 kB | 192/640 kB&#xD;Progress (3): 358 kB | 121 kB | 196/640 kB&#xD;Progress (3): 358 kB | 121 kB | 200/640 kB&#xD;Progress (3): 358 kB | 121 kB | 204/640 kB&#xD;Progress (3): 358 kB | 121 kB | 208/640 kB&#xD;Progress (3): 358 kB | 121 kB | 213/640 kB&#xD;Progress (3): 358 kB | 121 kB | 217/640 kB&#xD;Progress (3): 358 kB | 121 kB | 221/640 kB&#xD;Progress (3): 358 kB | 121 kB | 225/640 kB&#xD;Progress (3): 358 kB | 121 kB | 229/640 kB&#xD;Progress (3): 358 kB | 121 kB | 233/640 kB&#xD;Progress (3): 358 kB | 121 kB | 237/640 kB&#xD;Progress (3): 358 kB | 121 kB | 241/640 kB&#xD;Progress (3): 358 kB | 121 kB | 245/640 kB&#xD;Progress (3): 358 kB | 121 kB | 249/640 kB&#xD;Progress (3): 358 kB | 121 kB | 253/640 kB&#xD;Progress (3): 358 kB | 121 kB | 258/640 kB&#xD;Progress (3): 358 kB | 121 kB | 262/640 kB&#xD;Progress (3): 358 kB | 121 kB | 266/640 kB&#xD;Progress (3): 358 kB | 121 kB | 270/640 kB&#xD;Progress (3): 358 kB | 121 kB | 274/640 kB&#xD;Progress (3): 358 kB | 121 kB | 278/640 kB&#xD;Progress (3): 358 kB | 121 kB | 282/640 kB&#xD;Progress (3): 358 kB | 121 kB | 286/640 kB&#xD;Progress (3): 358 kB | 121 kB | 290/640 kB&#xD;Progress (3): 358 kB | 121 kB | 294/640 kB&#xD;Progress (3): 358 kB | 121 kB | 299/640 kB&#xD;Progress (3): 358 kB | 121 kB | 303/640 kB&#xD;Progress (3): 358 kB | 121 kB | 307/640 kB&#xD;Progress (3): 358 kB | 121 kB | 311/640 kB&#xD;Progress (3): 358 kB | 121 kB | 315/640 kB&#xD;Progress (3): 358 kB | 121 kB | 319/640 kB&#xD;Progress (3): 358 kB | 121 kB | 323/640 kB&#xD;Progress (3): 358 kB | 121 kB | 327/640 kB&#xD;Progress (3): 358 kB | 121 kB | 331/640 kB&#xD;Progress (3): 358 kB | 121 kB | 335/640 kB&#xD;Progress (3): 358 kB | 121 kB | 339/640 kB&#xD;Progress (3): 358 kB | 121 kB | 344/640 kB&#xD;Progress (3): 358 kB | 121 kB | 348/640 kB&#xD;Progress (3): 358 kB | 121 kB | 352/640 kB&#xD;Progress (3): 358 kB | 121 kB | 356/640 kB&#xD;Progress (3): 358 kB | 121 kB | 360/640 kB&#xD;Progress (3): 358 kB | 121 kB | 364/640 kB&#xD;Progress (3): 358 kB | 121 kB | 368/640 kB&#xD;Progress (3): 358 kB | 121 kB | 372/640 kB&#xD;Progress (3): 358 kB | 121 kB | 376/640 kB&#xD;Progress (3): 358 kB | 121 kB | 380/640 kB&#xD;Progress (3): 358 kB | 121 kB | 385/640 kB&#xD;Progress (3): 358 kB | 121 kB | 389/640 kB&#xD;Progress (3): 358 kB | 121 kB | 393/640 kB&#xD;Progress (3): 358 kB | 121 kB | 397/640 kB&#xD;Progress (3): 358 kB | 121 kB | 401/640 kB&#xD;Progress (3): 358 kB | 121 kB | 405/640 kB&#xD;Progress (3): 358 kB | 121 kB | 409/640 kB&#xD;Progress (3): 358 kB | 121 kB | 413/640 kB&#xD;Progress (3): 358 kB | 121 kB | 417/640 kB&#xD;Progress (3): 358 kB | 121 kB | 421/640 kB&#xD;Progress (3): 358 kB | 121 kB | 426/640 kB&#xD;Progress (3): 358 kB | 121 kB | 430/640 kB&#xD;Progress (3): 358 kB | 121 kB | 434/640 kB&#xD;Progress (3): 358 kB | 121 kB | 438/640 kB&#xD;Progress (3): 358 kB | 121 kB | 442/640 kB&#xD;Progress (3): 358 kB | 121 kB | 446/640 kB&#xD;Progress (3): 358 kB | 121 kB | 450/640 kB&#xD;Progress (3): 358 kB | 121 kB | 454/640 kB&#xD;Progress (3): 358 kB | 121 kB | 458/640 kB&#xD;Progress (3): 358 kB | 121 kB | 462/640 kB&#xD;Progress (3): 358 kB | 121 kB | 466/640 kB&#xD;Progress (3): 358 kB | 121 kB | 471/640 kB&#xD;Progress (3): 358 kB | 121 kB | 475/640 kB&#xD;Progress (3): 358 kB | 121 kB | 479/640 kB&#xD;Progress (3): 358 kB | 121 kB | 483/640 kB&#xD;Progress (3): 358 kB | 121 kB | 487/640 kB&#xD;Progress (3): 358 kB | 121 kB | 491/640 kB&#xD;Progress (3): 358 kB | 121 kB | 495/640 kB&#xD;Progress (3): 358 kB | 121 kB | 499/640 kB&#xD;Progress (3): 358 kB | 121 kB | 503/640 kB&#xD;Progress (3): 358 kB | 121 kB | 507/640 kB&#xD;Progress (3): 358 kB | 121 kB | 512/640 kB&#xD;Progress (3): 358 kB | 121 kB | 516/640 kB&#xD;Progress (3): 358 kB | 121 kB | 520/640 kB&#xD;Progress (3): 358 kB | 121 kB | 524/640 kB&#xD;Progress (3): 358 kB | 121 kB | 528/640 kB&#xD;Progress (3): 358 kB | 121 kB | 532/640 kB&#xD;Progress (3): 358 kB | 121 kB | 536/640 kB&#xD;Progress (3): 358 kB | 121 kB | 540/640 kB&#xD;Progress (3): 358 kB | 121 kB | 544/640 kB&#xD;Progress (3): 358 kB | 121 kB | 548/640 kB&#xD;Progress (3): 358 kB | 121 kB | 552/640 kB&#xD;Progress (3): 358 kB | 121 kB | 557/640 kB&#xD;Progress (3): 358 kB | 121 kB | 561/640 kB&#xD;Progress (3): 358 kB | 121 kB | 565/640 kB&#xD;Progress (3): 358 kB | 121 kB | 569/640 kB&#xD;Progress (3): 358 kB | 121 kB | 573/640 kB&#xD;Progress (3): 358 kB | 121 kB | 577/640 kB&#xD;Progress (3): 358 kB | 121 kB | 581/640 kB&#xD;Progress (3): 358 kB | 121 kB | 585/640 kB&#xD;Progress (3): 358 kB | 121 kB | 589/640 kB&#xD;Progress (3): 358 kB | 121 kB | 593/640 kB&#xD;Progress (3): 358 kB | 121 kB | 598/640 kB&#xD;Progress (3): 358 kB | 121 kB | 602/640 kB&#xD;Progress (3): 358 kB | 121 kB | 606/640 kB&#xD;Progress (3): 358 kB | 121 kB | 610/640 kB&#xD;Progress (3): 358 kB | 121 kB | 614/640 kB&#xD;Progress (3): 358 kB | 121 kB | 618/640 kB&#xD;Progress (3): 358 kB | 121 kB | 622/640 kB&#xD;Progress (3): 358 kB | 121 kB | 626/640 kB&#xD;Progress (3): 358 kB | 121 kB | 630/640 kB&#xD;Progress (3): 358 kB | 121 kB | 634/640 kB&#xD;Progress (3): 358 kB | 121 kB | 638/640 kB&#xD;Progress (3): 358 kB | 121 kB | 640 kB    &#xD;                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.2/junit-3.8.2.jar (121 kB at 574 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/log4j/log4j/1.2.12/log4j-1.2.12.jar (358 kB at 1.7 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/collections/google-collections/1.0/google-collections-1.0.jar (640 kB at 2.8 MB/s)&#xA;[INFO] Changes detected - recompiling the module!&#xA;[WARNING] File encoding has not been set, using platform encoding UTF-8, i.e. build is platform dependent!&#xA;[INFO] Compiling 1 source file to /work/target/classes&#xA;[INFO] &#xA;[INFO] --- maven-resources-plugin:2.6:testResources (default-testResources) @ simple-java-project ---&#xA;[WARNING] Using platform encoding (UTF-8 actually) to copy filtered resources, i.e. build is platform dependent!&#xA;[INFO] skip non existing resourceDirectory /work/src/test/resources&#xA;[INFO] &#xA;[INFO] --- maven-compiler-plugin:3.1:testCompile (default-testCompile) @ simple-java-project ---&#xA;[INFO] No sources to compile&#xA;[INFO] &#xA;[INFO] --- maven-surefire-plugin:2.12.4:test (default-test) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-booter/2.12.4/surefire-booter-2.12.4.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-booter/2.12.4/surefire-booter-2.12.4.pom (3.0 kB at 98 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-api/2.12.4/surefire-api-2.12.4.pom&#xA;Progress (1): 2.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-api/2.12.4/surefire-api-2.12.4.pom (2.5 kB at 78 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/maven-surefire-common/2.12.4/maven-surefire-common-2.12.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/maven-surefire-common/2.12.4/maven-surefire-common-2.12.4.pom (5.5 kB at 168 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-annotations/3.1/maven-plugin-annotations-3.1.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-annotations/3.1/maven-plugin-annotations-3.1.pom (1.6 kB at 48 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-tools/3.1/maven-plugin-tools-3.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-tools/3.1/maven-plugin-tools-3.1.pom (16 kB at 490 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.9/maven-reporting-api-2.0.9.pom&#xA;Progress (1): 1.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.9/maven-reporting-api-2.0.9.pom (1.8 kB at 39 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting/2.0.9/maven-reporting-2.0.9.pom&#xA;Progress (1): 1.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting/2.0.9/maven-reporting-2.0.9.pom (1.5 kB at 40 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/2.0.9/maven-toolchain-2.0.9.pom&#xA;Progress (1): 3.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/2.0.9/maven-toolchain-2.0.9.pom (3.5 kB at 109 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.1/commons-lang3-3.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 17 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.1/commons-lang3-3.1.pom (17 kB at 408 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/22/commons-parent-22.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 42 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/22/commons-parent-22.pom (42 kB at 349 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/9/apache-9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/9/apache-9.pom (15 kB at 523 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/1.3/maven-common-artifact-filters-1.3.pom&#xA;Progress (1): 3.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/1.3/maven-common-artifact-filters-1.3.pom (3.7 kB at 123 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/12/maven-shared-components-12.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/12/maven-shared-components-12.pom (9.3 kB at 311 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/13/maven-parent-13.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 23 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/13/maven-parent-13.pom (23 kB at 780 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/6/apache-6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 13 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/6/apache-6.pom (13 kB at 355 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9/plexus-container-default-1.0-alpha-9.pom&#xA;Progress (1): 1.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9/plexus-container-default-1.0-alpha-9.pom (1.2 kB at 41 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-booter/2.12.4/surefire-booter-2.12.4.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-api/2.12.4/surefire-api-2.12.4.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/maven-surefire-common/2.12.4/maven-surefire-common-2.12.4.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.1/commons-lang3-3.1.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/1.3/maven-common-artifact-filters-1.3.jar&#xA;Progress (1): 4.1/35 kB&#xD;Progress (1): 7.3/35 kB&#xD;Progress (1): 11/35 kB &#xD;Progress (1): 15/35 kB&#xD;Progress (1): 20/35 kB&#xD;Progress (1): 24/35 kB&#xD;Progress (1): 28/35 kB&#xD;Progress (1): 32/35 kB&#xD;Progress (1): 35 kB   &#xD;Progress (2): 35 kB | 4.1/31 kB&#xD;Progress (2): 35 kB | 7.7/31 kB&#xD;Progress (2): 35 kB | 12/31 kB &#xD;Progress (2): 35 kB | 16/31 kB&#xD;Progress (2): 35 kB | 20/31 kB&#xD;Progress (2): 35 kB | 24/31 kB&#xD;Progress (2): 35 kB | 28/31 kB&#xD;Progress (2): 35 kB | 31 kB   &#xD;Progress (3): 35 kB | 31 kB | 4.1/118 kB&#xD;Progress (3): 35 kB | 31 kB | 7.7/118 kB&#xD;Progress (3): 35 kB | 31 kB | 12/118 kB &#xD;Progress (3): 35 kB | 31 kB | 15/118 kB&#xD;Progress (3): 35 kB | 31 kB | 20/118 kB&#xD;Progress (3): 35 kB | 31 kB | 24/118 kB&#xD;Progress (3): 35 kB | 31 kB | 28/118 kB&#xD;Progress (3): 35 kB | 31 kB | 32/118 kB&#xD;Progress (3): 35 kB | 31 kB | 36/118 kB&#xD;Progress (3): 35 kB | 31 kB | 40/118 kB&#xD;Progress (3): 35 kB | 31 kB | 44/118 kB&#xD;Progress (3): 35 kB | 31 kB | 48/118 kB&#xD;Progress (4): 35 kB | 31 kB | 48/118 kB | 4.1/263 kB&#xD;Progress (4): 35 kB | 31 kB | 52/118 kB | 4.1/263 kB&#xD;Progress (4): 35 kB | 31 kB | 52/118 kB | 7.7/263 kB&#xD;Progress (4): 35 kB | 31 kB | 56/118 kB | 7.7/263 kB&#xD;Progress (4): 35 kB | 31 kB | 56/118 kB | 12/263 kB &#xD;Progress (4): 35 kB | 31 kB | 61/118 kB | 12/263 kB&#xD;Progress (4): 35 kB | 31 kB | 61/118 kB | 16/263 kB&#xD;Progress (4): 35 kB | 31 kB | 65/118 kB | 16/263 kB&#xD;Progress (4): 35 kB | 31 kB | 65/118 kB | 20/263 kB&#xD;Progress (4): 35 kB | 31 kB | 65/118 kB | 24/263 kB&#xD;Progress (4): 35 kB | 31 kB | 69/118 kB | 24/263 kB&#xD;Progress (4): 35 kB | 31 kB | 73/118 kB | 24/263 kB&#xD;Progress (4): 35 kB | 31 kB | 77/118 kB | 24/263 kB&#xD;Progress (4): 35 kB | 31 kB | 77/118 kB | 28/263 kB&#xD;Progress (4): 35 kB | 31 kB | 81/118 kB | 28/263 kB&#xD;Progress (4): 35 kB | 31 kB | 81/118 kB | 32/263 kB&#xD;Progress (4): 35 kB | 31 kB | 81/118 kB | 36/263 kB&#xD;Progress (4): 35 kB | 31 kB | 81/118 kB | 40/263 kB&#xD;Progress (4): 35 kB | 31 kB | 85/118 kB | 40/263 kB&#xD;Progress (4): 35 kB | 31 kB | 89/118 kB | 40/263 kB&#xD;Progress (4): 35 kB | 31 kB | 89/118 kB | 45/263 kB&#xD;Progress (4): 35 kB | 31 kB | 93/118 kB | 45/263 kB&#xD;Progress (4): 35 kB | 31 kB | 93/118 kB | 49/263 kB&#xD;Progress (4): 35 kB | 31 kB | 97/118 kB | 49/263 kB&#xD;Progress (4): 35 kB | 31 kB | 101/118 kB | 49/263 kB&#xD;Progress (4): 35 kB | 31 kB | 106/118 kB | 49/263 kB&#xD;Progress (4): 35 kB | 31 kB | 110/118 kB | 49/263 kB&#xD;Progress (4): 35 kB | 31 kB | 114/118 kB | 49/263 kB&#xD;Progress (4): 35 kB | 31 kB | 118 kB | 49/263 kB    &#xD;Progress (4): 35 kB | 31 kB | 118 kB | 53/263 kB&#xD;Progress (4): 35 kB | 31 kB | 118 kB | 57/263 kB&#xD;Progress (4): 35 kB | 31 kB | 118 kB | 61/263 kB&#xD;Progress (4): 35 kB | 31 kB | 118 kB | 65/263 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 65/263 kB | 4.1/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 65/263 kB | 7.7/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 69/263 kB | 7.7/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 73/263 kB | 7.7/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 77/263 kB | 7.7/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 81/263 kB | 7.7/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 81/263 kB | 12/316 kB &#xD;Progress (5): 35 kB | 31 kB | 118 kB | 81/263 kB | 16/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 81/263 kB | 20/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 81/263 kB | 24/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 86/263 kB | 24/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 90/263 kB | 24/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 94/263 kB | 24/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 94/263 kB | 28/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 98/263 kB | 28/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 98/263 kB | 32/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 98/263 kB | 36/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 98/263 kB | 40/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 102/263 kB | 40/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 106/263 kB | 40/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 110/263 kB | 40/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 114/263 kB | 40/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 114/263 kB | 45/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 114/263 kB | 49/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 114/263 kB | 53/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 114/263 kB | 57/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 114/263 kB | 61/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 114/263 kB | 65/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 118/263 kB | 65/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 122/263 kB | 65/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 122/263 kB | 69/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 126/263 kB | 69/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 126/263 kB | 73/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 131/263 kB | 73/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 131/263 kB | 77/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 131/263 kB | 81/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 135/263 kB | 81/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 135/263 kB | 86/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 139/263 kB | 86/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 139/263 kB | 90/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 143/263 kB | 90/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 147/263 kB | 90/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 147/263 kB | 94/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 151/263 kB | 94/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 151/263 kB | 98/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 155/263 kB | 98/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 155/263 kB | 102/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 159/263 kB | 102/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 159/263 kB | 106/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 163/263 kB | 106/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 163/263 kB | 110/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 167/263 kB | 110/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 167/263 kB | 114/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 172/263 kB | 114/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 172/263 kB | 118/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 176/263 kB | 118/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 176/263 kB | 122/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 180/263 kB | 122/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 180/263 kB | 126/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 180/263 kB | 131/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 184/263 kB | 131/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 184/263 kB | 135/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 188/263 kB | 135/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 192/263 kB | 135/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 192/263 kB | 139/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 196/263 kB | 139/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 196/263 kB | 143/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 196/263 kB | 147/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 200/263 kB | 147/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 200/263 kB | 151/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 204/263 kB | 151/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 204/263 kB | 155/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 208/263 kB | 155/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 213/263 kB | 155/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 213/263 kB | 159/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 213/263 kB | 163/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 217/263 kB | 163/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 217/263 kB | 167/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 221/263 kB | 167/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 221/263 kB | 172/316 kB&#xD;Progress (5): 35 kB | 31 kB | 118 kB | 225/263 kB | 172/316 kB&#xD;                                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-booter/2.12.4/surefire-booter-2.12.4.jar (35 kB at 1.1 MB/s)&#xA;Progress (4): 31 kB | 118 kB | 229/263 kB | 172/316 kB&#xD;Progress (4): 31 kB | 118 kB | 229/263 kB | 176/316 kB&#xD;                                                      &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0.8/plexus-utils-3.0.8.jar&#xA;Progress (4): 31 kB | 118 kB | 229/263 kB | 180/316 kB&#xD;Progress (4): 31 kB | 118 kB | 229/263 kB | 184/316 kB&#xD;Progress (4): 31 kB | 118 kB | 233/263 kB | 184/316 kB&#xD;Progress (4): 31 kB | 118 kB | 233/263 kB | 188/316 kB&#xD;Progress (4): 31 kB | 118 kB | 237/263 kB | 188/316 kB&#xD;Progress (4): 31 kB | 118 kB | 241/263 kB | 188/316 kB&#xD;Progress (4): 31 kB | 118 kB | 245/263 kB | 188/316 kB&#xD;Progress (4): 31 kB | 118 kB | 245/263 kB | 192/316 kB&#xD;Progress (4): 31 kB | 118 kB | 245/263 kB | 196/316 kB&#xD;Progress (4): 31 kB | 118 kB | 245/263 kB | 200/316 kB&#xD;Progress (4): 31 kB | 118 kB | 249/263 kB | 200/316 kB&#xD;Progress (4): 31 kB | 118 kB | 249/263 kB | 204/316 kB&#xD;Progress (4): 31 kB | 118 kB | 253/263 kB | 204/316 kB&#xD;Progress (4): 31 kB | 118 kB | 258/263 kB | 204/316 kB&#xD;Progress (4): 31 kB | 118 kB | 262/263 kB | 204/316 kB&#xD;Progress (4): 31 kB | 118 kB | 262/263 kB | 208/316 kB&#xD;Progress (4): 31 kB | 118 kB | 263 kB | 208/316 kB    &#xD;Progress (4): 31 kB | 118 kB | 263 kB | 213/316 kB&#xD;Progress (4): 31 kB | 118 kB | 263 kB | 217/316 kB&#xD;Progress (4): 31 kB | 118 kB | 263 kB | 221/316 kB&#xD;Progress (4): 31 kB | 118 kB | 263 kB | 225/316 kB&#xD;Progress (4): 31 kB | 118 kB | 263 kB | 229/316 kB&#xD;Progress (4): 31 kB | 118 kB | 263 kB | 233/316 kB&#xD;Progress (4): 31 kB | 118 kB | 263 kB | 237/316 kB&#xD;Progress (4): 31 kB | 118 kB | 263 kB | 241/316 kB&#xD;Progress (4): 31 kB | 118 kB | 263 kB | 245/316 kB&#xD;Progress (4): 31 kB | 118 kB | 263 kB | 249/316 kB&#xD;Progress (4): 31 kB | 118 kB | 263 kB | 253/316 kB&#xD;Progress (4): 31 kB | 118 kB | 263 kB | 258/316 kB&#xD;                                                  &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/1.3/maven-common-artifact-filters-1.3.jar (31 kB at 941 kB/s)&#xA;Progress (3): 118 kB | 263 kB | 262/316 kB&#xD;                                          &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.9/maven-reporting-api-2.0.9.jar&#xA;Progress (3): 118 kB | 263 kB | 266/316 kB&#xD;Progress (3): 118 kB | 263 kB | 270/316 kB&#xD;Progress (3): 118 kB | 263 kB | 274/316 kB&#xD;Progress (3): 118 kB | 263 kB | 278/316 kB&#xD;Progress (3): 118 kB | 263 kB | 282/316 kB&#xD;Progress (3): 118 kB | 263 kB | 286/316 kB&#xD;Progress (3): 118 kB | 263 kB | 290/316 kB&#xD;Progress (3): 118 kB | 263 kB | 294/316 kB&#xD;Progress (3): 118 kB | 263 kB | 299/316 kB&#xD;Progress (3): 118 kB | 263 kB | 303/316 kB&#xD;Progress (3): 118 kB | 263 kB | 307/316 kB&#xD;Progress (3): 118 kB | 263 kB | 311/316 kB&#xD;Progress (3): 118 kB | 263 kB | 315/316 kB&#xD;Progress (3): 118 kB | 263 kB | 316 kB    &#xD;                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-api/2.12.4/surefire-api-2.12.4.jar (118 kB at 2.7 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/2.0.9/maven-toolchain-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/maven-surefire-common/2.12.4/maven-surefire-common-2.12.4.jar (263 kB at 5.6 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-annotations/3.1/maven-plugin-annotations-3.1.jar&#xA;Progress (2): 316 kB | 4.1/232 kB&#xD;Progress (2): 316 kB | 7.7/232 kB&#xD;Progress (2): 316 kB | 12/232 kB &#xD;Progress (2): 316 kB | 16/232 kB&#xD;Progress (2): 316 kB | 20/232 kB&#xD;Progress (2): 316 kB | 24/232 kB&#xD;Progress (2): 316 kB | 28/232 kB&#xD;Progress (2): 316 kB | 32/232 kB&#xD;Progress (2): 316 kB | 36/232 kB&#xD;Progress (2): 316 kB | 40/232 kB&#xD;Progress (2): 316 kB | 45/232 kB&#xD;Progress (2): 316 kB | 49/232 kB&#xD;Progress (2): 316 kB | 53/232 kB&#xD;Progress (2): 316 kB | 57/232 kB&#xD;Progress (2): 316 kB | 61/232 kB&#xD;Progress (2): 316 kB | 65/232 kB&#xD;Progress (2): 316 kB | 69/232 kB&#xD;Progress (2): 316 kB | 73/232 kB&#xD;Progress (2): 316 kB | 77/232 kB&#xD;Progress (2): 316 kB | 81/232 kB&#xD;Progress (2): 316 kB | 86/232 kB&#xD;Progress (2): 316 kB | 90/232 kB&#xD;Progress (2): 316 kB | 94/232 kB&#xD;Progress (2): 316 kB | 98/232 kB&#xD;Progress (2): 316 kB | 102/232 kB&#xD;Progress (2): 316 kB | 106/232 kB&#xD;Progress (2): 316 kB | 110/232 kB&#xD;Progress (2): 316 kB | 114/232 kB&#xD;Progress (2): 316 kB | 118/232 kB&#xD;Progress (2): 316 kB | 122/232 kB&#xD;Progress (2): 316 kB | 126/232 kB&#xD;Progress (2): 316 kB | 131/232 kB&#xD;Progress (2): 316 kB | 135/232 kB&#xD;Progress (3): 316 kB | 135/232 kB | 3.2/10 kB&#xD;Progress (3): 316 kB | 139/232 kB | 3.2/10 kB&#xD;Progress (3): 316 kB | 139/232 kB | 7.3/10 kB&#xD;Progress (3): 316 kB | 139/232 kB | 10 kB    &#xD;Progress (3): 316 kB | 143/232 kB | 10 kB&#xD;Progress (3): 316 kB | 147/232 kB | 10 kB&#xD;Progress (3): 316 kB | 151/232 kB | 10 kB&#xD;Progress (3): 316 kB | 155/232 kB | 10 kB&#xD;Progress (3): 316 kB | 159/232 kB | 10 kB&#xD;Progress (3): 316 kB | 163/232 kB | 10 kB&#xD;Progress (3): 316 kB | 167/232 kB | 10 kB&#xD;Progress (3): 316 kB | 172/232 kB | 10 kB&#xD;Progress (3): 316 kB | 176/232 kB | 10 kB&#xD;Progress (3): 316 kB | 180/232 kB | 10 kB&#xD;Progress (3): 316 kB | 184/232 kB | 10 kB&#xD;Progress (3): 316 kB | 188/232 kB | 10 kB&#xD;Progress (3): 316 kB | 192/232 kB | 10 kB&#xD;Progress (3): 316 kB | 196/232 kB | 10 kB&#xD;Progress (3): 316 kB | 200/232 kB | 10 kB&#xD;Progress (3): 316 kB | 204/232 kB | 10 kB&#xD;Progress (3): 316 kB | 208/232 kB | 10 kB&#xD;Progress (3): 316 kB | 213/232 kB | 10 kB&#xD;Progress (3): 316 kB | 217/232 kB | 10 kB&#xD;Progress (3): 316 kB | 221/232 kB | 10 kB&#xD;Progress (3): 316 kB | 225/232 kB | 10 kB&#xD;Progress (3): 316 kB | 229/232 kB | 10 kB&#xD;Progress (3): 316 kB | 232 kB | 10 kB    &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.1/commons-lang3-3.1.jar (316 kB at 5.4 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.9/maven-reporting-api-2.0.9.jar (10 kB at 161 kB/s)&#xA;Progress (2): 232 kB | 4.1/14 kB&#xD;Progress (2): 232 kB | 7.7/14 kB&#xD;Progress (2): 232 kB | 12/14 kB &#xD;Progress (2): 232 kB | 14 kB   &#xD;Progress (3): 232 kB | 14 kB | 4.1/38 kB&#xD;Progress (3): 232 kB | 14 kB | 7.7/38 kB&#xD;Progress (3): 232 kB | 14 kB | 12/38 kB &#xD;Progress (3): 232 kB | 14 kB | 16/38 kB&#xD;Progress (3): 232 kB | 14 kB | 20/38 kB&#xD;Progress (3): 232 kB | 14 kB | 24/38 kB&#xD;Progress (3): 232 kB | 14 kB | 28/38 kB&#xD;Progress (3): 232 kB | 14 kB | 32/38 kB&#xD;                                       &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0.8/plexus-utils-3.0.8.jar (232 kB at 3.5 MB/s)&#xA;Progress (2): 14 kB | 36/38 kB&#xD;Progress (2): 14 kB | 38 kB   &#xD;                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-annotations/3.1/maven-plugin-annotations-3.1.jar (14 kB at 180 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/2.0.9/maven-toolchain-2.0.9.jar (38 kB at 442 kB/s)&#xA;[INFO] Tests are skipped.&#xA;[INFO] &#xA;[INFO] --- maven-jar-plugin:3.3.0:jar (default-jar) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/file-management/3.1.0/file-management-3.1.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/file-management/3.1.0/file-management-3.1.0.pom (4.5 kB at 109 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/36/maven-shared-components-36.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/36/maven-shared-components-36.pom (4.9 kB at 117 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/36/maven-parent-36.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 45 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/36/maven-parent-36.pom (45 kB at 989 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/26/apache-26.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 21 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/26/apache-26.pom (21 kB at 456 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.36/slf4j-api-1.7.36.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.36/slf4j-api-1.7.36.pom (2.7 kB at 52 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.7.36/slf4j-parent-1.7.36.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.7.36/slf4j-parent-1.7.36.pom (14 kB at 178 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.3.0/plexus-utils-3.3.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.3.0/plexus-utils-3.3.0.pom (5.2 kB at 89 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/5.1/plexus-5.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 23 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/5.1/plexus-5.1.pom (23 kB at 459 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.11.0/commons-io-2.11.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.11.0/commons-io-2.11.0.pom (20 kB at 403 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/52/commons-parent-52.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 49 kB&#xD;Progress (1): 53 kB&#xD;Progress (1): 57 kB&#xD;Progress (1): 61 kB&#xD;Progress (1): 66 kB&#xD;Progress (1): 70 kB&#xD;Progress (1): 74 kB&#xD;Progress (1): 78 kB&#xD;Progress (1): 79 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/52/commons-parent-52.pom (79 kB at 1.4 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/junit/junit-bom/5.7.2/junit-bom-5.7.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/junit/junit-bom/5.7.2/junit-bom-5.7.2.pom (5.1 kB at 111 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-archiver/3.6.0/maven-archiver-3.6.0.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-archiver/3.6.0/maven-archiver-3.6.0.pom (3.9 kB at 98 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-io/3.4.0/plexus-io-3.4.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-io/3.4.0/plexus-io-3.4.0.pom (6.0 kB at 134 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/10/plexus-10.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 25 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/10/plexus-10.pom (25 kB at 605 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/javax/inject/javax.inject/1/javax.inject-1.pom&#xA;Progress (1): 612 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/javax/inject/javax.inject/1/javax.inject-1.pom (612 B at 12 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-archiver/4.4.0/plexus-archiver-4.4.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-archiver/4.4.0/plexus-archiver-4.4.0.pom (6.3 kB at 157 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-compress/1.21/commons-compress-1.21.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-compress/1.21/commons-compress-1.21.pom (20 kB at 492 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/iq80/snappy/snappy/0.4/snappy-0.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/iq80/snappy/snappy/0.4/snappy-0.4.pom (15 kB at 316 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/tukaani/xz/1.9/xz-1.9.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/tukaani/xz/1.9/xz-1.9.pom (2.0 kB at 51 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.26/plexus-interpolation-1.26.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.26/plexus-interpolation-1.26.pom (2.7 kB at 63 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.4.2/plexus-utils-3.4.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.4.2/plexus-utils-3.4.2.pom (8.2 kB at 205 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/8/plexus-8.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 25 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/8/plexus-8.pom (25 kB at 519 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/file-management/3.1.0/file-management-3.1.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.36/slf4j-api-1.7.36.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.11.0/commons-io-2.11.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-archiver/3.6.0/maven-archiver-3.6.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-io/3.4.0/plexus-io-3.4.0.jar&#xA;Progress (1): 4.1/26 kB&#xD;Progress (1): 7.7/26 kB&#xD;Progress (1): 11/26 kB &#xD;Progress (2): 11/26 kB | 4.1/41 kB&#xD;Progress (2): 15/26 kB | 4.1/41 kB&#xD;Progress (2): 20/26 kB | 4.1/41 kB&#xD;Progress (2): 20/26 kB | 7.7/41 kB&#xD;Progress (2): 24/26 kB | 7.7/41 kB&#xD;Progress (2): 24/26 kB | 12/41 kB &#xD;Progress (2): 26 kB | 12/41 kB   &#xD;Progress (2): 26 kB | 16/41 kB&#xD;Progress (2): 26 kB | 20/41 kB&#xD;Progress (2): 26 kB | 24/41 kB&#xD;Progress (2): 26 kB | 28/41 kB&#xD;Progress (2): 26 kB | 32/41 kB&#xD;Progress (2): 26 kB | 36/41 kB&#xD;Progress (2): 26 kB | 40/41 kB&#xD;Progress (2): 26 kB | 41 kB   &#xD;Progress (3): 26 kB | 41 kB | 4.1/79 kB&#xD;Progress (3): 26 kB | 41 kB | 7.3/79 kB&#xD;Progress (3): 26 kB | 41 kB | 11/79 kB &#xD;Progress (3): 26 kB | 41 kB | 15/79 kB&#xD;Progress (3): 26 kB | 41 kB | 20/79 kB&#xD;Progress (4): 26 kB | 41 kB | 20/79 kB | 4.1/327 kB&#xD;Progress (4): 26 kB | 41 kB | 24/79 kB | 4.1/327 kB&#xD;Progress (4): 26 kB | 41 kB | 24/79 kB | 7.7/327 kB&#xD;Progress (4): 26 kB | 41 kB | 24/79 kB | 12/327 kB &#xD;Progress (4): 26 kB | 41 kB | 24/79 kB | 15/327 kB&#xD;Progress (4): 26 kB | 41 kB | 28/79 kB | 15/327 kB&#xD;Progress (5): 26 kB | 41 kB | 28/79 kB | 15/327 kB | 4.1/36 kB&#xD;Progress (5): 26 kB | 41 kB | 28/79 kB | 15/327 kB | 7.7/36 kB&#xD;Progress (5): 26 kB | 41 kB | 28/79 kB | 15/327 kB | 12/36 kB &#xD;Progress (5): 26 kB | 41 kB | 28/79 kB | 15/327 kB | 16/36 kB&#xD;Progress (5): 26 kB | 41 kB | 28/79 kB | 15/327 kB | 20/36 kB&#xD;Progress (5): 26 kB | 41 kB | 28/79 kB | 15/327 kB | 24/36 kB&#xD;Progress (5): 26 kB | 41 kB | 28/79 kB | 15/327 kB | 28/36 kB&#xD;Progress (5): 26 kB | 41 kB | 28/79 kB | 15/327 kB | 32/36 kB&#xD;Progress (5): 26 kB | 41 kB | 28/79 kB | 15/327 kB | 36/36 kB&#xD;Progress (5): 26 kB | 41 kB | 28/79 kB | 15/327 kB | 36 kB   &#xD;Progress (5): 26 kB | 41 kB | 32/79 kB | 15/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 32/79 kB | 20/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 32/79 kB | 24/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 32/79 kB | 28/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 36/79 kB | 28/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 36/79 kB | 32/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 40/79 kB | 32/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 44/79 kB | 32/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 48/79 kB | 32/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 48/79 kB | 36/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 48/79 kB | 40/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 48/79 kB | 44/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 52/79 kB | 44/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 52/79 kB | 48/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 56/79 kB | 48/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 61/79 kB | 48/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 65/79 kB | 48/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 65/79 kB | 52/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 65/79 kB | 56/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 65/79 kB | 61/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 69/79 kB | 61/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 69/79 kB | 65/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 73/79 kB | 65/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 77/79 kB | 65/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 65/327 kB | 36 kB   &#xD;Progress (5): 26 kB | 41 kB | 79 kB | 69/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 73/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 77/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 81/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 85/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 89/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 93/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 97/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 102/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 106/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 110/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 114/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 118/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 122/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 126/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 130/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 134/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 138/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 142/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 147/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 151/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 155/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 159/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 163/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 167/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 171/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 175/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 179/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 183/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 188/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 192/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 196/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 200/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 204/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 208/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 212/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 216/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 220/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 224/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 228/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 233/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 237/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 241/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 245/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 249/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 253/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 257/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 261/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 265/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 269/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 274/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 278/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 282/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 286/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 290/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 294/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 298/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 302/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 306/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 310/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 314/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 319/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 323/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 327/327 kB | 36 kB&#xD;Progress (5): 26 kB | 41 kB | 79 kB | 327 kB | 36 kB    &#xD;                                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-archiver/3.6.0/maven-archiver-3.6.0.jar (26 kB at 820 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/javax/inject/javax.inject/1/javax.inject-1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.36/slf4j-api-1.7.36.jar (41 kB at 1.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-archiver/4.4.0/plexus-archiver-4.4.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-io/3.4.0/plexus-io-3.4.0.jar (79 kB at 2.3 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-compress/1.21/commons-compress-1.21.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/file-management/3.1.0/file-management-3.1.0.jar (36 kB at 1.0 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/iq80/snappy/snappy/0.4/snappy-0.4.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.11.0/commons-io-2.11.0.jar (327 kB at 8.6 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/tukaani/xz/1.9/xz-1.9.jar&#xA;Progress (1): 0/1.0 MB&#xD;Progress (1): 0/1.0 MB&#xD;Progress (1): 0/1.0 MB&#xD;Progress (1): 0/1.0 MB&#xD;Progress (1): 0/1.0 MB&#xD;Progress (1): 0/1.0 MB&#xD;Progress (2): 0/1.0 MB | 2.5 kB&#xD;Progress (2): 0.1/1.0 MB | 2.5 kB&#xD;Progress (2): 0.1/1.0 MB | 2.5 kB&#xD;Progress (2): 0.1/1.0 MB | 2.5 kB&#xD;Progress (3): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 4.1/58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 7.7/58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 12/58 kB &#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 15/58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 20/58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 24/58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 28/58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 32/58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 36/58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 40/58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 44/58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 48/58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 52/58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 56/58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 58 kB   &#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 4.1/211 kB | 58 kB&#xD;Progress (4): 0.1/1.0 MB | 2.5 kB | 7.7/211 kB | 58 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 7.7/211 kB | 58 kB | 4.1/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 7.7/211 kB | 58 kB | 7.7/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 7.7/211 kB | 58 kB | 12/116 kB &#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 7.7/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 12/211 kB | 58 kB | 15/116 kB &#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 16/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 20/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 24/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 28/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 32/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 36/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 40/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 45/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 49/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 53/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 57/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 61/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 65/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 69/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 73/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 77/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 77/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 81/211 kB | 58 kB | 15/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 81/211 kB | 58 kB | 20/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 81/211 kB | 58 kB | 20/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 86/211 kB | 58 kB | 20/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 86/211 kB | 58 kB | 24/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 86/211 kB | 58 kB | 28/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 86/211 kB | 58 kB | 28/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 86/211 kB | 58 kB | 32/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 90/211 kB | 58 kB | 32/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 90/211 kB | 58 kB | 32/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 90/211 kB | 58 kB | 36/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 94/211 kB | 58 kB | 36/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 98/211 kB | 58 kB | 36/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 98/211 kB | 58 kB | 36/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 102/211 kB | 58 kB | 36/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 102/211 kB | 58 kB | 40/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 102/211 kB | 58 kB | 44/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 102/211 kB | 58 kB | 48/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 102/211 kB | 58 kB | 48/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 102/211 kB | 58 kB | 48/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 48/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 52/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 56/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 61/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 65/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 65/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 69/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 73/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 77/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 81/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 85/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 89/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 93/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 97/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 102/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 106/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 110/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 114/116 kB&#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 106/211 kB | 58 kB | 116 kB    &#xD;Progress (5): 0.1/1.0 MB | 2.5 kB | 110/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 110/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 114/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 114/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 114/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 114/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 114/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 114/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 114/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 118/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 122/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 122/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 126/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 126/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 126/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 126/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 131/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.2/1.0 MB | 2.5 kB | 131/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 131/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 135/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 139/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 139/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 139/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 143/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 147/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 147/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 147/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 151/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 155/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 159/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 159/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 163/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 163/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 167/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 172/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 172/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 176/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 176/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 180/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 180/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 184/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 184/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 188/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.3/1.0 MB | 2.5 kB | 188/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 188/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 188/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 192/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 196/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 196/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 196/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 200/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 204/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 208/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 208/211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 211 kB | 58 kB | 116 kB    &#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.4/1.0 MB | 2.5 kB | 211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.5/1.0 MB | 2.5 kB | 211 kB | 58 kB | 116 kB&#xD;Progress (5): 0.5/1.0 MB | 2.5 kB | 211 kB | 58 kB | 116 kB&#xD;                                                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/javax/inject/javax.inject/1/javax.inject-1.jar (2.5 kB at 37 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.26/plexus-interpolation-1.26.jar&#xA;Progress (4): 0.5/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.5/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.5/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.5/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.5/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.5/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.5/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.5/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.5/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.5/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.6/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.6/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.6/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.6/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.6/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.6/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.6/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.6/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.6/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.6/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.6/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.6/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.7/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.7/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.7/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.7/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.7/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.7/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.7/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.7/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.7/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.7/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.7/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.7/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.8/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.8/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.8/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.8/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.8/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.8/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.8/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.8/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.8/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.8/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.8/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.8/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.8/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.9/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.9/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.9/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.9/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.9/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.9/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.9/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.9/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.9/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.9/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.9/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 0.9/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 1.0/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 1.0/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 1.0/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 1.0/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 1.0/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 1.0/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 1.0/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 1.0/1.0 MB | 211 kB | 58 kB | 116 kB&#xD;Progress (4): 1.0 MB | 211 kB | 58 kB | 116 kB    &#xD;                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/iq80/snappy/snappy/0.4/snappy-0.4.jar (58 kB at 724 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/tukaani/xz/1.9/xz-1.9.jar (116 kB at 1.5 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-archiver/4.4.0/plexus-archiver-4.4.0.jar (211 kB at 2.6 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.4.2/plexus-utils-3.4.2.jar&#xA;Progress (2): 1.0 MB | 4.1/85 kB&#xD;Progress (2): 1.0 MB | 7.7/85 kB&#xD;Progress (2): 1.0 MB | 12/85 kB &#xD;Progress (2): 1.0 MB | 15/85 kB&#xD;Progress (2): 1.0 MB | 20/85 kB&#xD;Progress (2): 1.0 MB | 24/85 kB&#xD;Progress (2): 1.0 MB | 28/85 kB&#xD;Progress (2): 1.0 MB | 32/85 kB&#xD;Progress (2): 1.0 MB | 36/85 kB&#xD;Progress (2): 1.0 MB | 40/85 kB&#xD;Progress (2): 1.0 MB | 44/85 kB&#xD;Progress (2): 1.0 MB | 48/85 kB&#xD;Progress (2): 1.0 MB | 52/85 kB&#xD;Progress (2): 1.0 MB | 56/85 kB&#xD;Progress (2): 1.0 MB | 61/85 kB&#xD;Progress (2): 1.0 MB | 65/85 kB&#xD;Progress (2): 1.0 MB | 69/85 kB&#xD;Progress (2): 1.0 MB | 73/85 kB&#xD;Progress (2): 1.0 MB | 77/85 kB&#xD;Progress (2): 1.0 MB | 81/85 kB&#xD;Progress (2): 1.0 MB | 85/85 kB&#xD;Progress (2): 1.0 MB | 85 kB   &#xD;Progress (3): 1.0 MB | 85 kB | 4.1/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 7.7/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 12/267 kB &#xD;Progress (3): 1.0 MB | 85 kB | 16/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 20/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 24/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 28/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 32/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 36/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 40/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 45/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 49/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 53/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 57/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 61/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 65/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 69/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 73/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 77/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 81/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 86/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 90/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 94/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 98/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 102/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 106/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 110/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 114/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 118/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 122/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 126/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 131/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 135/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 139/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 143/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 147/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 151/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 155/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 159/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 163/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 167/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 172/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 176/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 180/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 184/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 188/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 192/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 196/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 200/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 204/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 208/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 213/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 217/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 221/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 225/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 229/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 233/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 237/267 kB&#xD;Progress (3): 1.0 MB | 85 kB | 241/267 kB&#xD;                                         &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.26/plexus-interpolation-1.26.jar (85 kB at 853 kB/s)&#xA;Progress (2): 1.0 MB | 245/267 kB&#xD;Progress (2): 1.0 MB | 249/267 kB&#xD;Progress (2): 1.0 MB | 253/267 kB&#xD;Progress (2): 1.0 MB | 258/267 kB&#xD;Progress (2): 1.0 MB | 262/267 kB&#xD;Progress (2): 1.0 MB | 266/267 kB&#xD;Progress (2): 1.0 MB | 267 kB    &#xD;                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-compress/1.21/commons-compress-1.21.jar (1.0 MB at 10 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.4.2/plexus-utils-3.4.2.jar (267 kB at 2.2 MB/s)&#xA;[INFO] Building jar: /work/target/hacbs-test.jar&#xA;[INFO] &#xA;[INFO] --- maven-shade-plugin:3.2.4:shade (default) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/3.0/maven-plugin-api-3.0.pom&#xA;Progress (1): 2.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/3.0/maven-plugin-api-3.0.pom (2.3 kB at 60 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/3.0/maven-3.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 22 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/3.0/maven-3.0.pom (22 kB at 706 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/15/maven-parent-15.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 24 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/15/maven-parent-15.pom (24 kB at 667 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/3.0/maven-model-3.0.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/3.0/maven-model-3.0.pom (3.9 kB at 108 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.4/plexus-utils-2.0.4.pom&#xA;Progress (1): 3.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.4/plexus-utils-2.0.4.pom (3.3 kB at 111 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/3.0/maven-artifact-3.0.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/3.0/maven-artifact-3.0.pom (1.9 kB at 66 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-plexus/1.4.2/sisu-inject-plexus-1.4.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-plexus/1.4.2/sisu-inject-plexus-1.4.2.pom (5.4 kB at 168 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/inject/guice-plexus/1.4.2/guice-plexus-1.4.2.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/inject/guice-plexus/1.4.2/guice-plexus-1.4.2.pom (3.1 kB at 95 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/inject/guice-bean/1.4.2/guice-bean-1.4.2.pom&#xA;Progress (1): 2.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/inject/guice-bean/1.4.2/guice-bean-1.4.2.pom (2.6 kB at 47 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject/1.4.2/sisu-inject-1.4.2.pom&#xA;Progress (1): 1.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject/1.4.2/sisu-inject-1.4.2.pom (1.2 kB at 30 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-parent/1.4.2/sisu-parent-1.4.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-parent/1.4.2/sisu-parent-1.4.2.pom (7.8 kB at 251 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/6/forge-parent-6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/6/forge-parent-6.pom (11 kB at 326 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/2.0.0/plexus-component-annotations-2.0.0.pom&#xA;Progress (1): 750 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/2.0.0/plexus-component-annotations-2.0.0.pom (750 B at 18 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/2.0.0/plexus-containers-2.0.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/2.0.0/plexus-containers-2.0.0.pom (4.8 kB at 146 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.3/plexus-classworlds-2.2.3.pom&#xA;Progress (1): 4.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.3/plexus-classworlds-2.2.3.pom (4.0 kB at 118 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-bean/1.4.2/sisu-inject-bean-1.4.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-bean/1.4.2/sisu-inject-bean-1.4.2.pom (5.5 kB at 156 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-guice/2.1.7/sisu-guice-2.1.7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-guice/2.1.7/sisu-guice-2.1.7.pom (11 kB at 316 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/3.0/maven-core-3.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/3.0/maven-core-3.0.pom (6.6 kB at 207 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/3.0/maven-settings-3.0.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/3.0/maven-settings-3.0.pom (1.9 kB at 48 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings-builder/3.0/maven-settings-builder-3.0.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings-builder/3.0/maven-settings-builder-3.0.pom (2.2 kB at 69 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.14/plexus-interpolation-1.14.pom&#xA;Progress (1): 910 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.14/plexus-interpolation-1.14.pom (910 B at 28 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.18/plexus-components-1.1.18.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.18/plexus-components-1.1.18.pom (5.4 kB at 178 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/3.0/maven-repository-metadata-3.0.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/3.0/maven-repository-metadata-3.0.pom (1.9 kB at 60 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model-builder/3.0/maven-model-builder-3.0.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model-builder/3.0/maven-model-builder-3.0.pom (2.2 kB at 59 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-aether-provider/3.0/maven-aether-provider-3.0.pom&#xA;Progress (1): 2.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-aether-provider/3.0/maven-aether-provider-3.0.pom (2.5 kB at 77 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-api/1.7/aether-api-1.7.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-api/1.7/aether-api-1.7.pom (1.7 kB at 45 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-parent/1.7/aether-parent-1.7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-parent/1.7/aether-parent-1.7.pom (7.7 kB at 198 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-util/1.7/aether-util-1.7.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-util/1.7/aether-util-1.7.pom (2.1 kB at 59 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-impl/1.7/aether-impl-1.7.pom&#xA;Progress (1): 3.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-impl/1.7/aether-impl-1.7.pom (3.7 kB at 112 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-spi/1.7/aether-spi-1.7.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-spi/1.7/aether-spi-1.7.pom (1.7 kB at 54 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-artifact-transfer/0.12.0/maven-artifact-transfer-0.12.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-artifact-transfer/0.12.0/maven-artifact-transfer-0.12.0.pom (11 kB at 363 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/33/maven-shared-components-33.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/33/maven-shared-components-33.pom (5.1 kB at 150 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/33/maven-parent-33.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 44 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/33/maven-parent-33.pom (44 kB at 1.3 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/21/apache-21.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 17 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/21/apache-21.pom (17 kB at 611 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/3.0.1/maven-common-artifact-filters-3.0.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/3.0.1/maven-common-artifact-filters-3.0.1.pom (4.8 kB at 179 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/30/maven-shared-components-30.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/30/maven-shared-components-30.pom (4.6 kB at 115 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/30/maven-parent-30.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 41 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/30/maven-parent-30.pom (41 kB at 1.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/18/apache-18.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/18/apache-18.pom (16 kB at 505 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/3.1.0/maven-shared-utils-3.1.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/3.1.0/maven-shared-utils-3.1.0.pom (5.0 kB at 161 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.5/commons-io-2.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 13 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.5/commons-io-2.5.pom (13 kB at 391 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/39/commons-parent-39.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 49 kB&#xD;Progress (1): 53 kB&#xD;Progress (1): 57 kB&#xD;Progress (1): 61 kB&#xD;Progress (1): 62 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/39/commons-parent-39.pom (62 kB at 2.0 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/16/apache-16.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/16/apache-16.pom (15 kB at 531 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.1.1/plexus-utils-3.1.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.1.1/plexus-utils-3.1.1.pom (5.1 kB at 169 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/4.0/plexus-4.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 22 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/4.0/plexus-4.0.pom (22 kB at 694 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-codec/commons-codec/1.11/commons-codec-1.11.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-codec/commons-codec/1.11/commons-codec-1.11.pom (14 kB at 499 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/42/commons-parent-42.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 49 kB&#xD;Progress (1): 53 kB&#xD;Progress (1): 57 kB&#xD;Progress (1): 61 kB&#xD;Progress (1): 66 kB&#xD;Progress (1): 68 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/42/commons-parent-42.pom (68 kB at 2.0 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.5/slf4j-api-1.7.5.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.5/slf4j-api-1.7.5.pom (2.7 kB at 75 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.7.5/slf4j-parent-1.7.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.7.5/slf4j-parent-1.7.5.pom (12 kB at 369 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm/8.0/asm-8.0.pom&#xA;Progress (1): 2.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm/8.0/asm-8.0.pom (2.9 kB at 92 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/ow2/1.5/ow2-1.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/ow2/1.5/ow2-1.5.pom (11 kB at 362 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-commons/8.0/asm-commons-8.0.pom&#xA;Progress (1): 3.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-commons/8.0/asm-commons-8.0.pom (3.7 kB at 126 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-tree/8.0/asm-tree-8.0.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-tree/8.0/asm-tree-8.0.pom (3.1 kB at 98 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-analysis/8.0/asm-analysis-8.0.pom&#xA;Progress (1): 3.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-analysis/8.0/asm-analysis-8.0.pom (3.2 kB at 96 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/jdom/jdom2/2.0.6/jdom2-2.0.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/jdom/jdom2/2.0.6/jdom2-2.0.6.pom (4.6 kB at 153 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-dependency-tree/3.0.1/maven-dependency-tree-3.0.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-dependency-tree/3.0.1/maven-dependency-tree-3.0.1.pom (7.5 kB at 227 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether-util/0.9.0.M2/aether-util-0.9.0.M2.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether-util/0.9.0.M2/aether-util-0.9.0.M2.pom (2.0 kB at 62 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether/0.9.0.M2/aether-0.9.0.M2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 28 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether/0.9.0.M2/aether-0.9.0.M2.pom (28 kB at 753 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.6/commons-io-2.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.6/commons-io-2.6.pom (14 kB at 339 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/vafer/jdependency/2.4.0/jdependency-2.4.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/vafer/jdependency/2.4.0/jdependency-2.4.0.pom (15 kB at 502 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-util/8.0/asm-util-8.0.pom&#xA;Progress (1): 3.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-util/8.0/asm-util-8.0.pom (3.7 kB at 130 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/guava/28.2-android/guava-28.2-android.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/guava/28.2-android/guava-28.2-android.pom (11 kB at 364 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/guava-parent/28.2-android/guava-parent-28.2-android.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 13 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/guava-parent/28.2-android/guava-parent-28.2-android.pom (13 kB at 445 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/failureaccess/1.0.1/failureaccess-1.0.1.pom&#xA;Progress (1): 2.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/failureaccess/1.0.1/failureaccess-1.0.1.pom (2.4 kB at 83 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/guava-parent/26.0-android/guava-parent-26.0-android.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 10 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/guava-parent/26.0-android/guava-parent-26.0-android.pom (10 kB at 328 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/oss/oss-parent/9/oss-parent-9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/oss/oss-parent/9/oss-parent-9.pom (6.6 kB at 199 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/listenablefuture/9999.0-empty-to-avoid-conflict-with-guava/listenablefuture-9999.0-empty-to-avoid-conflict-with-guava.pom&#xA;Progress (1): 2.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/listenablefuture/9999.0-empty-to-avoid-conflict-with-guava/listenablefuture-9999.0-empty-to-avoid-conflict-with-guava.pom (2.3 kB at 79 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.pom (4.3 kB at 143 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/oss/oss-parent/7/oss-parent-7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/oss/oss-parent/7/oss-parent-7.pom (4.8 kB at 161 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/checkerframework/checker-compat-qual/2.5.5/checker-compat-qual-2.5.5.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/checkerframework/checker-compat-qual/2.5.5/checker-compat-qual-2.5.5.pom (2.7 kB at 95 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_annotations/2.3.4/error_prone_annotations-2.3.4.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_annotations/2.3.4/error_prone_annotations-2.3.4.pom (2.1 kB at 73 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_parent/2.3.4/error_prone_parent-2.3.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_parent/2.3.4/error_prone_parent-2.3.4.pom (5.4 kB at 155 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/j2objc/j2objc-annotations/1.3/j2objc-annotations-1.3.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/j2objc/j2objc-annotations/1.3/j2objc-annotations-1.3.pom (2.8 kB at 92 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 28 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.pom (28 kB at 949 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/3.0/maven-plugin-api-3.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-plexus/1.4.2/sisu-inject-plexus-1.4.2.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-bean/1.4.2/sisu-inject-bean-1.4.2.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-guice/2.1.7/sisu-guice-2.1.7-noaop.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/3.0/maven-model-3.0.jar&#xA;Progress (1): 4.1/49 kB&#xD;Progress (1): 7.7/49 kB&#xD;Progress (1): 12/49 kB &#xD;Progress (1): 16/49 kB&#xD;Progress (1): 20/49 kB&#xD;Progress (1): 24/49 kB&#xD;Progress (1): 28/49 kB&#xD;Progress (1): 32/49 kB&#xD;Progress (1): 36/49 kB&#xD;Progress (1): 40/49 kB&#xD;Progress (1): 45/49 kB&#xD;Progress (1): 49/49 kB&#xD;Progress (1): 49 kB   &#xD;Progress (2): 49 kB | 4.1/153 kB&#xD;Progress (2): 49 kB | 7.7/153 kB&#xD;Progress (2): 49 kB | 12/153 kB &#xD;Progress (2): 49 kB | 16/153 kB&#xD;Progress (2): 49 kB | 20/153 kB&#xD;Progress (2): 49 kB | 24/153 kB&#xD;Progress (2): 49 kB | 28/153 kB&#xD;Progress (2): 49 kB | 32/153 kB&#xD;Progress (2): 49 kB | 36/153 kB&#xD;Progress (2): 49 kB | 40/153 kB&#xD;Progress (2): 49 kB | 45/153 kB&#xD;Progress (2): 49 kB | 49/153 kB&#xD;Progress (2): 49 kB | 53/153 kB&#xD;Progress (2): 49 kB | 57/153 kB&#xD;Progress (2): 49 kB | 61/153 kB&#xD;Progress (2): 49 kB | 65/153 kB&#xD;Progress (2): 49 kB | 69/153 kB&#xD;Progress (2): 49 kB | 73/153 kB&#xD;Progress (2): 49 kB | 77/153 kB&#xD;Progress (2): 49 kB | 81/153 kB&#xD;Progress (2): 49 kB | 86/153 kB&#xD;Progress (2): 49 kB | 90/153 kB&#xD;Progress (2): 49 kB | 94/153 kB&#xD;Progress (2): 49 kB | 98/153 kB&#xD;Progress (2): 49 kB | 102/153 kB&#xD;Progress (2): 49 kB | 106/153 kB&#xD;Progress (2): 49 kB | 110/153 kB&#xD;Progress (2): 49 kB | 114/153 kB&#xD;Progress (2): 49 kB | 118/153 kB&#xD;Progress (2): 49 kB | 122/153 kB&#xD;Progress (2): 49 kB | 126/153 kB&#xD;Progress (2): 49 kB | 131/153 kB&#xD;Progress (2): 49 kB | 135/153 kB&#xD;Progress (2): 49 kB | 139/153 kB&#xD;Progress (2): 49 kB | 143/153 kB&#xD;Progress (2): 49 kB | 147/153 kB&#xD;Progress (2): 49 kB | 151/153 kB&#xD;Progress (2): 49 kB | 153 kB    &#xD;Progress (3): 49 kB | 153 kB | 4.1/472 kB&#xD;Progress (3): 49 kB | 153 kB | 7.7/472 kB&#xD;Progress (3): 49 kB | 153 kB | 12/472 kB &#xD;Progress (3): 49 kB | 153 kB | 16/472 kB&#xD;Progress (3): 49 kB | 153 kB | 20/472 kB&#xD;Progress (3): 49 kB | 153 kB | 24/472 kB&#xD;Progress (3): 49 kB | 153 kB | 28/472 kB&#xD;Progress (3): 49 kB | 153 kB | 32/472 kB&#xD;Progress (3): 49 kB | 153 kB | 36/472 kB&#xD;Progress (3): 49 kB | 153 kB | 40/472 kB&#xD;Progress (3): 49 kB | 153 kB | 44/472 kB&#xD;Progress (3): 49 kB | 153 kB | 48/472 kB&#xD;Progress (3): 49 kB | 153 kB | 52/472 kB&#xD;Progress (3): 49 kB | 153 kB | 56/472 kB&#xD;Progress (3): 49 kB | 153 kB | 61/472 kB&#xD;Progress (3): 49 kB | 153 kB | 65/472 kB&#xD;Progress (3): 49 kB | 153 kB | 69/472 kB&#xD;Progress (3): 49 kB | 153 kB | 73/472 kB&#xD;Progress (3): 49 kB | 153 kB | 77/472 kB&#xD;Progress (3): 49 kB | 153 kB | 81/472 kB&#xD;Progress (3): 49 kB | 153 kB | 85/472 kB&#xD;Progress (3): 49 kB | 153 kB | 89/472 kB&#xD;Progress (3): 49 kB | 153 kB | 93/472 kB&#xD;Progress (3): 49 kB | 153 kB | 97/472 kB&#xD;Progress (3): 49 kB | 153 kB | 102/472 kB&#xD;Progress (3): 49 kB | 153 kB | 106/472 kB&#xD;Progress (3): 49 kB | 153 kB | 110/472 kB&#xD;Progress (3): 49 kB | 153 kB | 114/472 kB&#xD;Progress (3): 49 kB | 153 kB | 118/472 kB&#xD;Progress (3): 49 kB | 153 kB | 122/472 kB&#xD;Progress (3): 49 kB | 153 kB | 126/472 kB&#xD;Progress (3): 49 kB | 153 kB | 130/472 kB&#xD;Progress (4): 49 kB | 153 kB | 130/472 kB | 4.1/202 kB&#xD;Progress (4): 49 kB | 153 kB | 134/472 kB | 4.1/202 kB&#xD;Progress (4): 49 kB | 153 kB | 134/472 kB | 7.7/202 kB&#xD;Progress (4): 49 kB | 153 kB | 134/472 kB | 12/202 kB &#xD;Progress (4): 49 kB | 153 kB | 134/472 kB | 16/202 kB&#xD;Progress (4): 49 kB | 153 kB | 138/472 kB | 16/202 kB&#xD;Progress (4): 49 kB | 153 kB | 138/472 kB | 20/202 kB&#xD;Progress (4): 49 kB | 153 kB | 142/472 kB | 20/202 kB&#xD;Progress (4): 49 kB | 153 kB | 142/472 kB | 24/202 kB&#xD;Progress (4): 49 kB | 153 kB | 142/472 kB | 28/202 kB&#xD;Progress (4): 49 kB | 153 kB | 147/472 kB | 28/202 kB&#xD;Progress (4): 49 kB | 153 kB | 151/472 kB | 28/202 kB&#xD;Progress (4): 49 kB | 153 kB | 151/472 kB | 32/202 kB&#xD;Progress (4): 49 kB | 153 kB | 155/472 kB | 32/202 kB&#xD;Progress (4): 49 kB | 153 kB | 155/472 kB | 36/202 kB&#xD;Progress (4): 49 kB | 153 kB | 159/472 kB | 36/202 kB&#xD;Progress (4): 49 kB | 153 kB | 163/472 kB | 36/202 kB&#xD;Progress (4): 49 kB | 153 kB | 167/472 kB | 36/202 kB&#xD;Progress (4): 49 kB | 153 kB | 171/472 kB | 36/202 kB&#xD;Progress (4): 49 kB | 153 kB | 171/472 kB | 40/202 kB&#xD;Progress (4): 49 kB | 153 kB | 175/472 kB | 40/202 kB&#xD;Progress (4): 49 kB | 153 kB | 175/472 kB | 45/202 kB&#xD;Progress (4): 49 kB | 153 kB | 179/472 kB | 45/202 kB&#xD;Progress (4): 49 kB | 153 kB | 179/472 kB | 49/202 kB&#xD;Progress (4): 49 kB | 153 kB | 183/472 kB | 49/202 kB&#xD;Progress (4): 49 kB | 153 kB | 183/472 kB | 53/202 kB&#xD;Progress (4): 49 kB | 153 kB | 188/472 kB | 53/202 kB&#xD;Progress (4): 49 kB | 153 kB | 188/472 kB | 57/202 kB&#xD;Progress (4): 49 kB | 153 kB | 192/472 kB | 57/202 kB&#xD;Progress (4): 49 kB | 153 kB | 192/472 kB | 61/202 kB&#xD;Progress (4): 49 kB | 153 kB | 196/472 kB | 61/202 kB&#xD;Progress (4): 49 kB | 153 kB | 196/472 kB | 65/202 kB&#xD;Progress (4): 49 kB | 153 kB | 200/472 kB | 65/202 kB&#xD;Progress (4): 49 kB | 153 kB | 200/472 kB | 69/202 kB&#xD;Progress (4): 49 kB | 153 kB | 204/472 kB | 69/202 kB&#xD;Progress (4): 49 kB | 153 kB | 204/472 kB | 73/202 kB&#xD;Progress (4): 49 kB | 153 kB | 208/472 kB | 73/202 kB&#xD;Progress (4): 49 kB | 153 kB | 208/472 kB | 77/202 kB&#xD;Progress (4): 49 kB | 153 kB | 212/472 kB | 77/202 kB&#xD;Progress (4): 49 kB | 153 kB | 212/472 kB | 81/202 kB&#xD;Progress (4): 49 kB | 153 kB | 216/472 kB | 81/202 kB&#xD;Progress (4): 49 kB | 153 kB | 216/472 kB | 86/202 kB&#xD;Progress (4): 49 kB | 153 kB | 220/472 kB | 86/202 kB&#xD;Progress (4): 49 kB | 153 kB | 220/472 kB | 90/202 kB&#xD;Progress (4): 49 kB | 153 kB | 224/472 kB | 90/202 kB&#xD;Progress (4): 49 kB | 153 kB | 224/472 kB | 94/202 kB&#xD;Progress (4): 49 kB | 153 kB | 228/472 kB | 94/202 kB&#xD;Progress (4): 49 kB | 153 kB | 228/472 kB | 98/202 kB&#xD;Progress (4): 49 kB | 153 kB | 233/472 kB | 98/202 kB&#xD;Progress (4): 49 kB | 153 kB | 233/472 kB | 102/202 kB&#xD;Progress (4): 49 kB | 153 kB | 237/472 kB | 102/202 kB&#xD;Progress (4): 49 kB | 153 kB | 237/472 kB | 106/202 kB&#xD;Progress (4): 49 kB | 153 kB | 240/472 kB | 106/202 kB&#xD;Progress (4): 49 kB | 153 kB | 240/472 kB | 110/202 kB&#xD;Progress (4): 49 kB | 153 kB | 244/472 kB | 110/202 kB&#xD;Progress (4): 49 kB | 153 kB | 244/472 kB | 114/202 kB&#xD;Progress (4): 49 kB | 153 kB | 248/472 kB | 114/202 kB&#xD;Progress (4): 49 kB | 153 kB | 248/472 kB | 118/202 kB&#xD;Progress (4): 49 kB | 153 kB | 252/472 kB | 118/202 kB&#xD;Progress (4): 49 kB | 153 kB | 252/472 kB | 122/202 kB&#xD;Progress (4): 49 kB | 153 kB | 256/472 kB | 122/202 kB&#xD;Progress (4): 49 kB | 153 kB | 256/472 kB | 126/202 kB&#xD;Progress (4): 49 kB | 153 kB | 261/472 kB | 126/202 kB&#xD;Progress (4): 49 kB | 153 kB | 261/472 kB | 131/202 kB&#xD;Progress (4): 49 kB | 153 kB | 265/472 kB | 131/202 kB&#xD;Progress (4): 49 kB | 153 kB | 265/472 kB | 135/202 kB&#xD;Progress (4): 49 kB | 153 kB | 269/472 kB | 135/202 kB&#xD;Progress (4): 49 kB | 153 kB | 273/472 kB | 135/202 kB&#xD;Progress (4): 49 kB | 153 kB | 277/472 kB | 135/202 kB&#xD;Progress (4): 49 kB | 153 kB | 277/472 kB | 139/202 kB&#xD;Progress (4): 49 kB | 153 kB | 281/472 kB | 139/202 kB&#xD;Progress (4): 49 kB | 153 kB | 281/472 kB | 143/202 kB&#xD;Progress (4): 49 kB | 153 kB | 285/472 kB | 143/202 kB&#xD;Progress (4): 49 kB | 153 kB | 285/472 kB | 147/202 kB&#xD;Progress (4): 49 kB | 153 kB | 289/472 kB | 147/202 kB&#xD;Progress (4): 49 kB | 153 kB | 289/472 kB | 151/202 kB&#xD;Progress (4): 49 kB | 153 kB | 289/472 kB | 155/202 kB&#xD;Progress (4): 49 kB | 153 kB | 293/472 kB | 155/202 kB&#xD;Progress (4): 49 kB | 153 kB | 293/472 kB | 159/202 kB&#xD;Progress (4): 49 kB | 153 kB | 297/472 kB | 159/202 kB&#xD;Progress (4): 49 kB | 153 kB | 302/472 kB | 159/202 kB&#xD;Progress (4): 49 kB | 153 kB | 302/472 kB | 163/202 kB&#xD;Progress (4): 49 kB | 153 kB | 306/472 kB | 163/202 kB&#xD;Progress (4): 49 kB | 153 kB | 306/472 kB | 167/202 kB&#xD;Progress (4): 49 kB | 153 kB | 310/472 kB | 167/202 kB&#xD;Progress (4): 49 kB | 153 kB | 310/472 kB | 172/202 kB&#xD;Progress (4): 49 kB | 153 kB | 314/472 kB | 172/202 kB&#xD;Progress (4): 49 kB | 153 kB | 314/472 kB | 176/202 kB&#xD;Progress (4): 49 kB | 153 kB | 318/472 kB | 176/202 kB&#xD;Progress (4): 49 kB | 153 kB | 322/472 kB | 176/202 kB&#xD;Progress (4): 49 kB | 153 kB | 322/472 kB | 180/202 kB&#xD;Progress (4): 49 kB | 153 kB | 326/472 kB | 180/202 kB&#xD;Progress (4): 49 kB | 153 kB | 326/472 kB | 184/202 kB&#xD;Progress (4): 49 kB | 153 kB | 330/472 kB | 184/202 kB&#xD;Progress (4): 49 kB | 153 kB | 330/472 kB | 188/202 kB&#xD;Progress (4): 49 kB | 153 kB | 334/472 kB | 188/202 kB&#xD;Progress (4): 49 kB | 153 kB | 334/472 kB | 192/202 kB&#xD;Progress (4): 49 kB | 153 kB | 338/472 kB | 192/202 kB&#xD;Progress (4): 49 kB | 153 kB | 338/472 kB | 196/202 kB&#xD;Progress (4): 49 kB | 153 kB | 342/472 kB | 196/202 kB&#xD;Progress (4): 49 kB | 153 kB | 342/472 kB | 200/202 kB&#xD;Progress (4): 49 kB | 153 kB | 347/472 kB | 200/202 kB&#xD;Progress (4): 49 kB | 153 kB | 347/472 kB | 202 kB    &#xD;Progress (4): 49 kB | 153 kB | 351/472 kB | 202 kB&#xD;Progress (4): 49 kB | 153 kB | 355/472 kB | 202 kB&#xD;Progress (4): 49 kB | 153 kB | 359/472 kB | 202 kB&#xD;Progress (4): 49 kB | 153 kB | 363/472 kB | 202 kB&#xD;Progress (4): 49 kB | 153 kB | 367/472 kB | 202 kB&#xD;Progress (4): 49 kB | 153 kB | 371/472 kB | 202 kB&#xD;Progress (5): 49 kB | 153 kB | 371/472 kB | 202 kB | 4.1/165 kB&#xD;Progress (5): 49 kB | 153 kB | 375/472 kB | 202 kB | 4.1/165 kB&#xD;Progress (5): 49 kB | 153 kB | 375/472 kB | 202 kB | 7.7/165 kB&#xD;Progress (5): 49 kB | 153 kB | 379/472 kB | 202 kB | 7.7/165 kB&#xD;Progress (5): 49 kB | 153 kB | 379/472 kB | 202 kB | 11/165 kB &#xD;Progress (5): 49 kB | 153 kB | 383/472 kB | 202 kB | 11/165 kB&#xD;Progress (5): 49 kB | 153 kB | 388/472 kB | 202 kB | 11/165 kB&#xD;Progress (5): 49 kB | 153 kB | 388/472 kB | 202 kB | 15/165 kB&#xD;Progress (5): 49 kB | 153 kB | 392/472 kB | 202 kB | 15/165 kB&#xD;Progress (5): 49 kB | 153 kB | 392/472 kB | 202 kB | 20/165 kB&#xD;Progress (5): 49 kB | 153 kB | 396/472 kB | 202 kB | 20/165 kB&#xD;Progress (5): 49 kB | 153 kB | 396/472 kB | 202 kB | 24/165 kB&#xD;Progress (5): 49 kB | 153 kB | 400/472 kB | 202 kB | 24/165 kB&#xD;Progress (5): 49 kB | 153 kB | 400/472 kB | 202 kB | 28/165 kB&#xD;Progress (5): 49 kB | 153 kB | 404/472 kB | 202 kB | 28/165 kB&#xD;Progress (5): 49 kB | 153 kB | 404/472 kB | 202 kB | 32/165 kB&#xD;Progress (5): 49 kB | 153 kB | 408/472 kB | 202 kB | 32/165 kB&#xD;Progress (5): 49 kB | 153 kB | 408/472 kB | 202 kB | 36/165 kB&#xD;Progress (5): 49 kB | 153 kB | 412/472 kB | 202 kB | 36/165 kB&#xD;Progress (5): 49 kB | 153 kB | 412/472 kB | 202 kB | 40/165 kB&#xD;Progress (5): 49 kB | 153 kB | 416/472 kB | 202 kB | 40/165 kB&#xD;Progress (5): 49 kB | 153 kB | 416/472 kB | 202 kB | 44/165 kB&#xD;Progress (5): 49 kB | 153 kB | 420/472 kB | 202 kB | 44/165 kB&#xD;Progress (5): 49 kB | 153 kB | 424/472 kB | 202 kB | 44/165 kB&#xD;Progress (5): 49 kB | 153 kB | 424/472 kB | 202 kB | 48/165 kB&#xD;Progress (5): 49 kB | 153 kB | 428/472 kB | 202 kB | 48/165 kB&#xD;Progress (5): 49 kB | 153 kB | 428/472 kB | 202 kB | 52/165 kB&#xD;Progress (5): 49 kB | 153 kB | 433/472 kB | 202 kB | 52/165 kB&#xD;Progress (5): 49 kB | 153 kB | 433/472 kB | 202 kB | 56/165 kB&#xD;Progress (5): 49 kB | 153 kB | 437/472 kB | 202 kB | 56/165 kB&#xD;Progress (5): 49 kB | 153 kB | 437/472 kB | 202 kB | 61/165 kB&#xD;Progress (5): 49 kB | 153 kB | 441/472 kB | 202 kB | 61/165 kB&#xD;Progress (5): 49 kB | 153 kB | 441/472 kB | 202 kB | 65/165 kB&#xD;Progress (5): 49 kB | 153 kB | 445/472 kB | 202 kB | 65/165 kB&#xD;Progress (5): 49 kB | 153 kB | 445/472 kB | 202 kB | 69/165 kB&#xD;Progress (5): 49 kB | 153 kB | 449/472 kB | 202 kB | 69/165 kB&#xD;Progress (5): 49 kB | 153 kB | 449/472 kB | 202 kB | 73/165 kB&#xD;Progress (5): 49 kB | 153 kB | 453/472 kB | 202 kB | 73/165 kB&#xD;Progress (5): 49 kB | 153 kB | 453/472 kB | 202 kB | 77/165 kB&#xD;Progress (5): 49 kB | 153 kB | 457/472 kB | 202 kB | 77/165 kB&#xD;Progress (5): 49 kB | 153 kB | 459/472 kB | 202 kB | 77/165 kB&#xD;Progress (5): 49 kB | 153 kB | 463/472 kB | 202 kB | 77/165 kB&#xD;Progress (5): 49 kB | 153 kB | 468/472 kB | 202 kB | 77/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472/472 kB | 202 kB | 77/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 77/165 kB    &#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 81/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 85/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 89/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 93/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 97/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 101/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 106/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 110/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 114/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 118/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 122/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 126/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 130/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 134/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 138/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 142/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 147/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 151/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 155/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 159/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 163/165 kB&#xD;Progress (5): 49 kB | 153 kB | 472 kB | 202 kB | 165 kB    &#xD;                                                       &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/3.0/maven-plugin-api-3.0.jar (49 kB at 1.7 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/3.0/maven-core-3.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-bean/1.4.2/sisu-inject-bean-1.4.2.jar (153 kB at 4.9 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/3.0/maven-settings-3.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-guice/2.1.7/sisu-guice-2.1.7-noaop.jar (472 kB at 12 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings-builder/3.0/maven-settings-builder-3.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-plexus/1.4.2/sisu-inject-plexus-1.4.2.jar (202 kB at 5.0 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/3.0/maven-repository-metadata-3.0.jar&#xA;Progress (2): 165 kB | 4.1/527 kB&#xD;Progress (2): 165 kB | 7.7/527 kB&#xD;Progress (2): 165 kB | 12/527 kB &#xD;Progress (2): 165 kB | 16/527 kB&#xD;Progress (2): 165 kB | 20/527 kB&#xD;Progress (2): 165 kB | 24/527 kB&#xD;Progress (2): 165 kB | 28/527 kB&#xD;Progress (2): 165 kB | 32/527 kB&#xD;Progress (2): 165 kB | 36/527 kB&#xD;Progress (2): 165 kB | 40/527 kB&#xD;Progress (2): 165 kB | 45/527 kB&#xD;Progress (2): 165 kB | 49/527 kB&#xD;Progress (2): 165 kB | 53/527 kB&#xD;Progress (2): 165 kB | 57/527 kB&#xD;Progress (3): 165 kB | 57/527 kB | 4.1/47 kB&#xD;Progress (3): 165 kB | 61/527 kB | 4.1/47 kB&#xD;Progress (3): 165 kB | 61/527 kB | 7.7/47 kB&#xD;Progress (3): 165 kB | 65/527 kB | 7.7/47 kB&#xD;Progress (3): 165 kB | 69/527 kB | 7.7/47 kB&#xD;Progress (3): 165 kB | 69/527 kB | 12/47 kB &#xD;Progress (3): 165 kB | 73/527 kB | 12/47 kB&#xD;Progress (3): 165 kB | 73/527 kB | 16/47 kB&#xD;Progress (3): 165 kB | 77/527 kB | 16/47 kB&#xD;Progress (3): 165 kB | 77/527 kB | 20/47 kB&#xD;Progress (3): 165 kB | 81/527 kB | 20/47 kB&#xD;Progress (3): 165 kB | 81/527 kB | 24/47 kB&#xD;Progress (3): 165 kB | 81/527 kB | 28/47 kB&#xD;Progress (3): 165 kB | 81/527 kB | 32/47 kB&#xD;Progress (3): 165 kB | 81/527 kB | 36/47 kB&#xD;Progress (3): 165 kB | 81/527 kB | 40/47 kB&#xD;Progress (3): 165 kB | 81/527 kB | 45/47 kB&#xD;Progress (3): 165 kB | 81/527 kB | 47 kB   &#xD;Progress (3): 165 kB | 86/527 kB | 47 kB&#xD;Progress (3): 165 kB | 90/527 kB | 47 kB&#xD;Progress (3): 165 kB | 94/527 kB | 47 kB&#xD;Progress (3): 165 kB | 98/527 kB | 47 kB&#xD;Progress (3): 165 kB | 102/527 kB | 47 kB&#xD;Progress (3): 165 kB | 106/527 kB | 47 kB&#xD;Progress (3): 165 kB | 110/527 kB | 47 kB&#xD;Progress (3): 165 kB | 114/527 kB | 47 kB&#xD;Progress (3): 165 kB | 118/527 kB | 47 kB&#xD;Progress (3): 165 kB | 122/527 kB | 47 kB&#xD;Progress (3): 165 kB | 126/527 kB | 47 kB&#xD;Progress (3): 165 kB | 131/527 kB | 47 kB&#xD;Progress (3): 165 kB | 135/527 kB | 47 kB&#xD;Progress (3): 165 kB | 139/527 kB | 47 kB&#xD;Progress (3): 165 kB | 143/527 kB | 47 kB&#xD;Progress (3): 165 kB | 147/527 kB | 47 kB&#xD;Progress (3): 165 kB | 151/527 kB | 47 kB&#xD;Progress (3): 165 kB | 155/527 kB | 47 kB&#xD;Progress (3): 165 kB | 159/527 kB | 47 kB&#xD;Progress (3): 165 kB | 163/527 kB | 47 kB&#xD;Progress (3): 165 kB | 167/527 kB | 47 kB&#xD;Progress (3): 165 kB | 172/527 kB | 47 kB&#xD;Progress (3): 165 kB | 176/527 kB | 47 kB&#xD;Progress (3): 165 kB | 180/527 kB | 47 kB&#xD;Progress (3): 165 kB | 184/527 kB | 47 kB&#xD;Progress (3): 165 kB | 188/527 kB | 47 kB&#xD;Progress (3): 165 kB | 192/527 kB | 47 kB&#xD;Progress (3): 165 kB | 196/527 kB | 47 kB&#xD;Progress (3): 165 kB | 200/527 kB | 47 kB&#xD;Progress (3): 165 kB | 204/527 kB | 47 kB&#xD;Progress (3): 165 kB | 208/527 kB | 47 kB&#xD;Progress (3): 165 kB | 213/527 kB | 47 kB&#xD;Progress (3): 165 kB | 217/527 kB | 47 kB&#xD;Progress (3): 165 kB | 221/527 kB | 47 kB&#xD;Progress (3): 165 kB | 225/527 kB | 47 kB&#xD;Progress (3): 165 kB | 229/527 kB | 47 kB&#xD;Progress (3): 165 kB | 233/527 kB | 47 kB&#xD;Progress (3): 165 kB | 237/527 kB | 47 kB&#xD;Progress (3): 165 kB | 241/527 kB | 47 kB&#xD;Progress (3): 165 kB | 245/527 kB | 47 kB&#xD;Progress (3): 165 kB | 249/527 kB | 47 kB&#xD;Progress (3): 165 kB | 253/527 kB | 47 kB&#xD;Progress (3): 165 kB | 258/527 kB | 47 kB&#xD;Progress (3): 165 kB | 262/527 kB | 47 kB&#xD;Progress (3): 165 kB | 266/527 kB | 47 kB&#xD;Progress (3): 165 kB | 270/527 kB | 47 kB&#xD;Progress (3): 165 kB | 274/527 kB | 47 kB&#xD;Progress (3): 165 kB | 278/527 kB | 47 kB&#xD;Progress (3): 165 kB | 282/527 kB | 47 kB&#xD;Progress (3): 165 kB | 286/527 kB | 47 kB&#xD;Progress (3): 165 kB | 290/527 kB | 47 kB&#xD;Progress (3): 165 kB | 294/527 kB | 47 kB&#xD;Progress (3): 165 kB | 299/527 kB | 47 kB&#xD;Progress (3): 165 kB | 303/527 kB | 47 kB&#xD;Progress (3): 165 kB | 307/527 kB | 47 kB&#xD;Progress (3): 165 kB | 311/527 kB | 47 kB&#xD;Progress (3): 165 kB | 315/527 kB | 47 kB&#xD;Progress (3): 165 kB | 319/527 kB | 47 kB&#xD;Progress (3): 165 kB | 323/527 kB | 47 kB&#xD;Progress (3): 165 kB | 327/527 kB | 47 kB&#xD;Progress (3): 165 kB | 331/527 kB | 47 kB&#xD;Progress (3): 165 kB | 335/527 kB | 47 kB&#xD;Progress (3): 165 kB | 339/527 kB | 47 kB&#xD;Progress (3): 165 kB | 344/527 kB | 47 kB&#xD;Progress (3): 165 kB | 348/527 kB | 47 kB&#xD;Progress (3): 165 kB | 352/527 kB | 47 kB&#xD;Progress (3): 165 kB | 356/527 kB | 47 kB&#xD;Progress (3): 165 kB | 360/527 kB | 47 kB&#xD;Progress (3): 165 kB | 364/527 kB | 47 kB&#xD;Progress (3): 165 kB | 368/527 kB | 47 kB&#xD;Progress (3): 165 kB | 372/527 kB | 47 kB&#xD;Progress (3): 165 kB | 376/527 kB | 47 kB&#xD;Progress (3): 165 kB | 380/527 kB | 47 kB&#xD;Progress (3): 165 kB | 385/527 kB | 47 kB&#xD;Progress (3): 165 kB | 389/527 kB | 47 kB&#xD;Progress (3): 165 kB | 393/527 kB | 47 kB&#xD;Progress (3): 165 kB | 397/527 kB | 47 kB&#xD;Progress (3): 165 kB | 401/527 kB | 47 kB&#xD;Progress (3): 165 kB | 405/527 kB | 47 kB&#xD;Progress (3): 165 kB | 409/527 kB | 47 kB&#xD;Progress (3): 165 kB | 413/527 kB | 47 kB&#xD;Progress (3): 165 kB | 417/527 kB | 47 kB&#xD;Progress (3): 165 kB | 421/527 kB | 47 kB&#xD;Progress (3): 165 kB | 426/527 kB | 47 kB&#xD;Progress (3): 165 kB | 430/527 kB | 47 kB&#xD;Progress (3): 165 kB | 434/527 kB | 47 kB&#xD;Progress (3): 165 kB | 438/527 kB | 47 kB&#xD;Progress (3): 165 kB | 442/527 kB | 47 kB&#xD;Progress (3): 165 kB | 446/527 kB | 47 kB&#xD;Progress (3): 165 kB | 450/527 kB | 47 kB&#xD;Progress (3): 165 kB | 454/527 kB | 47 kB&#xD;Progress (3): 165 kB | 458/527 kB | 47 kB&#xD;Progress (3): 165 kB | 462/527 kB | 47 kB&#xD;Progress (3): 165 kB | 466/527 kB | 47 kB&#xD;Progress (3): 165 kB | 471/527 kB | 47 kB&#xD;Progress (3): 165 kB | 475/527 kB | 47 kB&#xD;Progress (3): 165 kB | 479/527 kB | 47 kB&#xD;Progress (3): 165 kB | 483/527 kB | 47 kB&#xD;Progress (3): 165 kB | 487/527 kB | 47 kB&#xD;Progress (3): 165 kB | 491/527 kB | 47 kB&#xD;Progress (3): 165 kB | 495/527 kB | 47 kB&#xD;Progress (3): 165 kB | 499/527 kB | 47 kB&#xD;Progress (3): 165 kB | 503/527 kB | 47 kB&#xD;Progress (3): 165 kB | 507/527 kB | 47 kB&#xD;Progress (3): 165 kB | 512/527 kB | 47 kB&#xD;Progress (3): 165 kB | 516/527 kB | 47 kB&#xD;Progress (3): 165 kB | 520/527 kB | 47 kB&#xD;Progress (3): 165 kB | 524/527 kB | 47 kB&#xD;Progress (3): 165 kB | 527 kB | 47 kB    &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/3.0/maven-model-3.0.jar (165 kB at 3.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model-builder/3.0/maven-model-builder-3.0.jar&#xA;Progress (3): 527 kB | 47 kB | 4.1/30 kB&#xD;Progress (3): 527 kB | 47 kB | 7.7/30 kB&#xD;Progress (3): 527 kB | 47 kB | 12/30 kB &#xD;Progress (3): 527 kB | 47 kB | 15/30 kB&#xD;Progress (3): 527 kB | 47 kB | 20/30 kB&#xD;Progress (3): 527 kB | 47 kB | 24/30 kB&#xD;Progress (3): 527 kB | 47 kB | 28/30 kB&#xD;Progress (3): 527 kB | 47 kB | 30 kB   &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/3.0/maven-settings-3.0.jar (47 kB at 805 kB/s)&#xA;Progress (3): 527 kB | 30 kB | 4.1/38 kB&#xD;                                        &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-aether-provider/3.0/maven-aether-provider-3.0.jar&#xA;Progress (3): 527 kB | 30 kB | 7.7/38 kB&#xD;Progress (3): 527 kB | 30 kB | 12/38 kB &#xD;Progress (3): 527 kB | 30 kB | 16/38 kB&#xD;Progress (3): 527 kB | 30 kB | 20/38 kB&#xD;Progress (3): 527 kB | 30 kB | 24/38 kB&#xD;Progress (3): 527 kB | 30 kB | 28/38 kB&#xD;Progress (3): 527 kB | 30 kB | 32/38 kB&#xD;Progress (3): 527 kB | 30 kB | 36/38 kB&#xD;Progress (3): 527 kB | 30 kB | 38 kB   &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/3.0/maven-core-3.0.jar (527 kB at 8.5 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-impl/1.7/aether-impl-1.7.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/3.0/maven-repository-metadata-3.0.jar (30 kB at 418 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-spi/1.7/aether-spi-1.7.jar&#xA;Progress (2): 38 kB | 4.1/148 kB&#xD;Progress (2): 38 kB | 7.7/148 kB&#xD;Progress (2): 38 kB | 12/148 kB &#xD;Progress (2): 38 kB | 16/148 kB&#xD;Progress (2): 38 kB | 20/148 kB&#xD;Progress (2): 38 kB | 24/148 kB&#xD;Progress (2): 38 kB | 28/148 kB&#xD;Progress (2): 38 kB | 32/148 kB&#xD;                               &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings-builder/3.0/maven-settings-builder-3.0.jar (38 kB at 511 kB/s)&#xA;Progress (1): 36/148 kB&#xD;                       &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-api/1.7/aether-api-1.7.jar&#xA;Progress (1): 40/148 kB&#xD;Progress (1): 45/148 kB&#xD;Progress (1): 49/148 kB&#xD;Progress (1): 53/148 kB&#xD;Progress (1): 57/148 kB&#xD;Progress (1): 61/148 kB&#xD;Progress (1): 65/148 kB&#xD;Progress (1): 69/148 kB&#xD;Progress (1): 73/148 kB&#xD;Progress (1): 77/148 kB&#xD;Progress (1): 81/148 kB&#xD;Progress (1): 85/148 kB&#xD;Progress (1): 89/148 kB&#xD;Progress (1): 93/148 kB&#xD;Progress (1): 97/148 kB&#xD;Progress (2): 97/148 kB | 4.1/51 kB&#xD;Progress (2): 102/148 kB | 4.1/51 kB&#xD;Progress (2): 106/148 kB | 4.1/51 kB&#xD;Progress (2): 110/148 kB | 4.1/51 kB&#xD;Progress (2): 114/148 kB | 4.1/51 kB&#xD;Progress (2): 114/148 kB | 7.7/51 kB&#xD;Progress (2): 118/148 kB | 7.7/51 kB&#xD;Progress (2): 122/148 kB | 7.7/51 kB&#xD;Progress (2): 126/148 kB | 7.7/51 kB&#xD;Progress (2): 130/148 kB | 7.7/51 kB&#xD;Progress (2): 130/148 kB | 12/51 kB &#xD;Progress (2): 130/148 kB | 15/51 kB&#xD;Progress (2): 130/148 kB | 20/51 kB&#xD;Progress (2): 130/148 kB | 24/51 kB&#xD;Progress (2): 130/148 kB | 28/51 kB&#xD;Progress (2): 130/148 kB | 32/51 kB&#xD;Progress (2): 130/148 kB | 36/51 kB&#xD;Progress (2): 130/148 kB | 40/51 kB&#xD;Progress (2): 130/148 kB | 44/51 kB&#xD;Progress (2): 130/148 kB | 48/51 kB&#xD;Progress (2): 130/148 kB | 51 kB   &#xD;Progress (2): 134/148 kB | 51 kB&#xD;Progress (2): 138/148 kB | 51 kB&#xD;Progress (2): 142/148 kB | 51 kB&#xD;Progress (2): 147/148 kB | 51 kB&#xD;Progress (2): 148 kB | 51 kB    &#xD;Progress (3): 148 kB | 51 kB | 4.1/106 kB&#xD;Progress (3): 148 kB | 51 kB | 7.7/106 kB&#xD;Progress (3): 148 kB | 51 kB | 12/106 kB &#xD;Progress (3): 148 kB | 51 kB | 15/106 kB&#xD;Progress (3): 148 kB | 51 kB | 20/106 kB&#xD;Progress (3): 148 kB | 51 kB | 24/106 kB&#xD;Progress (3): 148 kB | 51 kB | 28/106 kB&#xD;Progress (3): 148 kB | 51 kB | 32/106 kB&#xD;Progress (3): 148 kB | 51 kB | 36/106 kB&#xD;Progress (3): 148 kB | 51 kB | 40/106 kB&#xD;Progress (3): 148 kB | 51 kB | 44/106 kB&#xD;Progress (3): 148 kB | 51 kB | 48/106 kB&#xD;Progress (3): 148 kB | 51 kB | 52/106 kB&#xD;Progress (3): 148 kB | 51 kB | 56/106 kB&#xD;Progress (3): 148 kB | 51 kB | 61/106 kB&#xD;Progress (3): 148 kB | 51 kB | 65/106 kB&#xD;Progress (3): 148 kB | 51 kB | 69/106 kB&#xD;Progress (3): 148 kB | 51 kB | 73/106 kB&#xD;Progress (3): 148 kB | 51 kB | 77/106 kB&#xD;Progress (3): 148 kB | 51 kB | 81/106 kB&#xD;Progress (3): 148 kB | 51 kB | 85/106 kB&#xD;Progress (3): 148 kB | 51 kB | 89/106 kB&#xD;Progress (3): 148 kB | 51 kB | 93/106 kB&#xD;Progress (3): 148 kB | 51 kB | 97/106 kB&#xD;Progress (3): 148 kB | 51 kB | 102/106 kB&#xD;Progress (3): 148 kB | 51 kB | 106/106 kB&#xD;Progress (3): 148 kB | 51 kB | 106 kB    &#xD;Progress (4): 148 kB | 51 kB | 106 kB | 4.1/14 kB&#xD;Progress (4): 148 kB | 51 kB | 106 kB | 7.7/14 kB&#xD;Progress (4): 148 kB | 51 kB | 106 kB | 12/14 kB &#xD;Progress (4): 148 kB | 51 kB | 106 kB | 14 kB   &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-aether-provider/3.0/maven-aether-provider-3.0.jar (51 kB at 556 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-util/1.7/aether-util-1.7.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-impl/1.7/aether-impl-1.7.jar (106 kB at 1.1 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.14/plexus-interpolation-1.14.jar&#xA;Progress (3): 148 kB | 14 kB | 4.1/74 kB&#xD;Progress (3): 148 kB | 14 kB | 7.7/74 kB&#xD;Progress (3): 148 kB | 14 kB | 12/74 kB &#xD;Progress (3): 148 kB | 14 kB | 16/74 kB&#xD;Progress (3): 148 kB | 14 kB | 20/74 kB&#xD;Progress (3): 148 kB | 14 kB | 24/74 kB&#xD;Progress (3): 148 kB | 14 kB | 28/74 kB&#xD;Progress (3): 148 kB | 14 kB | 32/74 kB&#xD;Progress (3): 148 kB | 14 kB | 36/74 kB&#xD;Progress (3): 148 kB | 14 kB | 40/74 kB&#xD;Progress (3): 148 kB | 14 kB | 45/74 kB&#xD;Progress (3): 148 kB | 14 kB | 49/74 kB&#xD;Progress (3): 148 kB | 14 kB | 53/74 kB&#xD;Progress (3): 148 kB | 14 kB | 57/74 kB&#xD;Progress (3): 148 kB | 14 kB | 61/74 kB&#xD;Progress (3): 148 kB | 14 kB | 65/74 kB&#xD;Progress (3): 148 kB | 14 kB | 69/74 kB&#xD;Progress (3): 148 kB | 14 kB | 73/74 kB&#xD;Progress (3): 148 kB | 14 kB | 74 kB   &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model-builder/3.0/maven-model-builder-3.0.jar (148 kB at 1.5 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.3/plexus-classworlds-2.2.3.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-spi/1.7/aether-spi-1.7.jar (14 kB at 133 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/2.0.0/plexus-component-annotations-2.0.0.jar&#xA;Progress (2): 74 kB | 4.1/61 kB&#xD;Progress (2): 74 kB | 7.7/61 kB&#xD;Progress (2): 74 kB | 12/61 kB &#xD;Progress (2): 74 kB | 16/61 kB&#xD;Progress (2): 74 kB | 20/61 kB&#xD;Progress (2): 74 kB | 24/61 kB&#xD;Progress (2): 74 kB | 28/61 kB&#xD;Progress (2): 74 kB | 32/61 kB&#xD;Progress (2): 74 kB | 36/61 kB&#xD;Progress (2): 74 kB | 40/61 kB&#xD;Progress (2): 74 kB | 45/61 kB&#xD;Progress (2): 74 kB | 49/61 kB&#xD;Progress (2): 74 kB | 53/61 kB&#xD;Progress (2): 74 kB | 57/61 kB&#xD;Progress (2): 74 kB | 61/61 kB&#xD;Progress (2): 74 kB | 61 kB   &#xD;Progress (3): 74 kB | 61 kB | 4.1/108 kB&#xD;Progress (3): 74 kB | 61 kB | 7.7/108 kB&#xD;Progress (3): 74 kB | 61 kB | 12/108 kB &#xD;Progress (3): 74 kB | 61 kB | 16/108 kB&#xD;Progress (3): 74 kB | 61 kB | 20/108 kB&#xD;Progress (3): 74 kB | 61 kB | 24/108 kB&#xD;Progress (3): 74 kB | 61 kB | 28/108 kB&#xD;Progress (3): 74 kB | 61 kB | 32/108 kB&#xD;Progress (3): 74 kB | 61 kB | 36/108 kB&#xD;Progress (3): 74 kB | 61 kB | 40/108 kB&#xD;Progress (3): 74 kB | 61 kB | 45/108 kB&#xD;Progress (3): 74 kB | 61 kB | 49/108 kB&#xD;Progress (3): 74 kB | 61 kB | 53/108 kB&#xD;Progress (3): 74 kB | 61 kB | 57/108 kB&#xD;Progress (3): 74 kB | 61 kB | 61/108 kB&#xD;Progress (3): 74 kB | 61 kB | 65/108 kB&#xD;Progress (3): 74 kB | 61 kB | 69/108 kB&#xD;Progress (3): 74 kB | 61 kB | 73/108 kB&#xD;Progress (3): 74 kB | 61 kB | 77/108 kB&#xD;Progress (3): 74 kB | 61 kB | 81/108 kB&#xD;Progress (3): 74 kB | 61 kB | 86/108 kB&#xD;Progress (3): 74 kB | 61 kB | 90/108 kB&#xD;Progress (3): 74 kB | 61 kB | 94/108 kB&#xD;Progress (3): 74 kB | 61 kB | 98/108 kB&#xD;Progress (3): 74 kB | 61 kB | 102/108 kB&#xD;Progress (3): 74 kB | 61 kB | 106/108 kB&#xD;Progress (3): 74 kB | 61 kB | 108 kB    &#xD;Progress (4): 74 kB | 61 kB | 108 kB | 4.1/46 kB&#xD;Progress (4): 74 kB | 61 kB | 108 kB | 7.7/46 kB&#xD;Progress (4): 74 kB | 61 kB | 108 kB | 12/46 kB &#xD;Progress (4): 74 kB | 61 kB | 108 kB | 16/46 kB&#xD;Progress (4): 74 kB | 61 kB | 108 kB | 20/46 kB&#xD;Progress (4): 74 kB | 61 kB | 108 kB | 24/46 kB&#xD;Progress (4): 74 kB | 61 kB | 108 kB | 28/46 kB&#xD;Progress (4): 74 kB | 61 kB | 108 kB | 32/46 kB&#xD;Progress (4): 74 kB | 61 kB | 108 kB | 36/46 kB&#xD;Progress (4): 74 kB | 61 kB | 108 kB | 40/46 kB&#xD;Progress (4): 74 kB | 61 kB | 108 kB | 45/46 kB&#xD;Progress (4): 74 kB | 61 kB | 108 kB | 46 kB   &#xD;                                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-api/1.7/aether-api-1.7.jar (74 kB at 623 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-sec-dispatcher/1.3/plexus-sec-dispatcher-1.3.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.14/plexus-interpolation-1.14.jar (61 kB at 489 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-cipher/1.4/plexus-cipher-1.4.jar&#xA;Progress (3): 108 kB | 46 kB | 4.1/4.2 kB&#xD;Progress (3): 108 kB | 46 kB | 4.2 kB    &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-util/1.7/aether-util-1.7.jar (108 kB at 818 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.3/plexus-classworlds-2.2.3.jar (46 kB at 349 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/3.0/maven-artifact-3.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.3.0/plexus-utils-3.3.0.jar&#xA;Progress (2): 4.2 kB | 4.1/29 kB&#xD;Progress (2): 4.2 kB | 7.3/29 kB&#xD;Progress (2): 4.2 kB | 11/29 kB &#xD;Progress (2): 4.2 kB | 15/29 kB&#xD;Progress (2): 4.2 kB | 20/29 kB&#xD;Progress (2): 4.2 kB | 24/29 kB&#xD;Progress (2): 4.2 kB | 28/29 kB&#xD;Progress (2): 4.2 kB | 29 kB   &#xD;Progress (3): 4.2 kB | 29 kB | 4.1/13 kB&#xD;Progress (3): 4.2 kB | 29 kB | 7.7/13 kB&#xD;Progress (3): 4.2 kB | 29 kB | 12/13 kB &#xD;Progress (3): 4.2 kB | 29 kB | 13 kB   &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/2.0.0/plexus-component-annotations-2.0.0.jar (4.2 kB at 29 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-artifact-transfer/0.12.0/maven-artifact-transfer-0.12.0.jar&#xA;Progress (3): 29 kB | 13 kB | 3.2/52 kB&#xD;Progress (3): 29 kB | 13 kB | 7.3/52 kB&#xD;Progress (3): 29 kB | 13 kB | 11/52 kB &#xD;Progress (3): 29 kB | 13 kB | 15/52 kB&#xD;Progress (3): 29 kB | 13 kB | 20/52 kB&#xD;Progress (4): 29 kB | 13 kB | 20/52 kB | 4.1/263 kB&#xD;Progress (4): 29 kB | 13 kB | 24/52 kB | 4.1/263 kB&#xD;Progress (4): 29 kB | 13 kB | 24/52 kB | 7.7/263 kB&#xD;Progress (4): 29 kB | 13 kB | 28/52 kB | 7.7/263 kB&#xD;Progress (4): 29 kB | 13 kB | 32/52 kB | 7.7/263 kB&#xD;Progress (4): 29 kB | 13 kB | 36/52 kB | 7.7/263 kB&#xD;Progress (4): 29 kB | 13 kB | 36/52 kB | 12/263 kB &#xD;Progress (4): 29 kB | 13 kB | 40/52 kB | 12/263 kB&#xD;Progress (4): 29 kB | 13 kB | 44/52 kB | 12/263 kB&#xD;Progress (4): 29 kB | 13 kB | 44/52 kB | 16/263 kB&#xD;Progress (4): 29 kB | 13 kB | 48/52 kB | 16/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 16/263 kB   &#xD;Progress (4): 29 kB | 13 kB | 52 kB | 20/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 24/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 28/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 32/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 36/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 40/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 44/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 48/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 52/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 56/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 61/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 65/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 69/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 73/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 77/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 81/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 85/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 89/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 93/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 97/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 102/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 106/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 110/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 114/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 118/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 122/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 126/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 130/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 134/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 138/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 142/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 147/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 151/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 155/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 159/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 163/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 167/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 171/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 175/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 179/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 183/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 188/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 192/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 196/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 200/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 204/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 208/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 212/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 216/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 220/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 224/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 228/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 233/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 237/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 241/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 245/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 249/263 kB&#xD;Progress (4): 29 kB | 13 kB | 52 kB | 253/263 kB&#xD;                                                &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-sec-dispatcher/1.3/plexus-sec-dispatcher-1.3.jar (29 kB at 190 kB/s)&#xA;Progress (3): 13 kB | 52 kB | 257/263 kB&#xD;                                        &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/3.0.1/maven-common-artifact-filters-3.0.1.jar&#xA;Progress (3): 13 kB | 52 kB | 261/263 kB&#xD;Progress (3): 13 kB | 52 kB | 263 kB    &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-cipher/1.4/plexus-cipher-1.4.jar (13 kB at 88 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/3.1.0/maven-shared-utils-3.1.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.3.0/plexus-utils-3.3.0.jar (263 kB at 1.6 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-codec/commons-codec/1.11/commons-codec-1.11.jar&#xA;Progress (2): 52 kB | 4.1/61 kB&#xD;Progress (2): 52 kB | 7.7/61 kB&#xD;Progress (2): 52 kB | 12/61 kB &#xD;Progress (2): 52 kB | 16/61 kB&#xD;Progress (2): 52 kB | 20/61 kB&#xD;Progress (2): 52 kB | 24/61 kB&#xD;Progress (2): 52 kB | 28/61 kB&#xD;Progress (2): 52 kB | 32/61 kB&#xD;Progress (2): 52 kB | 36/61 kB&#xD;Progress (2): 52 kB | 40/61 kB&#xD;Progress (2): 52 kB | 45/61 kB&#xD;Progress (2): 52 kB | 49/61 kB&#xD;Progress (2): 52 kB | 53/61 kB&#xD;Progress (2): 52 kB | 57/61 kB&#xD;Progress (2): 52 kB | 61/61 kB&#xD;Progress (2): 52 kB | 61 kB   &#xD;Progress (3): 52 kB | 61 kB | 4.1/164 kB&#xD;Progress (3): 52 kB | 61 kB | 7.7/164 kB&#xD;Progress (3): 52 kB | 61 kB | 12/164 kB &#xD;Progress (3): 52 kB | 61 kB | 16/164 kB&#xD;Progress (3): 52 kB | 61 kB | 20/164 kB&#xD;Progress (3): 52 kB | 61 kB | 24/164 kB&#xD;Progress (3): 52 kB | 61 kB | 28/164 kB&#xD;Progress (3): 52 kB | 61 kB | 32/164 kB&#xD;Progress (3): 52 kB | 61 kB | 36/164 kB&#xD;Progress (3): 52 kB | 61 kB | 40/164 kB&#xD;Progress (3): 52 kB | 61 kB | 45/164 kB&#xD;Progress (3): 52 kB | 61 kB | 49/164 kB&#xD;Progress (3): 52 kB | 61 kB | 53/164 kB&#xD;Progress (3): 52 kB | 61 kB | 57/164 kB&#xD;Progress (3): 52 kB | 61 kB | 61/164 kB&#xD;Progress (3): 52 kB | 61 kB | 65/164 kB&#xD;Progress (3): 52 kB | 61 kB | 69/164 kB&#xD;Progress (3): 52 kB | 61 kB | 73/164 kB&#xD;Progress (3): 52 kB | 61 kB | 77/164 kB&#xD;Progress (3): 52 kB | 61 kB | 81/164 kB&#xD;Progress (3): 52 kB | 61 kB | 86/164 kB&#xD;Progress (3): 52 kB | 61 kB | 90/164 kB&#xD;Progress (3): 52 kB | 61 kB | 94/164 kB&#xD;Progress (3): 52 kB | 61 kB | 98/164 kB&#xD;Progress (3): 52 kB | 61 kB | 102/164 kB&#xD;Progress (3): 52 kB | 61 kB | 106/164 kB&#xD;Progress (3): 52 kB | 61 kB | 110/164 kB&#xD;Progress (3): 52 kB | 61 kB | 114/164 kB&#xD;Progress (3): 52 kB | 61 kB | 118/164 kB&#xD;Progress (3): 52 kB | 61 kB | 122/164 kB&#xD;Progress (3): 52 kB | 61 kB | 126/164 kB&#xD;Progress (3): 52 kB | 61 kB | 131/164 kB&#xD;Progress (4): 52 kB | 61 kB | 131/164 kB | 4.1/120 kB&#xD;Progress (4): 52 kB | 61 kB | 135/164 kB | 4.1/120 kB&#xD;Progress (4): 52 kB | 61 kB | 135/164 kB | 7.7/120 kB&#xD;Progress (4): 52 kB | 61 kB | 139/164 kB | 7.7/120 kB&#xD;Progress (4): 52 kB | 61 kB | 139/164 kB | 12/120 kB &#xD;Progress (4): 52 kB | 61 kB | 143/164 kB | 12/120 kB&#xD;                                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/3.0/maven-artifact-3.0.jar (52 kB at 309 kB/s)&#xA;Progress (3): 61 kB | 143/164 kB | 16/120 kB&#xD;Progress (3): 61 kB | 147/164 kB | 16/120 kB&#xD;Progress (3): 61 kB | 147/164 kB | 20/120 kB&#xD;                                            &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.5/slf4j-api-1.7.5.jar&#xA;Progress (3): 61 kB | 147/164 kB | 24/120 kB&#xD;Progress (3): 61 kB | 151/164 kB | 24/120 kB&#xD;Progress (3): 61 kB | 155/164 kB | 24/120 kB&#xD;Progress (3): 61 kB | 155/164 kB | 28/120 kB&#xD;Progress (3): 61 kB | 159/164 kB | 28/120 kB&#xD;Progress (3): 61 kB | 163/164 kB | 28/120 kB&#xD;Progress (3): 61 kB | 164 kB | 28/120 kB    &#xD;Progress (3): 61 kB | 164 kB | 32/120 kB&#xD;Progress (3): 61 kB | 164 kB | 36/120 kB&#xD;Progress (3): 61 kB | 164 kB | 40/120 kB&#xD;Progress (3): 61 kB | 164 kB | 45/120 kB&#xD;Progress (3): 61 kB | 164 kB | 49/120 kB&#xD;Progress (3): 61 kB | 164 kB | 53/120 kB&#xD;Progress (3): 61 kB | 164 kB | 57/120 kB&#xD;Progress (3): 61 kB | 164 kB | 61/120 kB&#xD;Progress (3): 61 kB | 164 kB | 65/120 kB&#xD;Progress (3): 61 kB | 164 kB | 69/120 kB&#xD;Progress (3): 61 kB | 164 kB | 73/120 kB&#xD;Progress (3): 61 kB | 164 kB | 77/120 kB&#xD;Progress (3): 61 kB | 164 kB | 81/120 kB&#xD;Progress (3): 61 kB | 164 kB | 86/120 kB&#xD;Progress (3): 61 kB | 164 kB | 90/120 kB&#xD;Progress (3): 61 kB | 164 kB | 94/120 kB&#xD;Progress (3): 61 kB | 164 kB | 98/120 kB&#xD;Progress (3): 61 kB | 164 kB | 102/120 kB&#xD;Progress (3): 61 kB | 164 kB | 106/120 kB&#xD;Progress (3): 61 kB | 164 kB | 110/120 kB&#xD;Progress (3): 61 kB | 164 kB | 114/120 kB&#xD;Progress (3): 61 kB | 164 kB | 118/120 kB&#xD;Progress (3): 61 kB | 164 kB | 120 kB    &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/3.0.1/maven-common-artifact-filters-3.0.1.jar (61 kB at 343 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm/8.0/asm-8.0.jar&#xA;Progress (3): 164 kB | 120 kB | 4.1/335 kB&#xD;Progress (3): 164 kB | 120 kB | 7.7/335 kB&#xD;Progress (3): 164 kB | 120 kB | 12/335 kB &#xD;Progress (3): 164 kB | 120 kB | 15/335 kB&#xD;Progress (3): 164 kB | 120 kB | 20/335 kB&#xD;Progress (3): 164 kB | 120 kB | 24/335 kB&#xD;Progress (3): 164 kB | 120 kB | 28/335 kB&#xD;Progress (3): 164 kB | 120 kB | 32/335 kB&#xD;Progress (3): 164 kB | 120 kB | 36/335 kB&#xD;Progress (3): 164 kB | 120 kB | 40/335 kB&#xD;Progress (3): 164 kB | 120 kB | 44/335 kB&#xD;Progress (3): 164 kB | 120 kB | 48/335 kB&#xD;Progress (3): 164 kB | 120 kB | 52/335 kB&#xD;Progress (3): 164 kB | 120 kB | 56/335 kB&#xD;Progress (3): 164 kB | 120 kB | 61/335 kB&#xD;Progress (3): 164 kB | 120 kB | 65/335 kB&#xD;Progress (3): 164 kB | 120 kB | 69/335 kB&#xD;Progress (3): 164 kB | 120 kB | 73/335 kB&#xD;Progress (3): 164 kB | 120 kB | 77/335 kB&#xD;Progress (3): 164 kB | 120 kB | 81/335 kB&#xD;Progress (3): 164 kB | 120 kB | 85/335 kB&#xD;Progress (3): 164 kB | 120 kB | 89/335 kB&#xD;Progress (3): 164 kB | 120 kB | 93/335 kB&#xD;Progress (3): 164 kB | 120 kB | 97/335 kB&#xD;Progress (3): 164 kB | 120 kB | 101/335 kB&#xD;Progress (3): 164 kB | 120 kB | 106/335 kB&#xD;Progress (3): 164 kB | 120 kB | 110/335 kB&#xD;Progress (3): 164 kB | 120 kB | 114/335 kB&#xD;Progress (3): 164 kB | 120 kB | 118/335 kB&#xD;Progress (3): 164 kB | 120 kB | 122/335 kB&#xD;Progress (3): 164 kB | 120 kB | 126/335 kB&#xD;Progress (3): 164 kB | 120 kB | 130/335 kB&#xD;Progress (3): 164 kB | 120 kB | 134/335 kB&#xD;Progress (3): 164 kB | 120 kB | 138/335 kB&#xD;Progress (4): 164 kB | 120 kB | 138/335 kB | 4.1/26 kB&#xD;Progress (4): 164 kB | 120 kB | 142/335 kB | 4.1/26 kB&#xD;Progress (4): 164 kB | 120 kB | 142/335 kB | 7.7/26 kB&#xD;Progress (4): 164 kB | 120 kB | 147/335 kB | 7.7/26 kB&#xD;Progress (4): 164 kB | 120 kB | 147/335 kB | 12/26 kB &#xD;Progress (4): 164 kB | 120 kB | 151/335 kB | 12/26 kB&#xD;Progress (4): 164 kB | 120 kB | 151/335 kB | 15/26 kB&#xD;Progress (4): 164 kB | 120 kB | 155/335 kB | 15/26 kB&#xD;Progress (4): 164 kB | 120 kB | 159/335 kB | 15/26 kB&#xD;Progress (4): 164 kB | 120 kB | 163/335 kB | 15/26 kB&#xD;Progress (4): 164 kB | 120 kB | 163/335 kB | 20/26 kB&#xD;Progress (4): 164 kB | 120 kB | 167/335 kB | 20/26 kB&#xD;Progress (4): 164 kB | 120 kB | 171/335 kB | 20/26 kB&#xD;Progress (4): 164 kB | 120 kB | 175/335 kB | 20/26 kB&#xD;Progress (4): 164 kB | 120 kB | 179/335 kB | 20/26 kB&#xD;Progress (4): 164 kB | 120 kB | 183/335 kB | 20/26 kB&#xD;Progress (4): 164 kB | 120 kB | 187/335 kB | 20/26 kB&#xD;Progress (4): 164 kB | 120 kB | 192/335 kB | 20/26 kB&#xD;Progress (4): 164 kB | 120 kB | 196/335 kB | 20/26 kB&#xD;                                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/3.1.0/maven-shared-utils-3.1.0.jar (164 kB at 894 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-commons/8.0/asm-commons-8.0.jar&#xA;Progress (3): 120 kB | 196/335 kB | 24/26 kB&#xD;Progress (3): 120 kB | 200/335 kB | 24/26 kB&#xD;Progress (3): 120 kB | 200/335 kB | 26 kB   &#xD;Progress (3): 120 kB | 204/335 kB | 26 kB&#xD;Progress (3): 120 kB | 208/335 kB | 26 kB&#xD;Progress (3): 120 kB | 212/335 kB | 26 kB&#xD;Progress (3): 120 kB | 216/335 kB | 26 kB&#xD;Progress (3): 120 kB | 220/335 kB | 26 kB&#xD;Progress (3): 120 kB | 224/335 kB | 26 kB&#xD;Progress (3): 120 kB | 228/335 kB | 26 kB&#xD;Progress (3): 120 kB | 233/335 kB | 26 kB&#xD;Progress (3): 120 kB | 237/335 kB | 26 kB&#xD;Progress (3): 120 kB | 241/335 kB | 26 kB&#xD;Progress (3): 120 kB | 245/335 kB | 26 kB&#xD;Progress (3): 120 kB | 249/335 kB | 26 kB&#xD;Progress (3): 120 kB | 253/335 kB | 26 kB&#xD;Progress (3): 120 kB | 257/335 kB | 26 kB&#xD;Progress (3): 120 kB | 261/335 kB | 26 kB&#xD;Progress (3): 120 kB | 265/335 kB | 26 kB&#xD;Progress (3): 120 kB | 269/335 kB | 26 kB&#xD;Progress (3): 120 kB | 274/335 kB | 26 kB&#xD;Progress (3): 120 kB | 278/335 kB | 26 kB&#xD;Progress (3): 120 kB | 282/335 kB | 26 kB&#xD;Progress (3): 120 kB | 286/335 kB | 26 kB&#xD;Progress (3): 120 kB | 290/335 kB | 26 kB&#xD;Progress (3): 120 kB | 294/335 kB | 26 kB&#xD;Progress (3): 120 kB | 298/335 kB | 26 kB&#xD;Progress (3): 120 kB | 302/335 kB | 26 kB&#xD;Progress (3): 120 kB | 306/335 kB | 26 kB&#xD;Progress (3): 120 kB | 310/335 kB | 26 kB&#xD;Progress (3): 120 kB | 314/335 kB | 26 kB&#xD;Progress (3): 120 kB | 319/335 kB | 26 kB&#xD;Progress (3): 120 kB | 323/335 kB | 26 kB&#xD;Progress (3): 120 kB | 327/335 kB | 26 kB&#xD;Progress (3): 120 kB | 331/335 kB | 26 kB&#xD;Progress (3): 120 kB | 335/335 kB | 26 kB&#xD;Progress (3): 120 kB | 335 kB | 26 kB    &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-artifact-transfer/0.12.0/maven-artifact-transfer-0.12.0.jar (120 kB at 640 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-tree/8.0/asm-tree-8.0.jar&#xA;Progress (3): 335 kB | 26 kB | 4.1/122 kB&#xD;Progress (3): 335 kB | 26 kB | 7.7/122 kB&#xD;Progress (3): 335 kB | 26 kB | 12/122 kB &#xD;Progress (3): 335 kB | 26 kB | 16/122 kB&#xD;Progress (3): 335 kB | 26 kB | 20/122 kB&#xD;Progress (3): 335 kB | 26 kB | 24/122 kB&#xD;Progress (3): 335 kB | 26 kB | 28/122 kB&#xD;Progress (3): 335 kB | 26 kB | 32/122 kB&#xD;Progress (3): 335 kB | 26 kB | 36/122 kB&#xD;Progress (3): 335 kB | 26 kB | 40/122 kB&#xD;Progress (3): 335 kB | 26 kB | 45/122 kB&#xD;Progress (3): 335 kB | 26 kB | 49/122 kB&#xD;Progress (3): 335 kB | 26 kB | 53/122 kB&#xD;Progress (3): 335 kB | 26 kB | 57/122 kB&#xD;Progress (3): 335 kB | 26 kB | 61/122 kB&#xD;Progress (3): 335 kB | 26 kB | 65/122 kB&#xD;Progress (3): 335 kB | 26 kB | 69/122 kB&#xD;Progress (3): 335 kB | 26 kB | 73/122 kB&#xD;Progress (3): 335 kB | 26 kB | 77/122 kB&#xD;Progress (3): 335 kB | 26 kB | 81/122 kB&#xD;Progress (3): 335 kB | 26 kB | 86/122 kB&#xD;Progress (3): 335 kB | 26 kB | 90/122 kB&#xD;Progress (3): 335 kB | 26 kB | 94/122 kB&#xD;Progress (3): 335 kB | 26 kB | 98/122 kB&#xD;Progress (3): 335 kB | 26 kB | 102/122 kB&#xD;Progress (3): 335 kB | 26 kB | 106/122 kB&#xD;Progress (3): 335 kB | 26 kB | 110/122 kB&#xD;Progress (3): 335 kB | 26 kB | 114/122 kB&#xD;Progress (3): 335 kB | 26 kB | 118/122 kB&#xD;Progress (3): 335 kB | 26 kB | 122 kB    &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.5/slf4j-api-1.7.5.jar (26 kB at 132 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-analysis/8.0/asm-analysis-8.0.jar&#xA;Progress (3): 335 kB | 122 kB | 4.1/72 kB&#xD;Progress (3): 335 kB | 122 kB | 7.7/72 kB&#xD;Progress (3): 335 kB | 122 kB | 12/72 kB &#xD;Progress (3): 335 kB | 122 kB | 15/72 kB&#xD;Progress (3): 335 kB | 122 kB | 20/72 kB&#xD;Progress (3): 335 kB | 122 kB | 24/72 kB&#xD;Progress (3): 335 kB | 122 kB | 28/72 kB&#xD;Progress (3): 335 kB | 122 kB | 32/72 kB&#xD;Progress (3): 335 kB | 122 kB | 36/72 kB&#xD;Progress (3): 335 kB | 122 kB | 40/72 kB&#xD;Progress (3): 335 kB | 122 kB | 44/72 kB&#xD;Progress (3): 335 kB | 122 kB | 48/72 kB&#xD;Progress (3): 335 kB | 122 kB | 52/72 kB&#xD;Progress (3): 335 kB | 122 kB | 56/72 kB&#xD;Progress (3): 335 kB | 122 kB | 61/72 kB&#xD;Progress (3): 335 kB | 122 kB | 65/72 kB&#xD;Progress (3): 335 kB | 122 kB | 69/72 kB&#xD;Progress (3): 335 kB | 122 kB | 72 kB   &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-codec/commons-codec/1.11/commons-codec-1.11.jar (335 kB at 1.7 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm/8.0/asm-8.0.jar (122 kB at 582 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-dependency-tree/3.0.1/maven-dependency-tree-3.0.1.jar&#xA;Progress (2): 72 kB | 4.1/53 kB&#xD;Progress (2): 72 kB | 7.7/53 kB&#xD;Progress (2): 72 kB | 12/53 kB &#xD;Progress (2): 72 kB | 16/53 kB&#xD;Progress (2): 72 kB | 20/53 kB&#xD;Progress (2): 72 kB | 24/53 kB&#xD;Progress (2): 72 kB | 28/53 kB&#xD;Progress (2): 72 kB | 32/53 kB&#xD;Progress (2): 72 kB | 36/53 kB&#xD;Progress (2): 72 kB | 40/53 kB&#xD;Progress (2): 72 kB | 45/53 kB&#xD;Progress (2): 72 kB | 49/53 kB&#xD;Progress (2): 72 kB | 53 kB   &#xD;Progress (3): 72 kB | 53 kB | 4.1/305 kB&#xD;Progress (3): 72 kB | 53 kB | 7.7/305 kB&#xD;Progress (3): 72 kB | 53 kB | 12/305 kB &#xD;Progress (3): 72 kB | 53 kB | 16/305 kB&#xD;Progress (3): 72 kB | 53 kB | 20/305 kB&#xD;Progress (3): 72 kB | 53 kB | 24/305 kB&#xD;Progress (3): 72 kB | 53 kB | 28/305 kB&#xD;Progress (3): 72 kB | 53 kB | 32/305 kB&#xD;Progress (3): 72 kB | 53 kB | 36/305 kB&#xD;Progress (3): 72 kB | 53 kB | 40/305 kB&#xD;Progress (3): 72 kB | 53 kB | 45/305 kB&#xD;Progress (3): 72 kB | 53 kB | 49/305 kB&#xD;Progress (3): 72 kB | 53 kB | 53/305 kB&#xD;Progress (3): 72 kB | 53 kB | 57/305 kB&#xD;Progress (3): 72 kB | 53 kB | 61/305 kB&#xD;Progress (3): 72 kB | 53 kB | 65/305 kB&#xD;Progress (3): 72 kB | 53 kB | 69/305 kB&#xD;Progress (3): 72 kB | 53 kB | 73/305 kB&#xD;                                       &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-commons/8.0/asm-commons-8.0.jar (72 kB at 330 kB/s)&#xA;Progress (2): 53 kB | 77/305 kB&#xD;Progress (2): 53 kB | 81/305 kB&#xD;Progress (2): 53 kB | 86/305 kB&#xD;Progress (3): 53 kB | 86/305 kB | 4.1/33 kB&#xD;                                           &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether-util/0.9.0.M2/aether-util-0.9.0.M2.jar&#xA;Progress (3): 53 kB | 90/305 kB | 4.1/33 kB&#xD;Progress (3): 53 kB | 90/305 kB | 7.7/33 kB&#xD;Progress (3): 53 kB | 94/305 kB | 7.7/33 kB&#xD;Progress (3): 53 kB | 94/305 kB | 12/33 kB &#xD;Progress (3): 53 kB | 98/305 kB | 12/33 kB&#xD;Progress (3): 53 kB | 98/305 kB | 15/33 kB&#xD;Progress (3): 53 kB | 102/305 kB | 15/33 kB&#xD;Progress (3): 53 kB | 106/305 kB | 15/33 kB&#xD;Progress (3): 53 kB | 106/305 kB | 20/33 kB&#xD;Progress (3): 53 kB | 110/305 kB | 20/33 kB&#xD;Progress (3): 53 kB | 110/305 kB | 24/33 kB&#xD;Progress (3): 53 kB | 114/305 kB | 24/33 kB&#xD;Progress (3): 53 kB | 114/305 kB | 28/33 kB&#xD;Progress (3): 53 kB | 118/305 kB | 28/33 kB&#xD;Progress (3): 53 kB | 118/305 kB | 32/33 kB&#xD;Progress (3): 53 kB | 122/305 kB | 32/33 kB&#xD;Progress (3): 53 kB | 122/305 kB | 33 kB   &#xD;Progress (3): 53 kB | 126/305 kB | 33 kB&#xD;Progress (3): 53 kB | 131/305 kB | 33 kB&#xD;Progress (3): 53 kB | 135/305 kB | 33 kB&#xD;Progress (3): 53 kB | 139/305 kB | 33 kB&#xD;Progress (3): 53 kB | 143/305 kB | 33 kB&#xD;Progress (3): 53 kB | 147/305 kB | 33 kB&#xD;Progress (3): 53 kB | 151/305 kB | 33 kB&#xD;Progress (3): 53 kB | 155/305 kB | 33 kB&#xD;Progress (3): 53 kB | 159/305 kB | 33 kB&#xD;Progress (3): 53 kB | 163/305 kB | 33 kB&#xD;Progress (3): 53 kB | 167/305 kB | 33 kB&#xD;Progress (3): 53 kB | 172/305 kB | 33 kB&#xD;Progress (3): 53 kB | 176/305 kB | 33 kB&#xD;Progress (3): 53 kB | 180/305 kB | 33 kB&#xD;Progress (3): 53 kB | 184/305 kB | 33 kB&#xD;Progress (3): 53 kB | 188/305 kB | 33 kB&#xD;Progress (3): 53 kB | 192/305 kB | 33 kB&#xD;Progress (3): 53 kB | 196/305 kB | 33 kB&#xD;Progress (3): 53 kB | 200/305 kB | 33 kB&#xD;Progress (3): 53 kB | 204/305 kB | 33 kB&#xD;Progress (3): 53 kB | 208/305 kB | 33 kB&#xD;Progress (3): 53 kB | 213/305 kB | 33 kB&#xD;Progress (3): 53 kB | 217/305 kB | 33 kB&#xD;Progress (3): 53 kB | 221/305 kB | 33 kB&#xD;Progress (3): 53 kB | 225/305 kB | 33 kB&#xD;Progress (3): 53 kB | 229/305 kB | 33 kB&#xD;Progress (3): 53 kB | 233/305 kB | 33 kB&#xD;Progress (3): 53 kB | 237/305 kB | 33 kB&#xD;Progress (3): 53 kB | 241/305 kB | 33 kB&#xD;Progress (3): 53 kB | 245/305 kB | 33 kB&#xD;Progress (3): 53 kB | 249/305 kB | 33 kB&#xD;Progress (3): 53 kB | 253/305 kB | 33 kB&#xD;Progress (3): 53 kB | 258/305 kB | 33 kB&#xD;Progress (3): 53 kB | 262/305 kB | 33 kB&#xD;Progress (3): 53 kB | 266/305 kB | 33 kB&#xD;Progress (3): 53 kB | 270/305 kB | 33 kB&#xD;Progress (3): 53 kB | 274/305 kB | 33 kB&#xD;Progress (3): 53 kB | 278/305 kB | 33 kB&#xD;Progress (3): 53 kB | 282/305 kB | 33 kB&#xD;Progress (3): 53 kB | 286/305 kB | 33 kB&#xD;Progress (3): 53 kB | 290/305 kB | 33 kB&#xD;Progress (3): 53 kB | 294/305 kB | 33 kB&#xD;Progress (3): 53 kB | 299/305 kB | 33 kB&#xD;Progress (3): 53 kB | 303/305 kB | 33 kB&#xD;Progress (3): 53 kB | 305 kB | 33 kB    &#xD;Progress (4): 53 kB | 305 kB | 33 kB | 4.1/37 kB&#xD;Progress (4): 53 kB | 305 kB | 33 kB | 7.7/37 kB&#xD;Progress (4): 53 kB | 305 kB | 33 kB | 11/37 kB &#xD;Progress (4): 53 kB | 305 kB | 33 kB | 15/37 kB&#xD;Progress (4): 53 kB | 305 kB | 33 kB | 20/37 kB&#xD;Progress (4): 53 kB | 305 kB | 33 kB | 24/37 kB&#xD;Progress (4): 53 kB | 305 kB | 33 kB | 28/37 kB&#xD;Progress (4): 53 kB | 305 kB | 33 kB | 32/37 kB&#xD;Progress (4): 53 kB | 305 kB | 33 kB | 36/37 kB&#xD;Progress (4): 53 kB | 305 kB | 33 kB | 37 kB   &#xD;                                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-analysis/8.0/asm-analysis-8.0.jar (33 kB at 145 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.6/commons-io-2.6.jar&#xA;Progress (4): 53 kB | 305 kB | 37 kB | 4.1/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 7.7/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 12/134 kB &#xD;Progress (4): 53 kB | 305 kB | 37 kB | 16/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 20/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 24/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 28/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 32/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 36/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 40/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 45/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 49/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 53/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 57/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 61/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 65/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 69/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 73/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 77/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 81/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 86/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 90/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 94/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 98/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 102/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 106/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 110/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 114/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 118/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 122/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 126/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 131/134 kB&#xD;Progress (4): 53 kB | 305 kB | 37 kB | 134 kB    &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar (305 kB at 1.3 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/vafer/jdependency/2.4.0/jdependency-2.4.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-tree/8.0/asm-tree-8.0.jar (53 kB at 225 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-util/8.0/asm-util-8.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-dependency-tree/3.0.1/maven-dependency-tree-3.0.1.jar (37 kB at 153 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/guava/28.2-android/guava-28.2-android.jar&#xA;Progress (2): 134 kB | 4.1/215 kB&#xD;Progress (2): 134 kB | 7.7/215 kB&#xD;Progress (2): 134 kB | 12/215 kB &#xD;Progress (2): 134 kB | 16/215 kB&#xD;Progress (2): 134 kB | 20/215 kB&#xD;Progress (2): 134 kB | 24/215 kB&#xD;Progress (2): 134 kB | 28/215 kB&#xD;Progress (2): 134 kB | 32/215 kB&#xD;Progress (2): 134 kB | 36/215 kB&#xD;Progress (2): 134 kB | 40/215 kB&#xD;Progress (2): 134 kB | 45/215 kB&#xD;Progress (2): 134 kB | 49/215 kB&#xD;Progress (2): 134 kB | 53/215 kB&#xD;Progress (2): 134 kB | 57/215 kB&#xD;Progress (2): 134 kB | 61/215 kB&#xD;Progress (2): 134 kB | 65/215 kB&#xD;Progress (2): 134 kB | 69/215 kB&#xD;Progress (2): 134 kB | 73/215 kB&#xD;Progress (2): 134 kB | 77/215 kB&#xD;Progress (2): 134 kB | 81/215 kB&#xD;Progress (2): 134 kB | 86/215 kB&#xD;Progress (2): 134 kB | 90/215 kB&#xD;Progress (2): 134 kB | 94/215 kB&#xD;Progress (2): 134 kB | 98/215 kB&#xD;Progress (2): 134 kB | 102/215 kB&#xD;Progress (2): 134 kB | 106/215 kB&#xD;Progress (2): 134 kB | 110/215 kB&#xD;Progress (2): 134 kB | 114/215 kB&#xD;Progress (2): 134 kB | 118/215 kB&#xD;Progress (2): 134 kB | 122/215 kB&#xD;Progress (2): 134 kB | 126/215 kB&#xD;Progress (2): 134 kB | 131/215 kB&#xD;Progress (2): 134 kB | 135/215 kB&#xD;Progress (2): 134 kB | 139/215 kB&#xD;Progress (2): 134 kB | 143/215 kB&#xD;Progress (2): 134 kB | 147/215 kB&#xD;Progress (2): 134 kB | 151/215 kB&#xD;Progress (2): 134 kB | 155/215 kB&#xD;Progress (2): 134 kB | 159/215 kB&#xD;Progress (2): 134 kB | 163/215 kB&#xD;Progress (2): 134 kB | 167/215 kB&#xD;Progress (2): 134 kB | 172/215 kB&#xD;Progress (2): 134 kB | 176/215 kB&#xD;Progress (2): 134 kB | 180/215 kB&#xD;Progress (2): 134 kB | 184/215 kB&#xD;Progress (2): 134 kB | 188/215 kB&#xD;Progress (2): 134 kB | 192/215 kB&#xD;Progress (2): 134 kB | 196/215 kB&#xD;Progress (2): 134 kB | 200/215 kB&#xD;Progress (2): 134 kB | 204/215 kB&#xD;Progress (2): 134 kB | 208/215 kB&#xD;Progress (2): 134 kB | 213/215 kB&#xD;Progress (2): 134 kB | 215 kB    &#xD;                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether-util/0.9.0.M2/aether-util-0.9.0.M2.jar (134 kB at 532 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/failureaccess/1.0.1/failureaccess-1.0.1.jar&#xA;Progress (2): 215 kB | 4.1/180 kB&#xD;Progress (2): 215 kB | 7.7/180 kB&#xD;Progress (2): 215 kB | 12/180 kB &#xD;Progress (2): 215 kB | 16/180 kB&#xD;Progress (2): 215 kB | 20/180 kB&#xD;Progress (2): 215 kB | 24/180 kB&#xD;Progress (2): 215 kB | 28/180 kB&#xD;Progress (2): 215 kB | 32/180 kB&#xD;Progress (2): 215 kB | 36/180 kB&#xD;Progress (2): 215 kB | 40/180 kB&#xD;Progress (2): 215 kB | 45/180 kB&#xD;Progress (2): 215 kB | 49/180 kB&#xD;Progress (2): 215 kB | 53/180 kB&#xD;Progress (2): 215 kB | 57/180 kB&#xD;Progress (2): 215 kB | 61/180 kB&#xD;Progress (2): 215 kB | 65/180 kB&#xD;Progress (2): 215 kB | 69/180 kB&#xD;Progress (2): 215 kB | 73/180 kB&#xD;Progress (2): 215 kB | 77/180 kB&#xD;Progress (2): 215 kB | 81/180 kB&#xD;Progress (2): 215 kB | 85/180 kB&#xD;Progress (2): 215 kB | 89/180 kB&#xD;Progress (2): 215 kB | 93/180 kB&#xD;Progress (2): 215 kB | 97/180 kB&#xD;Progress (2): 215 kB | 102/180 kB&#xD;Progress (2): 215 kB | 106/180 kB&#xD;Progress (2): 215 kB | 110/180 kB&#xD;Progress (2): 215 kB | 114/180 kB&#xD;Progress (2): 215 kB | 118/180 kB&#xD;Progress (2): 215 kB | 122/180 kB&#xD;Progress (2): 215 kB | 126/180 kB&#xD;Progress (3): 215 kB | 126/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 130/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 134/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 138/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 142/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 147/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 147/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 151/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 155/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 159/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 159/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 163/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 167/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 171/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 175/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 179/180 kB | 0/2.6 MB&#xD;Progress (3): 215 kB | 179/180 kB | 0.1/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.1/2.6 MB    &#xD;Progress (3): 215 kB | 180 kB | 0.1/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.1/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.1/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.1/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.1/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.2/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.2/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.2/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.2/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.2/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.2/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.3/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.3/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.3/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.3/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.3/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.3/2.6 MB&#xD;Progress (3): 215 kB | 180 kB | 0.4/2.6 MB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 4.1/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 7.7/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 7.7/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 12/85 kB &#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 16/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 20/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 20/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 24/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 28/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 32/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 36/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 40/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 45/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 45/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 49/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 53/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 57/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 61/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 61/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 65/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 69/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 73/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 73/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 77/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 81/85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.4/2.6 MB | 85 kB   &#xD;Progress (4): 215 kB | 180 kB | 0.5/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.5/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.5/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.5/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.5/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.5/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.6/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.6/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.6/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.6/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.6/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.6/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.7/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.7/2.6 MB | 85 kB&#xD;Progress (4): 215 kB | 180 kB | 0.7/2.6 MB | 85 kB&#xD;                                                  &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.6/commons-io-2.6.jar (215 kB at 826 kB/s)&#xA;Progress (3): 180 kB | 0.7/2.6 MB | 85 kB&#xD;                                         &#xD;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/listenablefuture/9999.0-empty-to-avoid-conflict-with-guava/listenablefuture-9999.0-empty-to-avoid-conflict-with-guava.jar&#xA;Progress (3): 180 kB | 0.7/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 0.7/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 0.8/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 0.8/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 0.8/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 0.8/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 0.8/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 0.8/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 0.9/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 0.9/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 0.9/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 0.9/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 0.9/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 0.9/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.0/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.0/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.0/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.0/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.0/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.0/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.0/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.1/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.1/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.1/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.1/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.1/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.1/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.2/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.2/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.2/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.2/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.2/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.2/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.3/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.3/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.3/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.3/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.3/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.3/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.4/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.4/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.4/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.4/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.4/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.4/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.5/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.5/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.5/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.5/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.5/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.5/2.6 MB | 85 kB&#xD;Progress (3): 180 kB | 1.6/2.6 MB | 85 kB&#xD;Progress (4): 180 kB | 1.6/2.6 MB | 85 kB | 4.1/4.6 kB&#xD;Progress (4): 180 kB | 1.6/2.6 MB | 85 kB | 4.1/4.6 kB&#xD;Progress (4): 180 kB | 1.6/2.6 MB | 85 kB | 4.6 kB    &#xD;Progress (4): 180 kB | 1.6/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.6/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.6/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.6/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.7/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.7/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.7/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.7/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.7/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.7/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.8/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.8/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.8/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.8/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.8/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.8/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.9/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.9/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.9/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.9/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.9/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.9/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 1.9/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.0/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.0/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.0/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.0/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.0/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.0/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.1/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.1/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.1/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.1/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.1/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.1/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.2/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.2/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.2/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (4): 180 kB | 2.2/2.6 MB | 85 kB | 4.6 kB&#xD;                                                  &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/vafer/jdependency/2.4.0/jdependency-2.4.0.jar (180 kB at 672 kB/s)&#xA;Progress (3): 2.2/2.6 MB | 85 kB | 4.6 kB&#xD;                                         &#xD;Downloading from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.jar&#xA;Progress (3): 2.2/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.3/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.3/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.3/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.3/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.3/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.3/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.4/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.4/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.4/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.4/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.4/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.4/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.5/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.5/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.5/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.5/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.5/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.5/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.6/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.6/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.6/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.6/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.6/2.6 MB | 85 kB | 4.6 kB&#xD;Progress (3): 2.6 MB | 85 kB | 4.6 kB    &#xD;Progress (4): 2.6 MB | 85 kB | 4.6 kB | 2.2 kB&#xD;                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-util/8.0/asm-util-8.0.jar (85 kB at 304 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/checkerframework/checker-compat-qual/2.5.5/checker-compat-qual-2.5.5.jar&#xA;Progress (4): 2.6 MB | 4.6 kB | 2.2 kB | 4.1/20 kB&#xD;Progress (4): 2.6 MB | 4.6 kB | 2.2 kB | 7.7/20 kB&#xD;Progress (4): 2.6 MB | 4.6 kB | 2.2 kB | 12/20 kB &#xD;Progress (4): 2.6 MB | 4.6 kB | 2.2 kB | 16/20 kB&#xD;Progress (4): 2.6 MB | 4.6 kB | 2.2 kB | 20 kB   &#xD;                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/failureaccess/1.0.1/failureaccess-1.0.1.jar (4.6 kB at 16 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_annotations/2.3.4/error_prone_annotations-2.3.4.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/guava/28.2-android/guava-28.2-android.jar (2.6 MB at 9.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/j2objc/j2objc-annotations/1.3/j2objc-annotations-1.3.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/listenablefuture/9999.0-empty-to-avoid-conflict-with-guava/listenablefuture-9999.0-empty-to-avoid-conflict-with-guava.jar (2.2 kB at 7.6 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.jar (20 kB at 67 kB/s)&#xA;Progress (1): 4.1/14 kB&#xD;Progress (1): 7.7/14 kB&#xD;Progress (1): 12/14 kB &#xD;Progress (1): 14 kB   &#xD;Progress (2): 14 kB | 4.1/8.8 kB&#xD;Progress (2): 14 kB | 7.7/8.8 kB&#xD;Progress (2): 14 kB | 8.8 kB    &#xD;Progress (3): 14 kB | 8.8 kB | 4.1/5.9 kB&#xD;Progress (3): 14 kB | 8.8 kB | 5.9 kB    &#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 4.1/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 7.7/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 12/500 kB &#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 16/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 20/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 24/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 28/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 32/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 36/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 40/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 45/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 49/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 53/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 57/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 61/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 65/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 69/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 73/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 77/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 81/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 86/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 90/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 94/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 98/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 102/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 106/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 110/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 114/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 118/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 122/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 126/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 131/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 135/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 139/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 143/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 147/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 151/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 155/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 159/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 163/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 167/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 172/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 176/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 180/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 184/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 188/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 192/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 196/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 200/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 204/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 208/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 213/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 217/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 221/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 225/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 229/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 233/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 237/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 241/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 245/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 249/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 253/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 258/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 262/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 266/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 270/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 274/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 278/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 282/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 286/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 290/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 294/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 299/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 303/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 307/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 311/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 315/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 319/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 323/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 327/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 331/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 335/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 339/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 344/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 348/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 352/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 356/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 360/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 364/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 368/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 372/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 376/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 380/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 385/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 389/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 393/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 397/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 401/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 405/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 409/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 413/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 417/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 421/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 426/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 430/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 434/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 438/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 442/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 446/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 450/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 454/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 458/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 462/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 466/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 471/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 475/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 479/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 483/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 487/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 491/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 495/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 499/500 kB&#xD;Progress (4): 14 kB | 8.8 kB | 5.9 kB | 500 kB    &#xD;                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/j2objc/j2objc-annotations/1.3/j2objc-annotations-1.3.jar (8.8 kB at 28 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_annotations/2.3.4/error_prone_annotations-2.3.4.jar (14 kB at 44 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.jar (500 kB at 1.5 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/checkerframework/checker-compat-qual/2.5.5/checker-compat-qual-2.5.5.jar (5.9 kB at 18 kB/s)&#xA;[INFO] Including io.github.stuartwdouglas.hacbs-test.simple:simple-jdk17:jar:0.1.2 in the shaded jar.&#xA;[INFO] Including io.github.stuartwdouglas.hacbs-test.shaded:shaded-jdk11:jar:1.9 in the shaded jar.&#xA;[INFO] Including io.github.stuartwdouglas.hacbs-test.simple:simple-jdk8:jar:1.2.4 in the shaded jar.&#xA;[INFO] Including io.github.stuartwdouglas.hacbs-test.gradle:hacbs-test-simple-gradle-jdk8:jar:1.1 in the shaded jar.&#xA;[WARNING] hacbs-test-simple-gradle-jdk8-1.1.jar, hacbs-test.jar, shaded-jdk11-1.9.jar, simple-jdk17-0.1.2.jar, simple-jdk8-1.2.4.jar define 1 overlapping resource: &#xA;[WARNING]   - META-INF/MANIFEST.MF&#xA;[WARNING] shaded-jdk11-1.9.jar, simple-jdk8-1.2.4.jar define 3 overlapping classes and resources: &#xA;[WARNING]   - META-INF/maven/io.github.stuartwdouglas.hacbs-test.simple/simple-jdk8/pom.properties&#xA;[WARNING]   - META-INF/maven/io.github.stuartwdouglas.hacbs-test.simple/simple-jdk8/pom.xml&#xA;[WARNING]   - io.github.stuartwdouglas.hacbstest.simple.simplejdk8.Placeholder&#xA;[WARNING] maven-shade-plugin has detected that some class files are&#xA;[WARNING] present in two or more JARs. When this happens, only one&#xA;[WARNING] single version of the class is copied to the uber jar.&#xA;[WARNING] Usually this is not harmful and you can skip these warnings,&#xA;[WARNING] otherwise try to manually exclude artifacts based on&#xA;[WARNING] mvn dependency:tree -Ddetail=true and the above output.&#xA;[WARNING] See http://maven.apache.org/plugins/maven-shade-plugin/&#xA;[INFO] Replacing original artifact with shaded artifact.&#xA;[INFO] Replacing /work/target/hacbs-test.jar with /work/target/simple-java-project-1.0-SNAPSHOT-shaded.jar&#xA;[INFO] ------------------------------------------------------------------------&#xA;[INFO] BUILD SUCCESS&#xA;[INFO] ------------------------------------------------------------------------&#xA;[INFO] Total time:  16.719 s&#xA;[INFO] Finished at: 2026-05-06T07:06:06Z&#xA;[INFO] ------------------------------------------------------------------------&#xA;[2/2] STEP 1/10: FROM registry.access.redhat.com/ubi8/openjdk-17-runtime:1.23&#xA;[2/2] STEP 2/10: USER 185&#xA;[2/2] STEP 3/10: WORKDIR /work/&#xA;[2/2] STEP 4/10: COPY --from=builder /work/target/hacbs-test.jar /deployments&#xA;[2/2] STEP 5/10: EXPOSE 8081&#xA;[2/2] STEP 6/10: ENV AB_JOLOKIA_OFF=&#34;&#34;&#xA;[2/2] STEP 7/10: ENV JAVA_APP_JAR=&#34;/deployments/hacbs-test.jar&#34;&#xA;[2/2] STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;[2/2] STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;[2/2] STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;6b9bd461df01d5c46c036b89582454398a302598&#34; &#34;org.opencontainers.image.revision&#34;=&#34;6b9bd461df01d5c46c036b89582454398a302598&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/konflux-test-integration&#34; &#34;quay.expires-after&#34;=&#34;6h&#34; &#34;build-date&#34;=&#34;2026-05-06T07:05:15Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-06T07:05:15Z&#34;&#xA;[2/2] COMMIT quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy:on-pr-6b9bd461df01d5c46c036b89582454398a302598&#xA;--&gt; 7e51bb239d46&#xA;Successfully tagged quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy:on-pr-6b9bd461df01d5c46c036b89582454398a302598&#xA;7e51bb239d4654a2ab7dff60d088ab450ae47af76a00e24c20f7674495054d34&#xA;[2026-05-06T07:06:08,493440439+00:00] Unsetting proxy&#xA;[2026-05-06T07:06:08,494816248+00:00] Add metadata&#xA;Recording base image digests used&#xA;registry.access.redhat.com/ubi8/openjdk-17:1.23 registry.access.redhat.com/ubi8/openjdk-17:1.23@sha256:6b594556530fc1f7e56ec1a798f27cfc87e328923d71a15b3a625cc0fc57618b&#xA;registry.access.redhat.com/ubi8/openjdk-17-runtime:1.23 registry.access.redhat.com/ubi8/openjdk-17-runtime:1.23@sha256:d1c41a39da6dd219a2c002e604e9412ecc1d8635533da3aadfbcf4d2a6878e92&#xA;Getting image source signatures&#xA;Copying blob sha256:a8c89bfd6f9d39f1c585bd9b733f85810225c91ddb4c6333c69fa70bc5d177ee&#xA;Copying blob sha256:4fbd9e6ac35fac37ebf8cf165f41281d51056114cf97527414fa90b32b5d14d6&#xA;Copying blob sha256:5dbea8ad0b8fafeea55704769972b289a91254713435480168ce69a7d81ee19e&#xA;Copying config sha256:7e51bb239d4654a2ab7dff60d088ab450ae47af76a00e24c20f7674495054d34&#xA;Writing manifest to image destination&#xA;[2026-05-06T07:06:09,823144409+00:00] End build&#xA;&#xA;pod: test-component-pac-uxaxuy-o8a358e57681445c9d96a3d8e46d441d6-pod | container step-push: &#xA;[2026-05-06T07:06:10,334791674+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-06T07:06:12,475600534+00:00] Convert image&#xA;[2026-05-06T07:06:12,476641477+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy:test-component-pac-uxaxuy-on-pull-request-p8pzw-build-container&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy:on-pr-6b9bd461df01d5c46c036b89582454398a302598 docker://quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy:test-component-pac-uxaxuy-on-pull-request-p8pzw-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:a8c89bfd6f9d39f1c585bd9b733f85810225c91ddb4c6333c69fa70bc5d177ee&#xA;Copying blob sha256:5dbea8ad0b8fafeea55704769972b289a91254713435480168ce69a7d81ee19e&#xA;Copying blob sha256:4fbd9e6ac35fac37ebf8cf165f41281d51056114cf97527414fa90b32b5d14d6&#xA;Copying config sha256:7e51bb239d4654a2ab7dff60d088ab450ae47af76a00e24c20f7674495054d34&#xA;Writing manifest to image destination&#xA;[2026-05-06T07:06:21,513872534+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy:on-pr-6b9bd461df01d5c46c036b89582454398a302598&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /workspace/source/image-digest quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy:on-pr-6b9bd461df01d5c46c036b89582454398a302598 docker://quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy:on-pr-6b9bd461df01d5c46c036b89582454398a302598&#xA;Getting image source signatures&#xA;Copying blob sha256:a8c89bfd6f9d39f1c585bd9b733f85810225c91ddb4c6333c69fa70bc5d177ee&#xA;Copying blob sha256:4fbd9e6ac35fac37ebf8cf165f41281d51056114cf97527414fa90b32b5d14d6&#xA;Copying blob sha256:5dbea8ad0b8fafeea55704769972b289a91254713435480168ce69a7d81ee19e&#xA;Copying config sha256:7e51bb239d4654a2ab7dff60d088ab450ae47af76a00e24c20f7674495054d34&#xA;Writing manifest to image destination&#xA;sha256:5dd9fe4a956f91bba7732dc5acb7f1892f8806809220a88578a6beffa8a5f3a1quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy:on-pr-6b9bd461df01d5c46c036b89582454398a302598&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-05-06T07:06:22,383981012+00:00] End push&#xA;&#xA;pod: test-component-pac-uxaxuy-o8a358e57681445c9d96a3d8e46d441d6-pod | container step-sbom-syft-generate: &#xA;[2026-05-06T07:06:22,532226425+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-05-06T07:06:32,919916640+00:00] End sbom-syft-generate&#xA;&#xA;pod: test-component-pac-uxaxuy-o8a358e57681445c9d96a3d8e46d441d6-pod | container step-prepare-sboms: &#xA;[2026-05-06T07:06:33,717786398+00:00] Prepare SBOM&#xA;[2026-05-06T07:06:33,721637699+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-05-06 07:06:34,860 [INFO] mobster.log: Logging level set to 20&#xA;2026-05-06 07:06:34,958 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:d1c41a39da6dd219a2c002e604e9412ecc1d8635533da3aadfbcf4d2a6878e92&#xA;2026-05-06 07:06:35,457 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\nerror during command execution: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\n&#34;&#xA;2026-05-06 07:06:35,701 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\nerror during command execution: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\n&#34;&#xA;2026-05-06 07:06:36,133 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\nerror during command execution: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\n&#34;&#xA;2026-05-06 07:06:36,396 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\nerror during command execution: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\n&#34;&#xA;2026-05-06 07:06:36,806 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\nerror during command execution: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\n&#34;&#xA;2026-05-06 07:06:37,073 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\nerror during command execution: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\n&#34;&#xA;2026-05-06 07:06:37,480 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\nerror during command execution: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\n&#34;&#xA;2026-05-06 07:06:37,744 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\nerror during command execution: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\n&#34;&#xA;2026-05-06 07:06:37,745 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-05-06 07:06:37,745 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-05-06 07:06:37,745 [INFO] mobster.log: Contextual workflow completed in 2.80s&#xA;2026-05-06 07:06:37,778 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-05-06T07:06:37,840185350+00:00] End prepare-sboms&#xA;&#xA;pod: test-component-pac-uxaxuy-o8a358e57681445c9d96a3d8e46d441d6-pod | container step-upload-sbom: &#xA;[2026-05-06T07:06:37,845403438+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy:on-pr-6b9bd461df01d5c46c036b89582454398a302598@sha256:5dd9fe4a956f91bba7732dc5acb7f1892f8806809220a88578a6beffa8a5f3a1&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy@sha256:5dd9fe4a956f91bba7732dc5acb7f1892f8806809220a88578a6beffa8a5f3a1] to [quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy:sha256-5dd9fe4a956f91bba7732dc5acb7f1892f8806809220a88578a6beffa8a5f3a1.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/integration1-kgjp/test-component-pac-uxaxuy@sha256:0066e1115433d041a03ca1c892ac55e50af94dfdc66f3327ba4c3f1cf9fcc6ca&#xA;[2026-05-06T07:06:41,416021153+00:00] End upload-sbom&#xA;&#xA; pod: test-component-pac-uxaxuy-on-pull-request-p8pzw-init-pod | init container: prepare&#xA;2026/05/06 07:04:15 Entrypoint initialization&#xA;&#xA;pod: test-component-pac-uxaxuy-on-pull-request-p8pzw-init-pod | container step-init: &#xA;time=&#34;2026-05-06T07:04:18Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-06T07:04:18Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-06T07:04:18Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-06T07:04:18Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-06T07:04:18Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-06T07:04:18Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:04:18Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-06T07:04:18Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-06T07:04:18Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 found after retrigger for component integration1-kgjp/test-component-pac-uxaxuy&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 found for Component integration1-kgjp/test-component-pac-uxaxuy&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: ResolvingTaskRef&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Running&#xA;PipelineRun test-component-pac-uxaxuy-on-pull-request-dtn66 reason: Completed&#xA;&lt; Exit [It] waits for build PipelineRun to succeed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:101 @ 05/06/26 07:13:36.119 (9m31.077s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.119&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.12 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created should have a related PaC init PR created [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.302945013">
              <system-err>&gt; Enter [It] should have a related PaC init PR created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:107 @ 05/06/26 07:13:36.121&#xA;&lt; Exit [It] should have a related PaC init PR created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:107 @ 05/06/26 07:13:36.424 (303ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.424&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.424 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.101556774">
              <system-err>&gt; Enter [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:128 @ 05/06/26 07:13:36.425&#xA;&lt; Exit [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:128 @ 05/06/26 07:13:36.526 (101ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.526&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.526 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the Snapshot is created [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007555944">
              <system-err>&gt; Enter [It] checks if the Snapshot is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:132 @ 05/06/26 07:13:36.527&#xA;&lt; Exit [It] checks if the Snapshot is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:132 @ 05/06/26 07:13:36.534 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.534&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.534 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.189003479">
              <system-err>&gt; Enter [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:137 @ 05/06/26 07:13:36.535&#xA;&lt; Exit [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:137 @ 05/06/26 07:13:36.723 (189ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.723&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.723 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded verifies that the finalizer has been removed from the build pipelinerun [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.100889395">
              <system-err>&gt; Enter [It] verifies that the finalizer has been removed from the build pipelinerun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:141 @ 05/06/26 07:13:36.724&#xA;&lt; Exit [It] verifies that the finalizer has been removed from the build pipelinerun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:141 @ 05/06/26 07:13:36.824 (101ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.825&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.825 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if all of the integrationPipelineRuns passed [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="passed" time="0.097650544">
              <system-err>&gt; Enter [It] checks if all of the integrationPipelineRuns passed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:154 @ 05/06/26 07:13:36.825&#xA;Integration test scenario my-integration-test-tdkz is found&#xA;PipelineRun my-integration-test-tdkz-m9clk reason: Succeeded&#xA;&lt; Exit [It] checks if all of the integrationPipelineRuns passed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:154 @ 05/06/26 07:13:36.922 (97ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.923&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.923 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the passed status of integration test is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.008388888">
              <system-err>&gt; Enter [It] checks if the passed status of integration test is reported in the Snapshot - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:158 @ 05/06/26 07:13:36.923&#xA;&lt; Exit [It] checks if the passed status of integration test is reported in the Snapshot - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:158 @ 05/06/26 07:13:36.931 (8ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.931&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.931 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the skipped integration test is absent from the Snapshot&#39;s status annotation [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.008290284">
              <system-err>&gt; Enter [It] checks if the skipped integration test is absent from the Snapshot&#39;s status annotation - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:173 @ 05/06/26 07:13:36.932&#xA;&lt; Exit [It] checks if the skipped integration test is absent from the Snapshot&#39;s status annotation - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:173 @ 05/06/26 07:13:36.94 (8ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.94&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:36.94 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the finalizer was removed from all of the related Integration pipelineRuns [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="20.017130863">
              <system-err>&gt; Enter [It] checks if the finalizer was removed from all of the related Integration pipelineRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:183 @ 05/06/26 07:13:36.94&#xA;Integration test scenario my-integration-test-tdkz is found&#xA;build pipelineRun integration1-kgjp/my-integration-test-tdkz-m9clk still contains the finalizer: test.appstudio.openshift.io/pipelinerun&#xA;&lt; Exit [It] checks if the finalizer was removed from all of the related Integration pipelineRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:183 @ 05/06/26 07:13:56.957 (20.017s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:56.957&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:56.957 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service creates a ReleasePlan [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.09219532">
              <system-err>&gt; Enter [It] creates a ReleasePlan - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:188 @ 05/06/26 07:13:56.958&#xA;IntegrationTestScenario my-integration-test-tdkz is found&#xA;IntegrationTestScenario skipped-its is found&#xA;&lt; Exit [It] creates a ReleasePlan - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:188 @ 05/06/26 07:13:57.05 (92ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:57.05&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:57.05 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service creates an snapshot of push event [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.049327131">
              <system-err>&gt; Enter [It] creates an snapshot of push event - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:198 @ 05/06/26 07:13:57.051&#xA;&lt; Exit [It] creates an snapshot of push event - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:198 @ 05/06/26 07:13:57.1 (49ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:57.1&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:57.1 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if the global candidate is updated after push event [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.011410002">
              <system-err>&gt; Enter [It] checks if the global candidate is updated after push event - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:205 @ 05/06/26 07:13:57.1&#xA;&lt; Exit [It] checks if the global candidate is updated after push event - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:205 @ 05/06/26 07:13:57.112 (11ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:57.112&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:13:57.112 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if all of the integrationPipelineRuns created by push event passed [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="passed" time="20.048835883">
              <system-err>&gt; Enter [It] checks if all of the integrationPipelineRuns created by push event passed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:218 @ 05/06/26 07:13:57.112&#xA;Integration test scenario my-integration-test-tdkz is found&#xA;PipelineRun my-integration-test-tdkz-g9j6q reason: &#xA;PipelineRun my-integration-test-tdkz-g9j6q reason: Succeeded&#xA;&lt; Exit [It] checks if all of the integrationPipelineRuns created by push event passed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:218 @ 05/06/26 07:14:17.161 (20.048s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:14:17.161&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:14:17.161 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if a Release is created successfully [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="4.996790993">
              <system-err>&gt; Enter [It] checks if a Release is created successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:222 @ 05/06/26 07:14:17.161&#xA;&lt; Exit [It] checks if a Release is created successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:222 @ 05/06/26 07:14:17.171 (10ms)&#xA;&gt; Enter [AfterAll] with happy path for general flow of Integration service - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:68 @ 05/06/26 07:14:17.171&#xA;&lt; Exit [AfterAll] with happy path for general flow of Integration service - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:68 @ 05/06/26 07:14:22.158 (4.987s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:14:22.158&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:14:22.158 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail triggers a build PipelineRun [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="234.210418825">
              <system-err>&gt; Enter [BeforeAll] with an integration test fail - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:234 @ 05/06/26 07:14:22.159&#xA;&lt; Exit [BeforeAll] with an integration test fail - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:234 @ 05/06/26 07:14:36.301 (14.142s)&#xA;&gt; Enter [It] triggers a build PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:266 @ 05/06/26 07:14:36.301&#xA;no pipelinerun found for component test-component-pac-upezam (application: integ-app-pfqz, namespace: integration2-lzzr)PipelineRun test-component-pac-upezam-on-pull-request-hgl6s found for Component integration2-lzzr/test-component-pac-upezam&#xA;PipelineRun test-component-pac-upezam-on-pull-request-hgl6s reason: Running&#xA;PipelineRun test-component-pac-upezam-on-pull-request-hgl6s reason: Running&#xA;PipelineRun test-component-pac-upezam-on-pull-request-hgl6s reason: Running&#xA;PipelineRun test-component-pac-upezam-on-pull-request-hgl6s reason: Running&#xA;PipelineRun test-component-pac-upezam-on-pull-request-hgl6s reason: Running&#xA;PipelineRun test-component-pac-upezam-on-pull-request-hgl6s reason: Running&#xA;PipelineRun test-component-pac-upezam-on-pull-request-hgl6s reason: Running&#xA;PipelineRun test-component-pac-upezam-on-pull-request-hgl6s reason: Running&#xA;PipelineRun test-component-pac-upezam-on-pull-request-hgl6s reason: Running&#xA;PipelineRun test-component-pac-upezam-on-pull-request-hgl6s reason: Running&#xA;PipelineRun my-integration-test-ddnk-7hqlm reason: Succeeded&#xA;&lt; Exit [It] triggers a build PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:266 @ 05/06/26 07:18:16.369 (3m40.068s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.369&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.369 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail should have a related PaC init PR created [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.294444781">
              <system-err>&gt; Enter [It] should have a related PaC init PR created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:273 @ 05/06/26 07:18:16.37&#xA;&lt; Exit [It] should have a related PaC init PR created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:273 @ 05/06/26 07:18:16.664 (294ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.664&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.664 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the BuildPipelineRun have the annotation of chains signed [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.105375046">
              <system-err>&gt; Enter [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:292 @ 05/06/26 07:18:16.664&#xA;&lt; Exit [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:292 @ 05/06/26 07:18:16.769 (105ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.77&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.77 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the Snapshot is created [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007152709">
              <system-err>&gt; Enter [It] checks if the Snapshot is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:296 @ 05/06/26 07:18:16.77&#xA;&lt; Exit [It] checks if the Snapshot is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:296 @ 05/06/26 07:18:16.777 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.777&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.777 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the Build PipelineRun got annotated with Snapshot name [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.015130154">
              <system-err>&gt; Enter [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:301 @ 05/06/26 07:18:16.777&#xA;&lt; Exit [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:301 @ 05/06/26 07:18:16.792 (15ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.792&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.792 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if all of the integrationPipelineRuns finished [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="passed" time="0.062373624">
              <system-err>&gt; Enter [It] checks if all of the integrationPipelineRuns finished - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:305 @ 05/06/26 07:18:16.793&#xA;Integration test scenario my-integration-test-ddnk is found&#xA;PipelineRun my-integration-test-ddnk-7hqlm reason: Succeeded&#xA;&lt; Exit [It] checks if all of the integrationPipelineRuns finished - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:305 @ 05/06/26 07:18:16.855 (62ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.855&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.855 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the failed status of integration test is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.010229966">
              <system-err>&gt; Enter [It] checks if the failed status of integration test is reported in the Snapshot - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:309 @ 05/06/26 07:18:16.856&#xA;&lt; Exit [It] checks if the failed status of integration test is reported in the Snapshot - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:309 @ 05/06/26 07:18:16.865 (10ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.866&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.866 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the skipped integration test is absent from the Snapshot&#39;s status annotation [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007648863">
              <system-err>&gt; Enter [It] checks if the skipped integration test is absent from the Snapshot&#39;s status annotation - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:324 @ 05/06/26 07:18:16.866&#xA;&lt; Exit [It] checks if the skipped integration test is absent from the Snapshot&#39;s status annotation - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:324 @ 05/06/26 07:18:16.873 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.874&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.874 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if snapshot is marked as failed [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.009944198">
              <system-err>&gt; Enter [It] checks if snapshot is marked as failed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:334 @ 05/06/26 07:18:16.874&#xA;&lt; Exit [It] checks if snapshot is marked as failed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:334 @ 05/06/26 07:18:16.884 (10ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.884&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.884 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the finalizer was removed from all of the related Integration pipelineRuns [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.071997153">
              <system-err>&gt; Enter [It] checks if the finalizer was removed from all of the related Integration pipelineRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:340 @ 05/06/26 07:18:16.884&#xA;Integration test scenario my-integration-test-ddnk is found&#xA;&lt; Exit [It] checks if the finalizer was removed from all of the related Integration pipelineRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:340 @ 05/06/26 07:18:16.956 (72ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.956&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:16.956 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail creates a new IntegrationTestScenario [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.050223634">
              <system-err>&gt; Enter [It] creates a new IntegrationTestScenario - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:344 @ 05/06/26 07:18:16.956&#xA;&lt; Exit [It] creates a new IntegrationTestScenario - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:344 @ 05/06/26 07:18:17.006 (50ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:17.007&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:17.007 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail updates the Snapshot with the re-run label for the new scenario [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.108700549">
              <system-err>&gt; Enter [It] updates the Snapshot with the re-run label for the new scenario - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:349 @ 05/06/26 07:18:17.007&#xA;&lt; Exit [It] updates the Snapshot with the re-run label for the new scenario - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:349 @ 05/06/26 07:18:17.115 (108ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:17.116&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:17.116 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the new integration pipelineRun started [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="passed" time="20.013124215">
              <system-err>&gt; Enter [It] checks if the new integration pipelineRun started - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:358 @ 05/06/26 07:18:17.116&#xA;pipelinerun %s/%s hasn&#39;t started yet integration2-lzzr my-integration-test-cyms-5lbjd&#xA;&lt; Exit [It] checks if the new integration pipelineRun started - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:358 @ 05/06/26 07:18:37.129 (20.013s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:37.129&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:37.129 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the re-run label was removed from the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.008816802">
              <system-err>&gt; Enter [It] checks if the re-run label was removed from the Snapshot - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:364 @ 05/06/26 07:18:37.13&#xA;&lt; Exit [It] checks if the re-run label was removed from the Snapshot - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:364 @ 05/06/26 07:18:37.138 (9ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:37.138&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:37.138 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if all integration pipelineRuns finished successfully [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="passed" time="0.020938514">
              <system-err>&gt; Enter [It] checks if all integration pipelineRuns finished successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:378 @ 05/06/26 07:18:37.139&#xA;Integration test scenario my-integration-test-cyms is found&#xA;PipelineRun my-integration-test-cyms-5lbjd reason: Succeeded&#xA;Integration test scenario my-integration-test-ddnk is found&#xA;PipelineRun my-integration-test-ddnk-7hqlm reason: Succeeded&#xA;&lt; Exit [It] checks if all integration pipelineRuns finished successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:378 @ 05/06/26 07:18:37.159 (21ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:37.159&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:37.159 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the name of the re-triggered pipelinerun is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.066280387">
              <system-err>&gt; Enter [It] checks if the name of the re-triggered pipelinerun is reported in the Snapshot - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:382 @ 05/06/26 07:18:37.16&#xA;&lt; Exit [It] checks if the name of the re-triggered pipelinerun is reported in the Snapshot - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:382 @ 05/06/26 07:18:37.226 (66ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:37.226&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:37.226 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if snapshot is still marked as failed [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.005714357">
              <system-err>&gt; Enter [It] checks if snapshot is still marked as failed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:399 @ 05/06/26 07:18:37.226&#xA;&lt; Exit [It] checks if snapshot is still marked as failed - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:399 @ 05/06/26 07:18:37.232 (5ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:37.232&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:37.232 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail creates an snapshot of push event [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.033175">
              <system-err>&gt; Enter [It] creates an snapshot of push event - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:406 @ 05/06/26 07:18:37.232&#xA;&lt; Exit [It] creates an snapshot of push event - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:406 @ 05/06/26 07:18:37.265 (33ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:37.265&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:37.265 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot of push event is created checks no Release CRs are created [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="4.601294715">
              <system-err>&gt; Enter [It] checks no Release CRs are created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:413 @ 05/06/26 07:18:37.266&#xA;&lt; Exit [It] checks no Release CRs are created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:413 @ 05/06/26 07:18:37.271 (5ms)&#xA;&gt; Enter [AfterAll] with an integration test fail - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:250 @ 05/06/26 07:18:37.271&#xA;&lt; Exit [AfterAll] with an integration test fail - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:250 @ 05/06/26 07:18:41.867 (4.596s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:41.867&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/integration.go:49 @ 05/06/26 07:18:41.867 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-zxqf [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="160.945115651">
              <system-err>&gt; Enter [BeforeAll] HACBS pipelines - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:237 @ 05/06/26 07:02:05.76&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;found credentials for image ref quay.io/redhat-appstudio-qe/test-images:pipeline-bundle-1778050928-bsvt -&gt; user: redhat-appstudio-qe+redhat_appstudio_quality&#34;&#xA;Image repository for component test-comp-jnrw in namespace build-e2e-fnei do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Created component for scenario sample-python-basic-oci: component: test-comp-jnrw, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-fsjtiy, pacBranchName: konflux-test-comp-jnrw&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;found credentials for image ref quay.io/redhat-appstudio-qe/test-images:pipeline-bundle-1778050951-rvng -&gt; user: redhat-appstudio-qe+redhat_appstudio_quality&#34;&#xA;Image repository for component test-comp-ewin in namespace build-e2e-fnei do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component test-comp-ewin in namespace build-e2e-fnei do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Created component for scenario sample-python-basic-oci: component: test-comp-ewin, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-wajvyn, pacBranchName: konflux-test-comp-ewin&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;found credentials for image ref quay.io/redhat-appstudio-qe/test-images:pipeline-bundle-1778050983-fgan -&gt; user: redhat-appstudio-qe+redhat_appstudio_quality&#34;&#xA;Image repository for component test-comp-jwrp in namespace build-e2e-fnei do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component test-comp-jwrp in namespace build-e2e-fnei do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Created component for scenario sample-python-basic-oci: component: test-comp-jwrp, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-ajvtcw, pacBranchName: konflux-test-comp-jwrp&#xA;Image repository for component test-symlink-comp-zxqf in namespace build-e2e-fnei do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component test-symlink-comp-zxqf in namespace build-e2e-fnei do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Created component for scenario sample-python-basic-oci: component: test-symlink-comp-zxqf, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-ncdkld, pacBranchName: konflux-test-symlink-comp-zxqf&#xA;&lt; Exit [BeforeAll] HACBS pipelines - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:237 @ 05/06/26 07:04:06.586 (2m0.826s)&#xA;&gt; Enter [It] triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-zxqf - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:325 @ 05/06/26 07:04:06.586&#xA;PipelineRun has not been created yet for Component build-e2e-fnei/test-symlink-comp-zxqf&#xA;PipelineRun has not been created yet for Component build-e2e-fnei/test-symlink-comp-zxqf&#xA;&lt; Exit [It] triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-zxqf - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:325 @ 05/06/26 07:04:46.704 (40.117s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:04:46.704&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:04:46.704 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.158375358">
              <system-err>&gt; Enter [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:338 @ 05/06/26 07:04:46.705&#xA;&lt; Exit [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:338 @ 05/06/26 07:04:46.863 (158ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:04:46.863&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:04:46.863 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.12627492">
              <system-err>&gt; Enter [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:338 @ 05/06/26 07:04:46.863&#xA;&lt; Exit [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:338 @ 05/06/26 07:04:46.989 (126ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:04:46.99&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:04:46.99 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.113168704">
              <system-err>&gt; Enter [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:338 @ 05/06/26 07:04:46.99&#xA;&lt; Exit [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:338 @ 05/06/26 07:04:47.103 (113ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:04:47.103&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:04:47.103 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="676.303485904">
              <system-err>&gt; Enter [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:356 @ 05/06/26 07:04:47.104&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm found for Component build-e2e-fnei/test-comp-jnrw&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: PipelineRunStopping&#xA;PipelineRun test-comp-jnrw-on-pull-request-p8rhm reason: Failed&#xA;attempt 1/3: PipelineRun &#34;test-comp-jnrw-on-pull-request-p8rhm&#34; failed: &#xA; pod: test-comp-jnrw-on-pull-requ0304f96bd51fdf7341d70f6b0d87ba10-pod | init container: prepare&#xA;2026/05/06 07:06:31 Entrypoint initialization&#xA;&#xA; pod: test-comp-jnrw-on-pull-requ0304f96bd51fdf7341d70f6b0d87ba10-pod | init container: place-scripts&#xA;2026/05/06 07:06:32 Decoded script /tekton/scripts/script-0-g55b9&#xA;2026/05/06 07:06:32 Decoded script /tekton/scripts/script-1-s5g2q&#xA;2026/05/06 07:06:32 Decoded script /tekton/scripts/script-2-n8s2v&#xA;2026/05/06 07:06:32 Decoded script /tekton/scripts/script-3-ldn8x&#xA;2026/05/06 07:06:32 Decoded script /tekton/scripts/script-4-ql44t&#xA;2026/05/06 07:06:32 Decoded script /tekton/scripts/script-5-s5sr2&#xA;&#xA;pod: test-comp-jnrw-on-pull-requ0304f96bd51fdf7341d70f6b0d87ba10-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#xA;The media type of the OCI artifact is application/vnd.oci.image.manifest.v1+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: test-comp-jnrw-on-pull-requ0304f96bd51fdf7341d70f6b0d87ba10-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: test-comp-jnrw-on-pull-requ0304f96bd51fdf7341d70f6b0d87ba10-pod | container step-set-skip-for-bundles: &#xA;2026/05/06 07:07:33 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: test-comp-jnrw-on-pull-requ0304f96bd51fdf7341d70f6b0d87ba10-pod | container step-app-check: &#xA;time=&#34;2026-05-06T07:07:33Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.17.2 &lt;commit: eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&gt;&#34;&#xA;time=&#34;2026-05-06T07:07:33Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07 for platform amd64&#34;&#xA;time=&#34;2026-05-06T07:07:33Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;&#xA;time=&#34;2026-05-06T07:07:38Z&#34; level=error msg=&#34;could not get rpm list, continuing without it&#34; error=&#34;could not find rpm db/packages: stat /tmp/preflight-2869470859/fs/usr/lib/sysimage/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-2869470859/fs/var/lib/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-2869470859/fs/var/lib/rpm/Packages: no such file or directory&#34;&#xA;time=&#34;2026-05-06T07:07:38Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-2869470859/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-05-06T07:07:38Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-05-06T07:07:38Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-05-06T07:07:38Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-05-06T07:07:38Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages err=&#34;unable to get a list of all packages in the image: could not get rpm list: could not find rpm db/packages: stat /tmp/preflight-2869470859/fs/usr/lib/sysimage/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-2869470859/fs/var/lib/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-2869470859/fs/var/lib/rpm/Packages: no such file or directory&#34; result=ERROR&#xA;time=&#34;2026-05-06T07:07:38Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=FAILED&#xA;time=&#34;2026-05-06T07:07:38Z&#34; level=info msg=&#34;detected empty USER. Presumed to be running as root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-06T07:07:38Z&#34; level=info msg=&#34;USER value must be provided and be a non-root value for this check to pass&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-06T07:07:38Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=FAILED&#xA;time=&#34;2026-05-06T07:07:42Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-05-06T07:07:42Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=FAILED&#xA;time=&#34;2026-05-06T07:07:42Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07 will be paired with digest sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.17.2&#34;,&#xA;        &#34;commit&#34;: &#34;eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 3819,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;,&#xA;                &#34;help&#34;: &#34;Check HasRequiredLabel encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Add the following labels to your Dockerfile or Containerfile: name, vendor, version, release, summary, description, maintainer.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;,&#xA;                &#34;help&#34;: &#34;Check RunAsNonRoot encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Indicate a specific USER in the dockerfile or containerfile&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 146,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;,&#xA;                &#34;help&#34;: &#34;Check BasedOnUbi encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Change the FROM directive in your Dockerfile or Containerfile, for the latest list of images and details refer to: https://catalog.redhat.com/software/base-images&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;,&#xA;                &#34;help&#34;: &#34;Check HasNoProhibitedPackages encountered an error. Please review the preflight.log file for more information.&#34;&#xA;            }&#xA;        ]&#xA;    }&#xA;}&#xA;time=&#34;2026-05-06T07:07:42Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;&#xA;pod: test-comp-jnrw-on-pull-requ0304f96bd51fdf7341d70f6b0d87ba10-pod | container step-app-set-outcome: &#xA;{&#34;result&#34;:&#34;ERROR&#34;,&#34;timestamp&#34;:&#34;1778051263&#34;,&#34;note&#34;:&#34;Task preflight is a ERROR: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:3,&#34;failures&#34;:4,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#xA;&#xA;pod: test-comp-jnrw-on-pull-requ0304f96bd51fdf7341d70f6b0d87ba10-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;ERROR&#34;,&#34;timestamp&#34;:&#34;1778051263&#34;,&#34;note&#34;:&#34;Task preflight is a ERROR: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:3,&#34;failures&#34;:4,&#34;warnings&#34;:0}&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-apply-tags-pod | init container: prepare&#xA;2026/05/06 07:06:31 Entrypoint initialization&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-apply-tags-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-05-06T07:06:34Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;&#xA;time=&#34;2026-05-06T07:06:34Z&#34; level=info msg=&#34;[param] digest: sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#34;&#xA;time=&#34;2026-05-06T07:06:34Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-05-06T07:06:35Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-build-container-pod | init container: prepare&#xA;2026/05/06 07:04:20 Entrypoint initialization&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-build-container-pod | init container: place-scripts&#xA;2026/05/06 07:04:20 Decoded script /tekton/scripts/script-0-nb945&#xA;2026/05/06 07:04:20 Decoded script /tekton/scripts/script-1-c2sxz&#xA;2026/05/06 07:04:20 Decoded script /tekton/scripts/script-2-jz5cm&#xA;2026/05/06 07:04:20 Decoded script /tekton/scripts/script-3-jxf8t&#xA;2026/05/06 07:04:20 Decoded script /tekton/scripts/script-4-6tw49&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-build-container-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-build-container-pod | container step-build: &#xA;[2026-05-06T07:04:57,191490062+00:00] Validate context path&#xA;[2026-05-06T07:04:57,194964973+00:00] Update CA trust&#xA;[2026-05-06T07:04:57,196103107+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-06T07:04:59,497285176+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-06T07:04:59,504380419+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-06T07:04:59,517604978+00:00] Setup prefetched&#xA;Trying to pull quay.io/devfile/python:slim...&#xA;Getting image source signatures&#xA;Copying blob sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#xA;Copying blob sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#xA;Copying blob sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#xA;Copying blob sha256:30fb943195a7f7cee90a9c67461c338d1d76a7004d2f94792b774ef71d875a02&#xA;Copying blob sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#xA;Copying config sha256:04f51101c1b979fb8a45a5332bfa8ed2c60f613ea396c3edd40f3d91702b24ef&#xA;Writing manifest to image destination&#xA;[2026-05-06T07:05:34,336534847+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;6h&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-06T07:04:59Z&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-06T07:04:59Z&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;&#xA;}&#xA;[2026-05-06T07:05:34,389065414+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-06T07:05:34,392885202+00:00] Add secrets&#xA;[2026-05-06T07:05:34,402395706+00:00] Run buildah build&#xA;[2026-05-06T07:05:34,403650728+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=2d475b7ced7f2f9adb74a83b290655cff6ef2c07 --label org.opencontainers.image.revision=2d475b7ced7f2f9adb74a83b290655cff6ef2c07 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --label quay.expires-after=6h --label build-date=2026-05-06T07:04:59Z --label org.opencontainers.image.created=2026-05-06T07:04:59Z --annotation org.opencontainers.image.revision=2d475b7ced7f2f9adb74a83b290655cff6ef2c07 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --annotation org.opencontainers.image.created=2026-05-06T07:04:59Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.8Bdwbz -t quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07 . &#xA;STEP 1/11: FROM quay.io/devfile/python:slim&#xA;STEP 2/11: EXPOSE 8081/tcp&#xA;STEP 3/11: ENV FLASK_PORT=8081&#xA;STEP 4/11: WORKDIR /projects&#xA;STEP 5/11: COPY requirements.txt .&#xA;STEP 6/11: RUN pip install -r requirements.txt&#xA;Collecting Flask==2.1.0&#xA;  Downloading Flask-2.1.0-py3-none-any.whl (95 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 95.2/95.2 kB 28.1 MB/s eta 0:00:00&#xA;Collecting Werkzeug&gt;=2.0&#xA;  Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 226.5/226.5 kB 106.3 MB/s eta 0:00:00&#xA;Collecting Jinja2&gt;=3.0&#xA;  Downloading jinja2-3.1.6-py3-none-any.whl (134 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 134.9/134.9 kB 99.2 MB/s eta 0:00:00&#xA;Collecting itsdangerous&gt;=2.0&#xA;  Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB)&#xA;Collecting click&gt;=8.0&#xA;  Downloading click-8.3.3-py3-none-any.whl (110 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 110.5/110.5 kB 116.2 MB/s eta 0:00:00&#xA;Collecting MarkupSafe&gt;=2.0&#xA;  Downloading markupsafe-3.0.3-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (22 kB)&#xA;Installing collected packages: MarkupSafe, itsdangerous, click, Werkzeug, Jinja2, Flask&#xA;Successfully installed Flask-2.1.0 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 click-8.3.3 itsdangerous-2.2.0&#xA;WARNING: Running pip as the &#39;root&#39; user can result in broken permissions and conflicting behaviour with the system package manager. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv&#xA;&#xA;[notice] A new release of pip available: 22.3.1 -&gt; 26.1.1&#xA;[notice] To update, run: pip install --upgrade pip&#xA;STEP 7/11: COPY . .&#xA;STEP 8/11: CMD [ &#34;python&#34;, &#34;./app.py&#34; ]&#xA;STEP 9/11: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 10/11: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 11/11: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34; &#34;org.opencontainers.image.revision&#34;=&#34;2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34; &#34;quay.expires-after&#34;=&#34;6h&#34; &#34;build-date&#34;=&#34;2026-05-06T07:04:59Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-06T07:04:59Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#xA;--&gt; dd067b337d14&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#xA;dd067b337d14cc857a30c535b1d55d5a26d54cdf65861d83b420b1e0cfdfddf0&#xA;[2026-05-06T07:05:38,784273186+00:00] Unsetting proxy&#xA;[2026-05-06T07:05:38,785696820+00:00] Add metadata&#xA;Recording base image digests used&#xA;quay.io/devfile/python:slim quay.io/devfile/python:slim@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;Getting image source signatures&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:497e95f140dbf7042a80fdcabdb7473099fef4b897be7c0eee85c5d820d737dc&#xA;Copying config sha256:dd067b337d14cc857a30c535b1d55d5a26d54cdf65861d83b420b1e0cfdfddf0&#xA;Writing manifest to image destination&#xA;[2026-05-06T07:05:39,447545985+00:00] End build&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-build-container-pod | container step-push: &#xA;[2026-05-06T07:05:40,375033474+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-06T07:05:42,883416487+00:00] Convert image&#xA;[2026-05-06T07:05:42,884466874+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:test-comp-jnrw-on-pull-request-p8rhm-build-container&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07 docker://quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:test-comp-jnrw-on-pull-request-p8rhm-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:497e95f140dbf7042a80fdcabdb7473099fef4b897be7c0eee85c5d820d737dc&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying config sha256:dd067b337d14cc857a30c535b1d55d5a26d54cdf65861d83b420b1e0cfdfddf0&#xA;Writing manifest to image destination&#xA;[2026-05-06T07:05:52,762264020+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true --digestfile /workspace/source/image-digest quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07 docker://quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#xA;Getting image source signatures&#xA;Copying blob sha256:497e95f140dbf7042a80fdcabdb7473099fef4b897be7c0eee85c5d820d737dc&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying config sha256:dd067b337d14cc857a30c535b1d55d5a26d54cdf65861d83b420b1e0cfdfddf0&#xA;Writing manifest to image destination&#xA;sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-05-06T07:05:53,688135643+00:00] End push&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-build-container-pod | container step-sbom-syft-generate: &#xA;[2026-05-06T07:05:54,035373973+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-05-06T07:05:58,850764800+00:00] End sbom-syft-generate&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-build-container-pod | container step-prepare-sboms: &#xA;[2026-05-06T07:05:59,237670071+00:00] Prepare SBOM&#xA;[2026-05-06T07:05:59,241458219+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-05-06 07:06:00,414 [INFO] mobster.log: Logging level set to 20&#xA;2026-05-06 07:06:00,504 [INFO] mobster.oci: Fetching manifest for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;2026-05-06 07:06:01,122 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:01,312 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:01,735 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:01,931 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:02,410 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:02,603 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:03,098 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:03,495 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:03,495 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-05-06 07:06:03,495 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-05-06 07:06:03,496 [INFO] mobster.log: Contextual workflow completed in 3.01s&#xA;2026-05-06 07:06:03,535 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-05-06T07:06:03,599431622+00:00] End prepare-sboms&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-build-container-pod | container step-upload-sbom: &#xA;[2026-05-06T07:06:04,331469830+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745] to [quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:sha256-37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw@sha256:1b6aee55a4d2a6553187162d309c5c7fa3a84329d0e9f9d5060415fc88109db2&#xA;[2026-05-06T07:06:07,791569880+00:00] End upload-sbom&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-build-image-index-pod | init container: prepare&#xA;2026/05/06 07:06:09 Entrypoint initialization&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-build-image-index-pod | init container: place-scripts&#xA;2026/05/06 07:06:10 Decoded script /tekton/scripts/script-0-ckmhv&#xA;2026/05/06 07:06:10 Decoded script /tekton/scripts/script-1-sg9d6&#xA;2026/05/06 07:06:10 Decoded script /tekton/scripts/script-2-zx56z&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-build-image-index-pod | container step-build: &#xA;[2026-05-06T07:06:24,141306597+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Running konflux-build-cli&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745]&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] buildah-format: oci&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] additional-tags: [test-comp-jnrw-on-pull-request-p8rhm-build-image-index]&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;buildah [stdout] 2b2bd43ae2bb4c0867fb1e36c38862193ddd7bad08819b73973b6bcefbcda758&#34; logger=CliExecutor&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;{&#34;image_digest&#34;:&#34;sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#34;}&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-build-image-index-pod | container step-create-sbom: &#xA;The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-build-image-index-pod | container step-upload-sbom: &#xA;[2026-05-06T07:06:26,715699718+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-clair-scan-pod | init container: prepare&#xA;2026/05/06 07:06:31 Entrypoint initialization&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-clair-scan-pod | init container: place-scripts&#xA;2026/05/06 07:06:31 Decoded script /tekton/scripts/script-0-zghrv&#xA;2026/05/06 07:06:31 Decoded script /tekton/scripts/script-1-6fz77&#xA;2026/05/06 07:06:31 Decoded script /tekton/scripts/script-2-h6q5n&#xA;2026/05/06 07:06:31 Decoded script /tekton/scripts/script-3-tqs2f&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-clair-scan-pod | container step-get-image-manifests: &#xA;Inspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745.&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-clair-scan-pod | container step-get-vulnerabilities: &#xA;Running clair-action on amd64 image manifest...&#xA;�[90m2026-05-06T07:10:23Z�[0m �[32mINF�[0m �[1mmatchers created�[0m �[36mcomponent=�[0mlibvuln/New �[36mmatchers=�[0m[{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/alpine&#34;,&#34;name&#34;:&#34;alpine-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/java&#34;,&#34;name&#34;:&#34;java-maven&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/photon&#34;,&#34;name&#34;:&#34;photon&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu&#34;,&#34;name&#34;:&#34;ubuntu-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/aws&#34;,&#34;name&#34;:&#34;aws-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/gobin&#34;,&#34;name&#34;:&#34;gobin&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel&#34;,&#34;name&#34;:&#34;rhel&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/debian&#34;,&#34;name&#34;:&#34;debian-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/oracle&#34;,&#34;name&#34;:&#34;oracle&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc&#34;,&#34;name&#34;:&#34;rhel-container-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/python&#34;,&#34;name&#34;:&#34;python&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ruby&#34;,&#34;name&#34;:&#34;ruby-gem&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/suse&#34;,&#34;name&#34;:&#34;suse&#34;}]&#xA;�[90m2026-05-06T07:10:23Z�[0m �[32mINF�[0m �[1mlibvuln initialized�[0m �[36mcomponent=�[0mlibvuln/New&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mregistered configured scanners�[0m �[36mcomponent=�[0mlibindex/New&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mNewLayerScanner: constructing a new layer-scanner�[0m �[36mcomponent=�[0mindexer.NewLayerScanner&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mindex request start�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mstarting scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mmanifest to be scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 �[36mstate=�[0mCheckManifest&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mlayers fetch start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mlayers fetch success�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mlayers fetch done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mlayers scan start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 �[36mstate=�[0mScanLayers&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mlayers scan done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 �[36mstate=�[0mScanLayers&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mstarting index manifest�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 �[36mstate=�[0mIndexManifest&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mfinishing scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mmanifest successfully scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mindex request done�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#xA;{&#xA;  &#34;manifest_hash&#34;: &#34;sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#34;,&#xA;  &#34;packages&#34;: {&#xA;    &#34;+GDQTbek1zYvATiVR/wBCA==&#34;: {&#xA;      &#34;id&#34;: &#34;+GDQTbek1zYvATiVR/wBCA==&#34;,&#xA;      &#34;name&#34;: &#34;gzip&#34;,&#xA;      &#34;version&#34;: &#34;1.10-4+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gzip&#34;,&#xA;        &#34;version&#34;: &#34;1.10-4+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+aaqENN9U+Kuxcb1tQ8Utg==&#34;: {&#xA;      &#34;id&#34;: &#34;+aaqENN9U+Kuxcb1tQ8Utg==&#34;,&#xA;      &#34;name&#34;: &#34;netbase&#34;,&#xA;      &#34;version&#34;: &#34;6.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;netbase&#34;,&#xA;        &#34;version&#34;: &#34;6.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;: {&#xA;      &#34;id&#34;: &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;,&#xA;      &#34;name&#34;: &#34;libcom-err2&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;05vApGRmP6ko1S0ji87IIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;05vApGRmP6ko1S0ji87IIQ==&#34;,&#xA;      &#34;name&#34;: &#34;libunistring2&#34;,&#xA;      &#34;version&#34;: &#34;0.9.10-4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libunistring&#34;,&#xA;        &#34;version&#34;: &#34;0.9.10-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;: {&#xA;      &#34;id&#34;: &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;,&#xA;      &#34;name&#34;: &#34;libzstd1&#34;,&#xA;      &#34;version&#34;: &#34;1.4.8+dfsg-2.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libzstd&#34;,&#xA;        &#34;version&#34;: &#34;1.4.8+dfsg-2.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1jyJPCL93kiEbfmNKeyz3g==&#34;: {&#xA;      &#34;id&#34;: &#34;1jyJPCL93kiEbfmNKeyz3g==&#34;,&#xA;      &#34;name&#34;: &#34;jinja2&#34;,&#xA;      &#34;version&#34;: &#34;3.1.6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.3.1.6.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2MObxiEVNllmUEzdVZM5qw==&#34;: {&#xA;      &#34;id&#34;: &#34;2MObxiEVNllmUEzdVZM5qw==&#34;,&#xA;      &#34;name&#34;: &#34;apt&#34;,&#xA;      &#34;version&#34;: &#34;2.2.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;apt&#34;,&#xA;        &#34;version&#34;: &#34;2.2.4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;: {&#xA;      &#34;id&#34;: &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;,&#xA;      &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;      &#34;version&#34;: &#34;1.8.7-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;1.8.7-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4672uZtn8TnHDEzWVyhfjw==&#34;: {&#xA;      &#34;id&#34;: &#34;4672uZtn8TnHDEzWVyhfjw==&#34;,&#xA;      &#34;name&#34;: &#34;base-files&#34;,&#xA;      &#34;version&#34;: &#34;11.1+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;base-files&#34;,&#xA;        &#34;version&#34;: &#34;11.1+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;: {&#xA;      &#34;id&#34;: &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5zxxTA220k9gPCegfDHkag==&#34;: {&#xA;      &#34;id&#34;: &#34;5zxxTA220k9gPCegfDHkag==&#34;,&#xA;      &#34;name&#34;: &#34;libgmp10&#34;,&#xA;      &#34;version&#34;: &#34;2:6.2.1+dfsg-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gmp&#34;,&#xA;        &#34;version&#34;: &#34;2:6.2.1+dfsg-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;,&#xA;      &#34;name&#34;: &#34;libexpat1&#34;,&#xA;      &#34;version&#34;: &#34;2.2.10-2+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;2.2.10-2+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;,&#xA;      &#34;name&#34;: &#34;libudev1&#34;,&#xA;      &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9snKXrH4dQy2IXHQ01Lg0A==&#34;: {&#xA;      &#34;id&#34;: &#34;9snKXrH4dQy2IXHQ01Lg0A==&#34;,&#xA;      &#34;name&#34;: &#34;libaudit1&#34;,&#xA;      &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;audit&#34;,&#xA;        &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Akbft1KN+9FKNhh1tM25eA==&#34;: {&#xA;      &#34;id&#34;: &#34;Akbft1KN+9FKNhh1tM25eA==&#34;,&#xA;      &#34;name&#34;: &#34;mount&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;: {&#xA;      &#34;id&#34;: &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;,&#xA;      &#34;name&#34;: &#34;libblkid1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CBzoMmlXBcyP54HOnauO0g==&#34;: {&#xA;      &#34;id&#34;: &#34;CBzoMmlXBcyP54HOnauO0g==&#34;,&#xA;      &#34;name&#34;: &#34;libpam-runtime&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CpILSbg3p6D7Gsp8sCW1Rg==&#34;: {&#xA;      &#34;id&#34;: &#34;CpILSbg3p6D7Gsp8sCW1Rg==&#34;,&#xA;      &#34;name&#34;: &#34;libsemanage1&#34;,&#xA;      &#34;version&#34;: &#34;3.1-1+b2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsemanage&#34;,&#xA;        &#34;version&#34;: &#34;3.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;,&#xA;      &#34;name&#34;: &#34;libc6&#34;,&#xA;      &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DY5Co0gkGtbgwDlkjfJLWA==&#34;: {&#xA;      &#34;id&#34;: &#34;DY5Co0gkGtbgwDlkjfJLWA==&#34;,&#xA;      &#34;name&#34;: &#34;markupsafe&#34;,&#xA;      &#34;version&#34;: &#34;3.0.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.3.0.3.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;: {&#xA;      &#34;id&#34;: &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;,&#xA;      &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EVGnnBfWyiVHhoIR4vEpgg==&#34;: {&#xA;      &#34;id&#34;: &#34;EVGnnBfWyiVHhoIR4vEpgg==&#34;,&#xA;      &#34;name&#34;: &#34;libbz2-1.0&#34;,&#xA;      &#34;version&#34;: &#34;1.0.8-4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2&#34;,&#xA;        &#34;version&#34;: &#34;1.0.8-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;: {&#xA;      &#34;id&#34;: &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;,&#xA;      &#34;name&#34;: &#34;libk5crypto3&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;: {&#xA;      &#34;id&#34;: &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;,&#xA;      &#34;name&#34;: &#34;login&#34;,&#xA;      &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FOAAB3KiNsLyi03hQsjRTA==&#34;: {&#xA;      &#34;id&#34;: &#34;FOAAB3KiNsLyi03hQsjRTA==&#34;,&#xA;      &#34;name&#34;: &#34;libcrypt1&#34;,&#xA;      &#34;version&#34;: &#34;1:4.4.18-4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;        &#34;version&#34;: &#34;1:4.4.18-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FrUy4mOCaHm5aGT53as3JQ==&#34;: {&#xA;      &#34;id&#34;: &#34;FrUy4mOCaHm5aGT53as3JQ==&#34;,&#xA;      &#34;name&#34;: &#34;diffutils&#34;,&#xA;      &#34;version&#34;: &#34;1:3.7-5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;diffutils&#34;,&#xA;        &#34;version&#34;: &#34;1:3.7-5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;,&#xA;      &#34;name&#34;: &#34;libssl1.1&#34;,&#xA;      &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GGaavnLgXX31qx9chfhdOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GGaavnLgXX31qx9chfhdOQ==&#34;,&#xA;      &#34;name&#34;: &#34;libaudit-common&#34;,&#xA;      &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;audit&#34;,&#xA;        &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;: {&#xA;      &#34;id&#34;: &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;,&#xA;      &#34;name&#34;: &#34;libpcre2-8-0&#34;,&#xA;      &#34;version&#34;: &#34;10.36-2+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.36-2+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HFwGHerHwgvY8vkjr3x1Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;HFwGHerHwgvY8vkjr3x1Pg==&#34;,&#xA;      &#34;name&#34;: &#34;itsdangerous&#34;,&#xA;      &#34;version&#34;: &#34;2.2.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.2.2.0.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;: {&#xA;      &#34;id&#34;: &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;,&#xA;      &#34;name&#34;: &#34;bsdutils&#34;,&#xA;      &#34;version&#34;: &#34;1:2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IiJKm8T4olfm6rhuKayFOw==&#34;: {&#xA;      &#34;id&#34;: &#34;IiJKm8T4olfm6rhuKayFOw==&#34;,&#xA;      &#34;name&#34;: &#34;lsb-base&#34;,&#xA;      &#34;version&#34;: &#34;11.1.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lsb&#34;,&#xA;        &#34;version&#34;: &#34;11.1.0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Jg2vDvx1JxyPDIrUzzR9NQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Jg2vDvx1JxyPDIrUzzR9NQ==&#34;,&#xA;      &#34;name&#34;: &#34;grep&#34;,&#xA;      &#34;version&#34;: &#34;3.6-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;grep&#34;,&#xA;        &#34;version&#34;: &#34;3.6-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;: {&#xA;      &#34;id&#34;: &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;,&#xA;      &#34;name&#34;: &#34;zlib1g&#34;,&#xA;      &#34;version&#34;: &#34;1:1.2.11.dfsg-2+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;1:1.2.11.dfsg-2+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LVHVhWoZgWwWvOspyUwb1w==&#34;: {&#xA;      &#34;id&#34;: &#34;LVHVhWoZgWwWvOspyUwb1w==&#34;,&#xA;      &#34;name&#34;: &#34;libreadline8&#34;,&#xA;      &#34;version&#34;: &#34;8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;readline&#34;,&#xA;        &#34;version&#34;: &#34;8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;,&#xA;      &#34;name&#34;: &#34;passwd&#34;,&#xA;      &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NA4G2YrIZ73fsX7d5r5rGw==&#34;: {&#xA;      &#34;id&#34;: &#34;NA4G2YrIZ73fsX7d5r5rGw==&#34;,&#xA;      &#34;name&#34;: &#34;debconf&#34;,&#xA;      &#34;version&#34;: &#34;1.5.77&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;debconf&#34;,&#xA;        &#34;version&#34;: &#34;1.5.77&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;: {&#xA;      &#34;id&#34;: &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;,&#xA;      &#34;name&#34;: &#34;libkrb5support0&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OgJFdUXRfF1Ls8u1+eOivw==&#34;: {&#xA;      &#34;id&#34;: &#34;OgJFdUXRfF1Ls8u1+eOivw==&#34;,&#xA;      &#34;name&#34;: &#34;libgpg-error0&#34;,&#xA;      &#34;version&#34;: &#34;1.38-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;        &#34;version&#34;: &#34;1.38-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PaaRbD/FkW3JARtSKQgRcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;PaaRbD/FkW3JARtSKQgRcQ==&#34;,&#xA;      &#34;name&#34;: &#34;libattr1&#34;,&#xA;      &#34;version&#34;: &#34;1:2.4.48-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;attr&#34;,&#xA;        &#34;version&#34;: &#34;1:2.4.48-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PgPY5hWnihXRN45byvzY0g==&#34;: {&#xA;      &#34;id&#34;: &#34;PgPY5hWnihXRN45byvzY0g==&#34;,&#xA;      &#34;name&#34;: &#34;libncursesw6&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;: {&#xA;      &#34;id&#34;: &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsepol1&#34;,&#xA;      &#34;version&#34;: &#34;3.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;3.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;: {&#xA;      &#34;id&#34;: &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;,&#xA;      &#34;name&#34;: &#34;setuptools&#34;,&#xA;      &#34;version&#34;: &#34;65.5.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.65.5.0.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RVoqRXLcdKU5LYfyLKdi3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;RVoqRXLcdKU5LYfyLKdi3Q==&#34;,&#xA;      &#34;name&#34;: &#34;click&#34;,&#xA;      &#34;version&#34;: &#34;8.3.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.8.3.3.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;: {&#xA;      &#34;id&#34;: &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;,&#xA;      &#34;name&#34;: &#34;dpkg&#34;,&#xA;      &#34;version&#34;: &#34;1.20.12&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dpkg&#34;,&#xA;        &#34;version&#34;: &#34;1.20.12&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RgdwX+VC70nXZ2E527PXaA==&#34;: {&#xA;      &#34;id&#34;: &#34;RgdwX+VC70nXZ2E527PXaA==&#34;,&#xA;      &#34;name&#34;: &#34;logsave&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SWnjL4fWu+WMpxhSCWLhZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SWnjL4fWu+WMpxhSCWLhZQ==&#34;,&#xA;      &#34;name&#34;: &#34;base-passwd&#34;,&#xA;      &#34;version&#34;: &#34;3.5.51&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;base-passwd&#34;,&#xA;        &#34;version&#34;: &#34;3.5.51&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;T5NuX1yinNyGoZNN2r9u4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;T5NuX1yinNyGoZNN2r9u4Q==&#34;,&#xA;      &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;      &#34;version&#34;: &#34;20210119&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;        &#34;version&#34;: &#34;20210119&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VVXsYlCxogg17Ti1iR03Mw==&#34;: {&#xA;      &#34;id&#34;: &#34;VVXsYlCxogg17Ti1iR03Mw==&#34;,&#xA;      &#34;name&#34;: &#34;libseccomp2&#34;,&#xA;      &#34;version&#34;: &#34;2.5.1-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libseccomp&#34;,&#xA;        &#34;version&#34;: &#34;2.5.1-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;: {&#xA;      &#34;id&#34;: &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;,&#xA;      &#34;name&#34;: &#34;gcc-9-base&#34;,&#xA;      &#34;version&#34;: &#34;9.3.0-22&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-9&#34;,&#xA;        &#34;version&#34;: &#34;9.3.0-22&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Wi4oa03apqVdR6okNeZiNA==&#34;: {&#xA;      &#34;id&#34;: &#34;Wi4oa03apqVdR6okNeZiNA==&#34;,&#xA;      &#34;name&#34;: &#34;libgnutls30&#34;,&#xA;      &#34;version&#34;: &#34;3.7.1-5+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;3.7.1-5+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZPlAztePXX+uFLVDX2lgNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZPlAztePXX+uFLVDX2lgNQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsemanage-common&#34;,&#xA;      &#34;version&#34;: &#34;3.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsemanage&#34;,&#xA;        &#34;version&#34;: &#34;3.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;,&#xA;      &#34;name&#34;: &#34;libmount1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;: {&#xA;      &#34;id&#34;: &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;,&#xA;      &#34;name&#34;: &#34;gcc-10-base&#34;,&#xA;      &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;: {&#xA;      &#34;id&#34;: &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;,&#xA;      &#34;name&#34;: &#34;coreutils&#34;,&#xA;      &#34;version&#34;: &#34;8.32-4+b1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;8.32-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bTSLWiizipO2axtmvXFuVg==&#34;: {&#xA;      &#34;id&#34;: &#34;bTSLWiizipO2axtmvXFuVg==&#34;,&#xA;      &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;      &#34;version&#34;: &#34;4.16.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;4.16.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;be3s5y0dx4bgsQboIoDduw==&#34;: {&#xA;      &#34;id&#34;: &#34;be3s5y0dx4bgsQboIoDduw==&#34;,&#xA;      &#34;name&#34;: &#34;libp11-kit0&#34;,&#xA;      &#34;version&#34;: &#34;0.23.22-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.23.22-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;,&#xA;      &#34;name&#34;: &#34;libext2fs2&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;: {&#xA;      &#34;id&#34;: &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;,&#xA;      &#34;name&#34;: &#34;libc-bin&#34;,&#xA;      &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dRfu6Up2F2Ze+gJ21oSeug==&#34;: {&#xA;      &#34;id&#34;: &#34;dRfu6Up2F2Ze+gJ21oSeug==&#34;,&#xA;      &#34;name&#34;: &#34;libgdbm6&#34;,&#xA;      &#34;version&#34;: &#34;1.19-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdbm&#34;,&#xA;        &#34;version&#34;: &#34;1.19-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;: {&#xA;      &#34;id&#34;: &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;,&#xA;      &#34;name&#34;: &#34;sysvinit-utils&#34;,&#xA;      &#34;version&#34;: &#34;2.96-7+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sysvinit&#34;,&#xA;        &#34;version&#34;: &#34;2.96-7+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dXglURzzdbLnOf14mab1Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;dXglURzzdbLnOf14mab1Hg==&#34;,&#xA;      &#34;name&#34;: &#34;tar&#34;,&#xA;      &#34;version&#34;: &#34;1.34+dfsg-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;1.34+dfsg-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dobmrwm7aq9puvFHwNgXxw==&#34;: {&#xA;      &#34;id&#34;: &#34;dobmrwm7aq9puvFHwNgXxw==&#34;,&#xA;      &#34;name&#34;: &#34;libstdc++6&#34;,&#xA;      &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;,&#xA;      &#34;name&#34;: &#34;libpam-modules-bin&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eF2QIdrTmJlWmjQTkhntow==&#34;: {&#xA;      &#34;id&#34;: &#34;eF2QIdrTmJlWmjQTkhntow==&#34;,&#xA;      &#34;name&#34;: &#34;wheel&#34;,&#xA;      &#34;version&#34;: &#34;0.38.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.0.38.4.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;: {&#xA;      &#34;id&#34;: &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;,&#xA;      &#34;name&#34;: &#34;libpam-modules&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;: {&#xA;      &#34;id&#34;: &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;,&#xA;      &#34;name&#34;: &#34;openssl&#34;,&#xA;      &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;: {&#xA;      &#34;id&#34;: &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;,&#xA;      &#34;name&#34;: &#34;bash&#34;,&#xA;      &#34;version&#34;: &#34;5.1-2+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;5.1-2+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fqwKjkzVNvsxh6040zt05g==&#34;: {&#xA;      &#34;id&#34;: &#34;fqwKjkzVNvsxh6040zt05g==&#34;,&#xA;      &#34;name&#34;: &#34;hostname&#34;,&#xA;      &#34;version&#34;: &#34;3.23&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;hostname&#34;,&#xA;        &#34;version&#34;: &#34;3.23&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fyM9Y65kt8cTfJv4LKF7bg==&#34;: {&#xA;      &#34;id&#34;: &#34;fyM9Y65kt8cTfJv4LKF7bg==&#34;,&#xA;      &#34;name&#34;: &#34;libcap-ng0&#34;,&#xA;      &#34;version&#34;: &#34;0.7.9-2.2+b1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;        &#34;version&#34;: &#34;0.7.9-2.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gP9HgvZWct50Kw/hM7BCKg==&#34;: {&#xA;      &#34;id&#34;: &#34;gP9HgvZWct50Kw/hM7BCKg==&#34;,&#xA;      &#34;name&#34;: &#34;libtirpc-common&#34;,&#xA;      &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtirpc&#34;,&#xA;        &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gv6x84VyNacZgvJrC59jbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;gv6x84VyNacZgvJrC59jbQ==&#34;,&#xA;      &#34;name&#34;: &#34;libffi7&#34;,&#xA;      &#34;version&#34;: &#34;3.3-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libffi&#34;,&#xA;        &#34;version&#34;: &#34;3.3-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hdNUjYIlrdEAtBWAggakAw==&#34;: {&#xA;      &#34;id&#34;: &#34;hdNUjYIlrdEAtBWAggakAw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-base&#34;,&#xA;      &#34;version&#34;: &#34;5.32.1-4+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-4+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;i4JkQ9JgSpZVyPFWOY5Bxw==&#34;: {&#xA;      &#34;id&#34;: &#34;i4JkQ9JgSpZVyPFWOY5Bxw==&#34;,&#xA;      &#34;name&#34;: &#34;liblz4-1&#34;,&#xA;      &#34;version&#34;: &#34;1.9.3-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lz4&#34;,&#xA;        &#34;version&#34;: &#34;1.9.3-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;: {&#xA;      &#34;id&#34;: &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;,&#xA;      &#34;name&#34;: &#34;libpcre3&#34;,&#xA;      &#34;version&#34;: &#34;2:8.39-13&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;2:8.39-13&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jErhz6PtXvAy/EPWJ425rA==&#34;: {&#xA;      &#34;id&#34;: &#34;jErhz6PtXvAy/EPWJ425rA==&#34;,&#xA;      &#34;name&#34;: &#34;libuuid1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;: {&#xA;      &#34;id&#34;: &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;,&#xA;      &#34;name&#34;: &#34;libsmartcols1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;: {&#xA;      &#34;id&#34;: &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;,&#xA;      &#34;name&#34;: &#34;flask&#34;,&#xA;      &#34;version&#34;: &#34;2.1.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.2.1.0.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-bin&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;,&#xA;      &#34;name&#34;: &#34;gpgv&#34;,&#xA;      &#34;version&#34;: &#34;2.2.27-2+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;2.2.27-2+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lCjIskl1HulEHShaXtgmwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lCjIskl1HulEHShaXtgmwQ==&#34;,&#xA;      &#34;name&#34;: &#34;libtinfo6&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lvz5sq0NbU6sy/F1tg9uiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lvz5sq0NbU6sy/F1tg9uiQ==&#34;,&#xA;      &#34;name&#34;: &#34;libkeyutils1&#34;,&#xA;      &#34;version&#34;: &#34;1.6.1-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;keyutils&#34;,&#xA;        &#34;version&#34;: &#34;1.6.1-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mlFDx1iAC2OWpmYHut2JHw==&#34;: {&#xA;      &#34;id&#34;: &#34;mlFDx1iAC2OWpmYHut2JHw==&#34;,&#xA;      &#34;name&#34;: &#34;libnettle8&#34;,&#xA;      &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nettle&#34;,&#xA;        &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nV87o429QBKIpM8DyOv4wg==&#34;: {&#xA;      &#34;id&#34;: &#34;nV87o429QBKIpM8DyOv4wg==&#34;,&#xA;      &#34;name&#34;: &#34;debian-archive-keyring&#34;,&#xA;      &#34;version&#34;: &#34;2021.1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;debian-archive-keyring&#34;,&#xA;        &#34;version&#34;: &#34;2021.1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ngOu/a+sfrdDkZtETF1mgg==&#34;: {&#xA;      &#34;id&#34;: &#34;ngOu/a+sfrdDkZtETF1mgg==&#34;,&#xA;      &#34;name&#34;: &#34;libselinux1&#34;,&#xA;      &#34;version&#34;: &#34;3.1-3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libselinux&#34;,&#xA;        &#34;version&#34;: &#34;3.1-3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nmd/xrCD27AKRWAzA5JZCA==&#34;: {&#xA;      &#34;id&#34;: &#34;nmd/xrCD27AKRWAzA5JZCA==&#34;,&#xA;      &#34;name&#34;: &#34;mawk&#34;,&#xA;      &#34;version&#34;: &#34;1.3.4.20200120-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;mawk&#34;,&#xA;        &#34;version&#34;: &#34;1.3.4.20200120-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;npX4tBmidkxp2QJN/c3Ktw==&#34;: {&#xA;      &#34;id&#34;: &#34;npX4tBmidkxp2QJN/c3Ktw==&#34;,&#xA;      &#34;name&#34;: &#34;libdebconfclient0&#34;,&#xA;      &#34;version&#34;: &#34;0.260&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cdebconf&#34;,&#xA;        &#34;version&#34;: &#34;0.260&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;,&#xA;      &#34;name&#34;: &#34;pip&#34;,&#xA;      &#34;version&#34;: &#34;22.3.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.22.3.1.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oH9T0w9ZyXDCGJ6Np6n1Iw==&#34;: {&#xA;      &#34;id&#34;: &#34;oH9T0w9ZyXDCGJ6Np6n1Iw==&#34;,&#xA;      &#34;name&#34;: &#34;init-system-helpers&#34;,&#xA;      &#34;version&#34;: &#34;1.60&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;init-system-helpers&#34;,&#xA;        &#34;version&#34;: &#34;1.60&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ozJ983JkaV259+RUbqutzw==&#34;: {&#xA;      &#34;id&#34;: &#34;ozJ983JkaV259+RUbqutzw==&#34;,&#xA;      &#34;name&#34;: &#34;dash&#34;,&#xA;      &#34;version&#34;: &#34;0.5.11+git20200708+dd9ef66-5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dash&#34;,&#xA;        &#34;version&#34;: &#34;0.5.11+git20200708+dd9ef66-5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;p+J9YgA22NC8PDODpTSxgw==&#34;: {&#xA;      &#34;id&#34;: &#34;p+J9YgA22NC8PDODpTSxgw==&#34;,&#xA;      &#34;name&#34;: &#34;libidn2-0&#34;,&#xA;      &#34;version&#34;: &#34;2.3.0-5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libidn2&#34;,&#xA;        &#34;version&#34;: &#34;2.3.0-5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pHAWej2qVWZtoCQ5DGoRcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pHAWej2qVWZtoCQ5DGoRcQ==&#34;,&#xA;      &#34;name&#34;: &#34;tzdata&#34;,&#xA;      &#34;version&#34;: &#34;2021a-1+deb11u8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tzdata&#34;,&#xA;        &#34;version&#34;: &#34;2021a-1+deb11u8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;: {&#xA;      &#34;id&#34;: &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;,&#xA;      &#34;name&#34;: &#34;libss2&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;q78XIEiJs5tQHLZtjoU3Fg==&#34;: {&#xA;      &#34;id&#34;: &#34;q78XIEiJs5tQHLZtjoU3Fg==&#34;,&#xA;      &#34;name&#34;: &#34;adduser&#34;,&#xA;      &#34;version&#34;: &#34;3.118&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;adduser&#34;,&#xA;        &#34;version&#34;: &#34;3.118&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;: {&#xA;      &#34;id&#34;: &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;,&#xA;      &#34;name&#34;: &#34;libsqlite3-0&#34;,&#xA;      &#34;version&#34;: &#34;3.34.1-3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;3.34.1-3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;: {&#xA;      &#34;id&#34;: &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;,&#xA;      &#34;name&#34;: &#34;libgssapi-krb5-2&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rJ4UB7yOdBPwgrk5WLwIQw==&#34;: {&#xA;      &#34;id&#34;: &#34;rJ4UB7yOdBPwgrk5WLwIQw==&#34;,&#xA;      &#34;name&#34;: &#34;libhogweed6&#34;,&#xA;      &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nettle&#34;,&#xA;        &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rUyBCRoo9C2erJrGUkvuDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rUyBCRoo9C2erJrGUkvuDQ==&#34;,&#xA;      &#34;name&#34;: &#34;libtirpc3&#34;,&#xA;      &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtirpc&#34;,&#xA;        &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;: {&#xA;      &#34;id&#34;: &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;,&#xA;      &#34;name&#34;: &#34;libsystemd0&#34;,&#xA;      &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sU05gaIadSYQd4+DxTnInw==&#34;: {&#xA;      &#34;id&#34;: &#34;sU05gaIadSYQd4+DxTnInw==&#34;,&#xA;      &#34;name&#34;: &#34;libacl1&#34;,&#xA;      &#34;version&#34;: &#34;2.2.53-10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;acl&#34;,&#xA;        &#34;version&#34;: &#34;2.2.53-10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sXwy5mmgqLM9WC30BdKwTA==&#34;: {&#xA;      &#34;id&#34;: &#34;sXwy5mmgqLM9WC30BdKwTA==&#34;,&#xA;      &#34;name&#34;: &#34;readline-common&#34;,&#xA;      &#34;version&#34;: &#34;8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;readline&#34;,&#xA;        &#34;version&#34;: &#34;8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;,&#xA;      &#34;name&#34;: &#34;liblzma5&#34;,&#xA;      &#34;version&#34;: &#34;5.2.5-2.1~deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz-utils&#34;,&#xA;        &#34;version&#34;: &#34;5.2.5-2.1~deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tYADP/V07/lE8Qno1R/hhg==&#34;: {&#xA;      &#34;id&#34;: &#34;tYADP/V07/lE8Qno1R/hhg==&#34;,&#xA;      &#34;name&#34;: &#34;libgcc-s1&#34;,&#xA;      &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uRB+svwXXxpR9DkvUVmAUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uRB+svwXXxpR9DkvUVmAUQ==&#34;,&#xA;      &#34;name&#34;: &#34;werkzeug&#34;,&#xA;      &#34;version&#34;: &#34;3.1.8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.3.1.8.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uXsuLx/plg6mDddGlE/9EA==&#34;: {&#xA;      &#34;id&#34;: &#34;uXsuLx/plg6mDddGlE/9EA==&#34;,&#xA;      &#34;name&#34;: &#34;libxxhash0&#34;,&#xA;      &#34;version&#34;: &#34;0.8.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xxhash&#34;,&#xA;        &#34;version&#34;: &#34;0.8.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;,&#xA;      &#34;name&#34;: &#34;libdb5.3&#34;,&#xA;      &#34;version&#34;: &#34;5.3.28+dfsg1-0.8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;db5.3&#34;,&#xA;        &#34;version&#34;: &#34;5.3.28+dfsg1-0.8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;: {&#xA;      &#34;id&#34;: &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;,&#xA;      &#34;name&#34;: &#34;util-linux&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xaMEpa2lawXi7R9jqzX8hA==&#34;: {&#xA;      &#34;id&#34;: &#34;xaMEpa2lawXi7R9jqzX8hA==&#34;,&#xA;      &#34;name&#34;: &#34;findutils&#34;,&#xA;      &#34;version&#34;: &#34;4.8.0-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;findutils&#34;,&#xA;        &#34;version&#34;: &#34;4.8.0-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;: {&#xA;      &#34;id&#34;: &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;,&#xA;      &#34;name&#34;: &#34;libkrb5-3&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;,&#xA;      &#34;name&#34;: &#34;sed&#34;,&#xA;      &#34;version&#34;: &#34;4.7-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sed&#34;,&#xA;        &#34;version&#34;: &#34;4.7-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zQ8wKwnOqSw7e/gsx76vLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zQ8wKwnOqSw7e/gsx76vLQ==&#34;,&#xA;      &#34;name&#34;: &#34;debianutils&#34;,&#xA;      &#34;version&#34;: &#34;4.11.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;debianutils&#34;,&#xA;        &#34;version&#34;: &#34;4.11.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zRv/Q67g6qJWTz0qqj4+BA==&#34;: {&#xA;      &#34;id&#34;: &#34;zRv/Q67g6qJWTz0qqj4+BA==&#34;,&#xA;      &#34;name&#34;: &#34;libnsl2&#34;,&#xA;      &#34;version&#34;: &#34;1.3.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libnsl&#34;,&#xA;        &#34;version&#34;: &#34;1.3.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;: {&#xA;      &#34;id&#34;: &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;,&#xA;      &#34;name&#34;: &#34;libpam0g&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;: {&#xA;      &#34;id&#34;: &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;,&#xA;      &#34;name&#34;: &#34;libapt-pkg6.0&#34;,&#xA;      &#34;version&#34;: &#34;2.2.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;apt&#34;,&#xA;        &#34;version&#34;: &#34;2.2.4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;distributions&#34;: {&#xA;    &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;: {&#xA;      &#34;id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;      &#34;did&#34;: &#34;debian&#34;,&#xA;      &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;      &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;      &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;      &#34;version_id&#34;: &#34;11&#34;,&#xA;      &#34;arch&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;,&#xA;      &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;    }&#xA;  },&#xA;  &#34;repository&#34;: {&#xA;    &#34;5abc1b59-eaec-4c05-9f86-bdf94a21d76d&#34;: {&#xA;      &#34;id&#34;: &#34;5abc1b59-eaec-4c05-9f86-bdf94a21d76d&#34;,&#xA;      &#34;name&#34;: &#34;pypi&#34;,&#xA;      &#34;uri&#34;: &#34;https://pypi.org/simple&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;environments&#34;: {&#xA;    &#34;+GDQTbek1zYvATiVR/wBCA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;+aaqENN9U+Kuxcb1tQ8Utg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;05vApGRmP6ko1S0ji87IIQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;1jyJPCL93kiEbfmNKeyz3g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0821ff9604999a9e690c5afd04f46e7347e1bcf55229d18c65fa85b6dbe065cc&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5abc1b59-eaec-4c05-9f86-bdf94a21d76d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;2MObxiEVNllmUEzdVZM5qw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;4672uZtn8TnHDEzWVyhfjw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;5zxxTA220k9gPCegfDHkag==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;9snKXrH4dQy2IXHQ01Lg0A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Akbft1KN+9FKNhh1tM25eA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;CBzoMmlXBcyP54HOnauO0g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;CpILSbg3p6D7Gsp8sCW1Rg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;DY5Co0gkGtbgwDlkjfJLWA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0821ff9604999a9e690c5afd04f46e7347e1bcf55229d18c65fa85b6dbe065cc&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5abc1b59-eaec-4c05-9f86-bdf94a21d76d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;EVGnnBfWyiVHhoIR4vEpgg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FOAAB3KiNsLyi03hQsjRTA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FrUy4mOCaHm5aGT53as3JQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;GGaavnLgXX31qx9chfhdOQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;HFwGHerHwgvY8vkjr3x1Pg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0821ff9604999a9e690c5afd04f46e7347e1bcf55229d18c65fa85b6dbe065cc&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5abc1b59-eaec-4c05-9f86-bdf94a21d76d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;IiJKm8T4olfm6rhuKayFOw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Jg2vDvx1JxyPDIrUzzR9NQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;LVHVhWoZgWwWvOspyUwb1w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;NA4G2YrIZ73fsX7d5r5rGw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;OgJFdUXRfF1Ls8u1+eOivw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;PaaRbD/FkW3JARtSKQgRcQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;PgPY5hWnihXRN45byvzY0g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5abc1b59-eaec-4c05-9f86-bdf94a21d76d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RVoqRXLcdKU5LYfyLKdi3Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0821ff9604999a9e690c5afd04f46e7347e1bcf55229d18c65fa85b6dbe065cc&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5abc1b59-eaec-4c05-9f86-bdf94a21d76d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;RgdwX+VC70nXZ2E527PXaA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;SWnjL4fWu+WMpxhSCWLhZQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;T5NuX1yinNyGoZNN2r9u4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;VVXsYlCxogg17Ti1iR03Mw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Wi4oa03apqVdR6okNeZiNA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ZPlAztePXX+uFLVDX2lgNQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bTSLWiizipO2axtmvXFuVg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;be3s5y0dx4bgsQboIoDduw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dRfu6Up2F2Ze+gJ21oSeug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dXglURzzdbLnOf14mab1Hg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dobmrwm7aq9puvFHwNgXxw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;eF2QIdrTmJlWmjQTkhntow==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5abc1b59-eaec-4c05-9f86-bdf94a21d76d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;fqwKjkzVNvsxh6040zt05g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;fyM9Y65kt8cTfJv4LKF7bg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;gP9HgvZWct50Kw/hM7BCKg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;gv6x84VyNacZgvJrC59jbQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;hdNUjYIlrdEAtBWAggakAw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;i4JkQ9JgSpZVyPFWOY5Bxw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;jErhz6PtXvAy/EPWJ425rA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0821ff9604999a9e690c5afd04f46e7347e1bcf55229d18c65fa85b6dbe065cc&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5abc1b59-eaec-4c05-9f86-bdf94a21d76d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;lCjIskl1HulEHShaXtgmwQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;lvz5sq0NbU6sy/F1tg9uiQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;mlFDx1iAC2OWpmYHut2JHw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nV87o429QBKIpM8DyOv4wg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ngOu/a+sfrdDkZtETF1mgg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nmd/xrCD27AKRWAzA5JZCA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;npX4tBmidkxp2QJN/c3Ktw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5abc1b59-eaec-4c05-9f86-bdf94a21d76d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;oH9T0w9ZyXDCGJ6Np6n1Iw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ozJ983JkaV259+RUbqutzw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;p+J9YgA22NC8PDODpTSxgw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;pHAWej2qVWZtoCQ5DGoRcQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;q78XIEiJs5tQHLZtjoU3Fg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rJ4UB7yOdBPwgrk5WLwIQw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rUyBCRoo9C2erJrGUkvuDQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;sU05gaIadSYQd4+DxTnInw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;sXwy5mmgqLM9WC30BdKwTA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;tYADP/V07/lE8Qno1R/hhg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;uRB+svwXXxpR9DkvUVmAUQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0821ff9604999a9e690c5afd04f46e7347e1bcf55229d18c65fa85b6dbe065cc&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5abc1b59-eaec-4c05-9f86-bdf94a21d76d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uXsuLx/plg6mDddGlE/9EA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;xaMEpa2lawXi7R9jqzX8hA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zQ8wKwnOqSw7e/gsx76vLQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zRv/Q67g6qJWTz0qqj4+BA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5a62eb4c-a3b0-4cff-8540-9ac19b1aaf77&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ]&#xA;  },&#xA;  &#34;vulnerabilities&#34;: {&#xA;    &#34;+N61/5529gFt7RkD8ooeKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+N61/5529gFt7RkD8ooeKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0465&#34;,&#xA;      &#34;description&#34;: &#34;Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks.  Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether.  Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0465&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;+aR35vFmeRYa8dLzBaCMmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+aR35vFmeRYa8dLzBaCMmQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41989&#34;,&#xA;      &#34;description&#34;: &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-41989&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;: {&#xA;      &#34;id&#34;: &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-13529&#34;,&#xA;      &#34;description&#34;: &#34;An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2020-13529&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/7UJLAHsMPxTtTxvuPgrzA==&#34;: {&#xA;      &#34;id&#34;: &#34;/7UJLAHsMPxTtTxvuPgrzA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45491&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-45491&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010022&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \&#34;this is being treated as a non-security bug and no real threat.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010022&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/cV7Fn8Va+poBGxbPjGjrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/cV7Fn8Va+poBGxbPjGjrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6238&#34;,&#xA;      &#34;description&#34;: &#34;The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to validate the RDATA content against the RDATA length in a DNS response when processing LOC, CERT, TKEY or TSIG records, which may allow an attacker to craft a DNS response, causing a target application to crash or read uninitialized memory.  These functions are for application debugging only and hence not in the path of code executed by the DNS resolver.  Further, they have been deprecated since version 2.34 and should not be used by any new applications.  Applications should consider porting away from these interfaces since they may be removed in future versions.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-6238&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;08pa4udz9bnA9IOsE208DA==&#34;: {&#xA;      &#34;id&#34;: &#34;08pa4udz9bnA9IOsE208DA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4039&#34;,&#xA;      &#34;description&#34;: &#34;**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains  that target AArch64 allows an attacker to exploit an existing buffer  overflow in dynamically-sized local variables in your application  without this being detected. This stack-protector failure only applies  to C99-style dynamically-sized local variables or those created using  alloca(). The stack-protector operates as intended for statically-sized  local variables.  The default behavior when the stack-protector  detects an overflow is to terminate your application, resulting in  controlled loss of availability. An attacker who can exploit a buffer  overflow without triggering the stack-protector might be able to change  program flow control to cause an uncontrolled loss of availability or to  go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4039&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;: {&#xA;      &#34;id&#34;: &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26458&#34;,&#xA;      &#34;description&#34;: &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-26458&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0q/btA3zBEGWWmFxU7cNig==&#34;: {&#xA;      &#34;id&#34;: &#34;0q/btA3zBEGWWmFxU7cNig==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40225&#34;,&#xA;      &#34;description&#34;: &#34;In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40225&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;1U/zi3CEao+52y8LKU0uvw==&#34;: {&#xA;      &#34;id&#34;: &#34;1U/zi3CEao+52y8LKU0uvw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36084&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36084&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;1VnWeA5AZgybyD8+PiXyiw==&#34;: {&#xA;      &#34;id&#34;: &#34;1VnWeA5AZgybyD8+PiXyiw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-70873&#34;,&#xA;      &#34;description&#34;: &#34;An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-70873&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1dwwvWkARnFe67yAAGVglQ==&#34;: {&#xA;      &#34;id&#34;: &#34;1dwwvWkARnFe67yAAGVglQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31438&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \&#34;a reply denying that any of the finding was a security vulnerability.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31438&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;20nlQwJu4gG0Ex/vty+hig==&#34;: {&#xA;      &#34;id&#34;: &#34;20nlQwJu4gG0Ex/vty+hig==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5419&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5419&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;27BVJE6xR0Z84LzifDnFYA==&#34;: {&#xA;      &#34;id&#34;: &#34;27BVJE6xR0Z84LzifDnFYA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48303&#34;,&#xA;      &#34;description&#34;: &#34;GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-48303&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.34+dfsg-1+deb11u1&#34;&#xA;    },&#xA;    &#34;2TcHkpRhAP0iTCSGAQKUOg==&#34;: {&#xA;      &#34;id&#34;: &#34;2TcHkpRhAP0iTCSGAQKUOg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3833&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in gnutls. This vulnerability occurs because gnutls performs case-sensitive comparisons of `nameConstraints` labels, specifically for `dNSName` (DNS) or `rfc822Name` (email) constraints within `excludedSubtrees` or `permittedSubtrees`. A remote attacker can exploit this by crafting a leaf certificate with casing differences in the Subject Alternative Name (SAN), leading to a policy bypass where a certificate that should be rejected is instead accepted. This could result in unauthorized access or information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-3833&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;: {&#xA;      &#34;id&#34;: &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write.  Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application.  The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the BIO implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-68160&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;: {&#xA;      &#34;id&#34;: &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file.  Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service.  The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash.  Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial of Service. For these reasons the issue was assessed as Low severity.  The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the TimeStamp Response implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.  OpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69420&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;3cBlPR7Tm4BIC/+wflldAg==&#34;: {&#xA;      &#34;id&#34;: &#34;3cBlPR7Tm4BIC/+wflldAg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12243&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-12243&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u7&#34;&#xA;    },&#xA;    &#34;5+uzHCKkmvMK8jl2uJkFqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5+uzHCKkmvMK8jl2uJkFqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32777&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.5 allows an infinite loop while parsing DTD content.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-32777&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;: {&#xA;      &#34;id&#34;: &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-37370&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-37370&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u5&#34;&#xA;    },&#xA;    &#34;5Cmp5KJXv+nVwwcs5/Kz7w==&#34;: {&#xA;      &#34;id&#34;: &#34;5Cmp5KJXv+nVwwcs5/Kz7w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-50602&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-50602&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u7&#34;&#xA;    },&#xA;    &#34;5OqCQlhu6kV+tAsgGEGuwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5OqCQlhu6kV+tAsgGEGuwQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;      &#34;description&#34;: &#34;zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-27171&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;: {&#xA;      &#34;id&#34;: &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-29111&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;6j23t/n6B77cQMxfCeLKzA==&#34;: {&#xA;      &#34;id&#34;: &#34;6j23t/n6B77cQMxfCeLKzA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12133&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-12133&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;4.16.0-2+deb11u2&#34;&#xA;    },&#xA;    &#34;6jg3v7lJ92IZCQpZydR2sA==&#34;: {&#xA;      &#34;id&#34;: &#34;6jg3v7lJ92IZCQpZydR2sA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28757&#34;,&#xA;      &#34;description&#34;: &#34;libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28757&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7DtFnnE8FjIpCQKunutpeg==&#34;: {&#xA;      &#34;id&#34;: &#34;7DtFnnE8FjIpCQKunutpeg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-16156&#34;,&#xA;      &#34;description&#34;: &#34;CPAN 2.28 allows Signature Verification Bypass.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2020-16156&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u4&#34;&#xA;    },&#xA;    &#34;7N1fkfhDIULrLId2wh2Pqw==&#34;: {&#xA;      &#34;id&#34;: &#34;7N1fkfhDIULrLId2wh2Pqw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42012&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42012&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8uv2vKf0QrdM+zJP4ufG+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;8uv2vKf0QrdM+zJP4ufG+Q==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-jp4c-xjxw-mgf9&#34;,&#xA;      &#34;description&#34;: &#34;pip Vulnerable to Inclusion of Functionality from Untrusted Control Sphere&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-27T15:30:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2026-6357 https://github.com/pypa/pip/pull/13923 https://github.com/pypa/pip/commit/b369bfc96cc524e00c267e1693290e6599c36bad https://github.com/pypa/pip https://ichard26.github.io/blog/2026/04/whats-new-in-pip-26.1/#security-fixes http://www.openwall.com/lists/oss-security/2026/04/27/7&#34;,&#xA;      &#34;severity&#34;: &#34;MODERATE&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=26.1&#34;&#xA;    },&#xA;    &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;The regcomp function in the GNU C library version from 2.4 to 2.41 is  subject to a double free if some previous allocation fails. It can be  accomplished either by a malloc failure or by using an interposed malloc  that injects random malloc failures. The double free can allow buffer  manipulation depending of how the regex is constructed. This issue  affects all architectures and ABIs supported by the GNU C library.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-8058&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9ThuL3zLKpmduvKpiDZ60w==&#34;: {&#xA;      &#34;id&#34;: &#34;9ThuL3zLKpmduvKpiDZ60w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24515&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-24515&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9sNDKQtqg7Z3gJr//JQlvg==&#34;: {&#xA;      &#34;id&#34;: &#34;9sNDKQtqg7Z3gJr//JQlvg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32990&#34;,&#xA;      &#34;description&#34;: &#34;A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-32990&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u8&#34;&#xA;    },&#xA;    &#34;9xk1p07t4ZV999E3HyfhVA==&#34;: {&#xA;      &#34;id&#34;: &#34;9xk1p07t4ZV999E3HyfhVA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5704&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allowing an attacker to introduce malicious files onto a system without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5704&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ANq7+l7+5U6IDt9eU02u5w==&#34;: {&#xA;      &#34;id&#34;: &#34;ANq7+l7+5U6IDt9eU02u5w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3219&#34;,&#xA;      &#34;description&#34;: &#34;GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-3219&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;: {&#xA;      &#34;id&#34;: &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3821&#34;,&#xA;      &#34;description&#34;: &#34;An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-3821&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u2&#34;&#xA;    },&#xA;    &#34;AvPdNumiwGnBie+lo1du3A==&#34;: {&#xA;      &#34;id&#34;: &#34;AvPdNumiwGnBie+lo1du3A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31486&#34;,&#xA;      &#34;description&#34;: &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31486&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;B78vSIll2muNDyY3F7urzw==&#34;: {&#xA;      &#34;id&#34;: &#34;B78vSIll2muNDyY3F7urzw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34743&#34;,&#xA;      &#34;description&#34;: &#34;XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-34743&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz-utils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8941&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a \&#34;complete\&#34; fix for CVE-2025-6020.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-8941&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BtqRPc7F47wJWygPNOxw1w==&#34;: {&#xA;      &#34;id&#34;: &#34;BtqRPc7F47wJWygPNOxw1w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32778&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-32778&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BxMnseA9J6OW2RWxSrlbyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;BxMnseA9J6OW2RWxSrlbyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36690&#34;,&#xA;      &#34;description&#34;: &#34;A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36690&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.34.1-3+deb11u1&#34;&#xA;    },&#xA;    &#34;CaLsKNvkpKlxKVBlUnje9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;CaLsKNvkpKlxKVBlUnje9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36087&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36087&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;: {&#xA;      &#34;id&#34;: &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4438&#34;,&#xA;      &#34;description&#34;: &#34;Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library&#39;s DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4438&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CtYegggqGbMfg16G/qfITQ==&#34;: {&#xA;      &#34;id&#34;: &#34;CtYegggqGbMfg16G/qfITQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2013-4235&#34;,&#xA;      &#34;description&#34;: &#34;shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2013-4235&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;: {&#xA;      &#34;id&#34;: &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;nscd: netgroup cache may terminate daemon on memory allocation failure  The Name Service Cache Daemon&#39;s (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients.  The flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33601&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;DRKFIYYNzLumACBV1CW/rw==&#34;: {&#xA;      &#34;id&#34;: &#34;DRKFIYYNzLumACBV1CW/rw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-35737&#34;,&#xA;      &#34;description&#34;: &#34;SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-35737&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DS2nhayHHtinLlFzZheSwg==&#34;: {&#xA;      &#34;id&#34;: &#34;DS2nhayHHtinLlFzZheSwg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66382&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-66382&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DTII3LzSaQL1baKsoSwsqg==&#34;: {&#xA;      &#34;id&#34;: &#34;DTII3LzSaQL1baKsoSwsqg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42010&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42010&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DfxJWBpJUY1aHu0ZUSilDg==&#34;: {&#xA;      &#34;id&#34;: &#34;DfxJWBpJUY1aHu0ZUSilDg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-6829&#34;,&#xA;      &#34;description&#34;: &#34;cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt&#39;s ElGamal implementation.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2018-6829&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;: {&#xA;      &#34;id&#34;: &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4437&#34;,&#xA;      &#34;description&#34;: &#34;Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library&#39;s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4437&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EYo03ICovWfCjw2cKpwx4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;EYo03ICovWfCjw2cKpwx4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2005-2541&#34;,&#xA;      &#34;description&#34;: &#34;Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2005-2541&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EajCJi704nU1+LqESNMC1w==&#34;: {&#xA;      &#34;id&#34;: &#34;EajCJi704nU1+LqESNMC1w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0727&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack  Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly.  A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue.  OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass().  We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant.  The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-0727&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;ErraMUPFwrdWYaj+aBxTMw==&#34;: {&#xA;      &#34;id&#34;: &#34;ErraMUPFwrdWYaj+aBxTMw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33845&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read. This issue is remotely exploitable and may cause information disclosure or denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-33845&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EvarhwbaAMrD3meGYFByGg==&#34;: {&#xA;      &#34;id&#34;: &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50495&#34;,&#xA;      &#34;description&#34;: &#34;NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-50495&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;F0zkrLGlbsix59P9mqoAOg==&#34;: {&#xA;      &#34;id&#34;: &#34;F0zkrLGlbsix59P9mqoAOg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-30258&#34;,&#xA;      &#34;description&#34;: &#34;In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a \&#34;verification DoS.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-30258&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G45dR+E8Wb+bEhCdwuqUDg==&#34;: {&#xA;      &#34;id&#34;: &#34;G45dR+E8Wb+bEhCdwuqUDg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-20838&#34;,&#xA;      &#34;description&#34;: &#34;libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-20838&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GPLYq884jQKVksfMc+b7OQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GPLYq884jQKVksfMc+b7OQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-1304&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-1304&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.46.2-2+deb11u1&#34;&#xA;    },&#xA;    &#34;GRlufCZFwHNK64OQNCFIcg==&#34;: {&#xA;      &#34;id&#34;: &#34;GRlufCZFwHNK64OQNCFIcg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2013-4392&#34;,&#xA;      &#34;description&#34;: &#34;systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2013-4392&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010024&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \&#34;this is being treated as a non-security bug and no real threat.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010024&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write.  Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code.  Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy.  The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-9230&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u4&#34;&#xA;    },&#xA;    &#34;HuTBrVHKx7uaMtQjiqifKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HuTBrVHKx7uaMtQjiqifKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0567&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-0567&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u5&#34;&#xA;    },&#xA;    &#34;IJPGr43VMeLym6tW3EWgdg==&#34;: {&#xA;      &#34;id&#34;: &#34;IJPGr43VMeLym6tW3EWgdg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8176&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-8176&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IvA5abshk33BAuuBar/pVQ==&#34;: {&#xA;      &#34;id&#34;: &#34;IvA5abshk33BAuuBar/pVQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45492&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-45492&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;IwuADin5bagOGQErETBgWw==&#34;: {&#xA;      &#34;id&#34;: &#34;IwuADin5bagOGQErETBgWw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4046&#34;,&#xA;      &#34;description&#34;: &#34;The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.    This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4046&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Jl0PQIP9L3ufSvQ2j71iww==&#34;: {&#xA;      &#34;id&#34;: &#34;Jl0PQIP9L3ufSvQ2j71iww==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-r9hx-vwmv-q579&#34;,&#xA;      &#34;description&#34;: &#34;pypa/setuptools vulnerable to Regular Expression Denial of Service (ReDoS)&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-23T00:30:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2022-40897 https://github.com/pypa/setuptools/issues/3659 https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be https://setuptools.pypa.io/en/latest https://security.netapp.com/advisory/ntap-20240621-0006 https://security.netapp.com/advisory/ntap-20230214-0001 https://pyup.io/vulnerabilities/CVE-2022-40897/52495 https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1 https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200 https://github.com/pypa/setuptools https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2022-43012.yaml&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=65.5.1&#34;&#xA;    },&#xA;    &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;: {&#xA;      &#34;id&#34;: &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4304&#34;,&#xA;      &#34;description&#34;: &#34;A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE.  For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4304&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;KZ3Jt7zkiM272dGLstI4XA==&#34;: {&#xA;      &#34;id&#34;: &#34;KZ3Jt7zkiM272dGLstI4XA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2013-0340&#34;,&#xA;      &#34;description&#34;: &#34;expat before version 2.4.0 does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue.  NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2013-0340&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KaoEuixR8E5nnpGZ1pG25w==&#34;: {&#xA;      &#34;id&#34;: &#34;KaoEuixR8E5nnpGZ1pG25w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0553&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-0553&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u5&#34;&#xA;    },&#xA;    &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;: {&#xA;      &#34;id&#34;: &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-10041&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-10041&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KwgIGMm765S+zvIBAwM9+g==&#34;: {&#xA;      &#34;id&#34;: &#34;KwgIGMm765S+zvIBAwM9+g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4899&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4899&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libzstd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LAgKryCll+DIcYhTR/xbzg==&#34;: {&#xA;      &#34;id&#34;: &#34;LAgKryCll+DIcYhTR/xbzg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42013&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42013&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;: {&#xA;      &#34;id&#34;: &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0628843-DBAD28&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MDmWztEMrTY+VyVp5c+Fvw==&#34;: {&#xA;      &#34;id&#34;: &#34;MDmWztEMrTY+VyVp5c+Fvw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0841856-B18BAF&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MXRm//dBCnWFem5zffvqmA==&#34;: {&#xA;      &#34;id&#34;: &#34;MXRm//dBCnWFem5zffvqmA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3715&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-3715&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MYYkxlB4Ank1zsdIh41apg==&#34;: {&#xA;      &#34;id&#34;: &#34;MYYkxlB4Ank1zsdIh41apg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-2961&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u9&#34;&#xA;    },&#xA;    &#34;MdrEi+/OrLlW3zDrheID2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;MdrEi+/OrLlW3zDrheID2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59375&#34;,&#xA;      &#34;description&#34;: &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-59375&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;: {&#xA;      &#34;id&#34;: &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data.  Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service.  The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash.  Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be using the CMS API instead. For these reasons the issue was assessed as Low severity.  The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-22796&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;: {&#xA;      &#34;id&#34;: &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28387&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: An uncommon configuration of clients performing DANE TLSA-based server authentication, when paired with uncommon server DANE TLSA records, may result in a use-after-free and/or double-free on the client side.  Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code.  However, the issue only affects clients that make use of TLSA records with both the PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate usage.  By far the most common deployment of DANE is in SMTP MTAs for which RFC7672 recommends that clients treat as &#39;unusable&#39; any TLSA records that have the PKIX certificate usages.  These SMTP (or other similar) clients are not vulnerable to this issue.  Conversely, any clients that support only the PKIX usages, and ignore the DANE-TA(2) usage are also not vulnerable.  The client would also need to be communicating with a server that publishes a TLSA RRset with both types of TLSA records.  No FIPS modules are affected by this issue, the problem code is outside the FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28387&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Mxv06g47iCk7QIqi7Xbojw==&#34;: {&#xA;      &#34;id&#34;: &#34;Mxv06g47iCk7QIqi7Xbojw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45853&#34;,&#xA;      &#34;description&#34;: &#34;MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-45853&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NYWveHKKsIYIKl+vE8UEhw==&#34;: {&#xA;      &#34;id&#34;: &#34;NYWveHKKsIYIKl+vE8UEhw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0517018-A83CE6&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sysvinit&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;: {&#xA;      &#34;id&#34;: &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22365&#34;,&#xA;      &#34;description&#34;: &#34;linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-22365&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.4.0-9+deb11u2&#34;&#xA;    },&#xA;    &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;: {&#xA;      &#34;id&#34;: &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26461&#34;,&#xA;      &#34;description&#34;: &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-26461&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3576&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-3576&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u7&#34;&#xA;    },&#xA;    &#34;OTqcMsspao5I6JZMETZ06w==&#34;: {&#xA;      &#34;id&#34;: &#34;OTqcMsspao5I6JZMETZ06w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;      &#34;description&#34;: &#34;Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library&#39;s DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-0915&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;P4mYk7npVU6t91mlbAb8QA==&#34;: {&#xA;      &#34;id&#34;: &#34;P4mYk7npVU6t91mlbAb8QA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2511&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions  Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service  This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation.  This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients.  The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-2511&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;PFkN8K2aK2XnSQjmAIry9A==&#34;: {&#xA;      &#34;id&#34;: &#34;PFkN8K2aK2XnSQjmAIry9A==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-58qw-9mgm-455v&#34;,&#xA;      &#34;description&#34;: &#34;pip has an interpretation conflict due to handling both concatenated tar and ZIP files as ZIP files&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-20T18:31:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2026-3219 https://github.com/pypa/pip/pull/13870 https://github.com/pypa/pip https://mail.python.org/archives/list/security-announce@python.org/thread/QAJ5JIVWWCAJ4EZL2FP5MOOW35JS7LRJ http://www.openwall.com/lists/oss-security/2026/04/20/8&#34;,&#xA;      &#34;severity&#34;: &#34;MODERATE&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;lastAffected=26.0.1&#34;&#xA;    },&#xA;    &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;: {&#xA;      &#34;id&#34;: &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28085&#34;,&#xA;      &#34;description&#34;: &#34;wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users&#39; terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28085&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.36.1-8+deb11u2&#34;&#xA;    },&#xA;    &#34;PUY4fn57nsAU2qBLtgRtdw==&#34;: {&#xA;      &#34;id&#34;: &#34;PUY4fn57nsAU2qBLtgRtdw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-6vgw-5pg2-w6jp&#34;,&#xA;      &#34;description&#34;: &#34;pip Path Traversal vulnerability&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-02T15:30:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2026-1703 https://github.com/pypa/pip/pull/13777 https://github.com/pypa/pip/commit/8e227a9be4faa9594e05d02ca05a413a2a4e7735 https://github.com/pypa/pip https://mail.python.org/archives/list/security-announce@python.org/thread/WIEA34D4TABF2UNQJAOMXKCICSPBE2DJ&#34;,&#xA;      &#34;severity&#34;: &#34;LOW&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=26.0&#34;&#xA;    },&#xA;    &#34;Pj9V3uC2c9o+P6lTpzzGeA==&#34;: {&#xA;      &#34;id&#34;: &#34;Pj9V3uC2c9o+P6lTpzzGeA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2025-49&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-17T16:15:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html https://github.com/pypa/setuptools/issues/4946 https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=78.1.1&#34;&#xA;    },&#xA;    &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;: {&#xA;      &#34;id&#34;: &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: When using the low-level OCB API directly with AES-NI or\u003cbr\u003eother hardware-accelerated code paths, inputs whose length is not a multiple\u003cbr\u003eof 16 bytes can leave the final partial block unencrypted and unauthenticated.\u003cbr\u003e\u003cbr\u003eImpact summary: The trailing 1-15 bytes of a message may be exposed in\u003cbr\u003ecleartext on encryption and are not covered by the authentication tag,\u003cbr\u003eallowing an attacker to read or tamper with those bytes without detection.\u003cbr\u003e\u003cbr\u003eThe low-level OCB encrypt and decrypt routines in the hardware-accelerated\u003cbr\u003estream path process full 16-byte blocks but do not advance the input/output\u003cbr\u003epointers. The subsequent tail-handling code then operates on the original\u003cbr\u003ebase pointers, effectively reprocessing the beginning of the buffer while\u003cbr\u003eleaving the actual trailing bytes unprocessed. The authentication checksum\u003cbr\u003ealso excludes the true tail bytes.\u003cbr\u003e\u003cbr\u003eHowever, typical OpenSSL consumers using EVP are not affected because the\u003cbr\u003ehigher-level EVP and provider OCB implementations split inputs so that full\u003cbr\u003eblocks and trailing partial blocks are processed in separate calls, avoiding\u003cbr\u003ethe problematic code path. Additionally, TLS does not use OCB ciphersuites.\u003cbr\u003eThe vulnerability only affects applications that call the low-level\u003cbr\u003eCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with\u003cbr\u003enon-block-aligned lengths in a single call on hardware-accelerated builds.\u003cbr\u003eFor these reasons the issue was assessed as Low severity.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected\u003cbr\u003eby this issue, as OCB mode is not a FIPS-approved algorithm.\u003cbr\u003e\u003cbr\u003eOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\u003cbr\u003e\u003cbr\u003eOpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69418&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;QGq5D5QwQKPerzYOBVoSsg==&#34;: {&#xA;      &#34;id&#34;: &#34;QGq5D5QwQKPerzYOBVoSsg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-cx63-2mw6-8hw5&#34;,&#xA;      &#34;description&#34;: &#34;setuptools vulnerable to Command Injection via package URL&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-15T03:30:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2024-6345 https://github.com/pypa/setuptools/pull/4332 https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0 https://github.com/pypa/setuptools https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5 https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=70.0.0&#34;&#xA;    },&#xA;    &#34;Qd2XnJZ3qaQ3AbyDXUaR2A==&#34;: {&#xA;      &#34;id&#34;: &#34;Qd2XnJZ3qaQ3AbyDXUaR2A==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2022-43012&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-23T00:15:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200 https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1 https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be https://pyup.io/vulnerabilities/CVE-2022-40897/52495/&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=65.5.1&#34;&#xA;    },&#xA;    &#34;QopvyNp/5Ata9NdAUhFygw==&#34;: {&#xA;      &#34;id&#34;: &#34;QopvyNp/5Ata9NdAUhFygw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5278&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU Coreutils. The sort utility&#39;s begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-5278&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RsDeaOU1gcwrKfmGECEolg==&#34;: {&#xA;      &#34;id&#34;: &#34;RsDeaOU1gcwrKfmGECEolg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42015&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42015&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RxgProNqXCgPRgAzu8keFA==&#34;: {&#xA;      &#34;id&#34;: &#34;RxgProNqXCgPRgAzu8keFA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40355&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.22.3, there is a NULL pointer dereference if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, causing the process to terminate in parse_nego_message.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40355&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SNR1VT02i1HBHxqGRTeBAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SNR1VT02i1HBHxqGRTeBAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-9820&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u9&#34;&#xA;    },&#xA;    &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;: {&#xA;      &#34;id&#34;: &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010025&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor&#39;s position is \&#34;ASLR bypass itself is not a vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010025&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;: {&#xA;      &#34;id&#34;: &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-24528&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-24528&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u6&#34;&#xA;    },&#xA;    &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;: {&#xA;      &#34;id&#34;: &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4450&#34;,&#xA;      &#34;description&#34;: &#34;The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \&#34;name\&#34; (e.g. \&#34;CERTIFICATE\&#34;), any header data and the payload data. If the function succeeds then the \&#34;name_out\&#34;, \&#34;header\&#34; and \&#34;data\&#34; arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack.  The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected.  These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0.  The OpenSSL asn1parse command line application is also impacted by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4450&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;: {&#xA;      &#34;id&#34;: &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6141&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6141&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;U3JbUhrT2SqWNuYU5d13cQ==&#34;: {&#xA;      &#34;id&#34;: &#34;U3JbUhrT2SqWNuYU5d13cQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-33560&#34;,&#xA;      &#34;description&#34;: &#34;Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-33560&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;U5598afGvRaltva6Rjqnug==&#34;: {&#xA;      &#34;id&#34;: &#34;U5598afGvRaltva6Rjqnug==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4105&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4105&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;Ud6njM/DPIrfSPiFct82Lw==&#34;: {&#xA;      &#34;id&#34;: &#34;Ud6njM/DPIrfSPiFct82Lw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52426&#34;,&#xA;      &#34;description&#34;: &#34;libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-52426&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UdV1OleGh/0MAkug0ZAlcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UdV1OleGh/0MAkug0ZAlcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25210&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-25210&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ul/kdhde9MT/cThQqWyUBA==&#34;: {&#xA;      &#34;id&#34;: &#34;Ul/kdhde9MT/cThQqWyUBA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3832&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in gnutls. A remote attacker could exploit this vulnerability by presenting a specially crafted Online Certificate Status Protocol (OCSP) response during a TLS handshake. Due to a logic error in how gnutls processes multi-record OCSP responses, a client with OCSP verification enabled may incorrectly accept a revoked server certificate, potentially leading to a compromise of trust.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-3832&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VzolVkOS5HseGzVTLzDMfA==&#34;: {&#xA;      &#34;id&#34;: &#34;VzolVkOS5HseGzVTLzDMfA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39804&#34;,&#xA;      &#34;description&#34;: &#34;In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-39804&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.34+dfsg-1+deb11u1&#34;&#xA;    },&#xA;    &#34;WCGqond4znYKCRcm4xyPrg==&#34;: {&#xA;      &#34;id&#34;: &#34;WCGqond4znYKCRcm4xyPrg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2007-5686&#34;,&#xA;      &#34;description&#34;: &#34;initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts.  NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2007-5686&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31439&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \&#34;a reply denying that any of the finding was a security vulnerability.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31439&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;: {&#xA;      &#34;id&#34;: &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;nscd: Stack-based buffer overflow in netgroup cache  If the Name Service Cache Daemon&#39;s (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow.  This flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33599&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;WRwV7Adc7Zuy6O98PPaFDw==&#34;: {&#xA;      &#34;id&#34;: &#34;WRwV7Adc7Zuy6O98PPaFDw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40356&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.22.3, there is an integer underflow and resultant out-of-bounds read if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, possibly causing the process to terminate in parse_message.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40356&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WWnQMI7f7f75SgC9Dcl+QQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WWnQMI7f7f75SgC9Dcl+QQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0290435-0B57B5&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WcYPrwv9PSVoVoof5MRsxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WcYPrwv9PSVoVoof5MRsxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2023-228&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-25T18:17:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL/ https://github.com/pypa/pip/pull/12306&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=23.3&#34;&#xA;    },&#xA;    &#34;WxlxRC1KqAo8Mejv03fZGA==&#34;: {&#xA;      &#34;id&#34;: &#34;WxlxRC1KqAo8Mejv03fZGA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68972&#34;,&#xA;      &#34;description&#34;: &#34;In GnuPG through 2.4.8, if a signed message has \\f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an \&#34;invalid armor\&#34; message is printed during verification). This is related to use of \\f as a marker to denote truncation of a long plaintext line.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-68972&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XQ5gIRaXVhDd6S954jtG2g==&#34;: {&#xA;      &#34;id&#34;: &#34;XQ5gIRaXVhDd6S954jtG2g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5928&#34;,&#xA;      &#34;description&#34;: &#34;Calling the ungetwc function on a FILE stream with wide characters encoded in a character set that has overlaps between its single byte and multi-byte character encodings, in the GNU C Library version 2.43 or earlier, may result in an attempt to read bytes before an allocated buffer, potentially resulting in unintentional disclosure of neighboring data in the heap, or a program crash.  A bug in the wide character pushback implementation (_IO_wdefault_pbackfail in libio/wgenops.c) causes ungetwc() to operate on the regular character buffer (fp-\u003e_IO_read_ptr) instead of the actual wide-stream read pointer (fp-\u003e_wide_data-\u003e_IO_read_ptr). The program crash may happen in cases where fp-\u003e_IO_read_ptr is not initialized and hence points to NULL. The buffer under-read requires a special situation where the input character encoding is such that there are overlaps between single byte representations and multibyte representations in that encoding, resulting in spurious matches. The spurious match case is not possible in the standard Unicode character sets.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5928&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Xce4H7xsVfrtYV2aXED7xA==&#34;: {&#xA;      &#34;id&#34;: &#34;Xce4H7xsVfrtYV2aXED7xA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-18018&#34;,&#xA;      &#34;description&#34;: &#34;In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX \&#34;-R -L\&#34; options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-18018&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XtT5+z5+yMbpdsyfkLItzA==&#34;: {&#xA;      &#34;id&#34;: &#34;XtT5+z5+yMbpdsyfkLItzA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6395&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6395&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u8&#34;&#xA;    },&#xA;    &#34;Y++3+aMTeU3vX7BI4/zG6w==&#34;: {&#xA;      &#34;id&#34;: &#34;Y++3+aMTeU3vX7BI4/zG6w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-14831&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u9&#34;&#xA;    },&#xA;    &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;: {&#xA;      &#34;id&#34;: &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;      &#34;description&#34;: &#34;Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.  Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1\u003c\u003c62+ 1, 1\u003c\u003c63] and exactly 1\u003c\u003c63 for posix_memalign and aligned_alloc.  Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-0861&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YXTNVVKQsWY/LFuomB715g==&#34;: {&#xA;      &#34;id&#34;: &#34;YXTNVVKQsWY/LFuomB715g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13151&#34;,&#xA;      &#34;description&#34;: &#34;Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-13151&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZbWtFXr0WyByV4kCb3M6FA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZbWtFXr0WyByV4kCb3M6FA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5981&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-5981&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u4&#34;&#xA;    },&#xA;    &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010023&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \&#34;this is being treated as a non-security bug and no real threat.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010023&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZrZi02myDWWW0L5oPQj/cg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZrZi02myDWWW0L5oPQj/cg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-11164&#34;,&#xA;      &#34;description&#34;: &#34;In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-11164&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4813&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aWm6E1ULjtuw0ydmFnsI4A==&#34;: {&#xA;      &#34;id&#34;: &#34;aWm6E1ULjtuw0ydmFnsI4A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6297&#34;,&#xA;      &#34;description&#34;: &#34;It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6297&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dpkg&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;afNm575eldgXY3DOGUNdqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;afNm575eldgXY3DOGUNdqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28388&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: When a delta CRL that contains a Delta CRL Indicator extension is processed a NULL pointer dereference might happen if the required CRL Number extension is missing.  Impact summary: A NULL pointer dereference can trigger a crash which leads to a Denial of Service for an application.  When CRL processing and delta CRL processing is enabled during X.509 certificate verification, the delta CRL processing does not check whether the CRL Number extension is NULL before dereferencing it. When a malformed delta CRL file is being processed, this parameter can be NULL, causing a NULL pointer dereference.  Exploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in the verification context, the certificate being verified to contain a freshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and an attacker to provide a malformed CRL to an application that processes it.  The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure. For that reason the issue was assessed as Low severity according to our Security Policy.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28388&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;: {&#xA;      &#34;id&#34;: &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-9192&#34;,&#xA;      &#34;description&#34;: &#34;In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by &#39;(|)(\\\\1\\\\1)*&#39; in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-9192&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;: {&#xA;      &#34;id&#34;: &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3446&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Checking excessively long DH keys or parameters may be very slow.  Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.  The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (&#39;p&#39; parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length.  However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large.  An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack.  The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().  Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the &#39;-check&#39; option.  The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-3446&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1v-0~deb11u1&#34;&#xA;    },&#xA;    &#34;bBymk1eoEM+tVYB+/Crz+g==&#34;: {&#xA;      &#34;id&#34;: &#34;bBymk1eoEM+tVYB+/Crz+g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28835&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \&#34;certtool --verify-chain\&#34; command.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28835&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u6&#34;&#xA;    },&#xA;    &#34;bNvH54V1y9cXsGaCXVwFVw==&#34;: {&#xA;      &#34;id&#34;: &#34;bNvH54V1y9cXsGaCXVwFVw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-5rjg-fvgr-3xxf&#34;,&#xA;      &#34;description&#34;: &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T16:52:43Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf https://nvd.nist.gov/vuln/detail/CVE-2025-47273 https://github.com/pypa/setuptools/issues/4946 https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2025-49.yaml https://github.com/pypa/setuptools https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88 https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html&#34;,&#xA;      &#34;severity&#34;: &#34;HIGH&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=78.1.1&#34;&#xA;    },&#xA;    &#34;bZ2m6J3EIvmTdjYJprlOKA==&#34;: {&#xA;      &#34;id&#34;: &#34;bZ2m6J3EIvmTdjYJprlOKA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36085&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36085&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;: {&#xA;      &#34;id&#34;: &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28389&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen.  Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service.  When a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is processed, the optional parameters field of KeyEncryptionAlgorithmIdentifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing.  Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28389&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;brAAPyN4siIQT5bxa9xu4g==&#34;: {&#xA;      &#34;id&#34;: &#34;brAAPyN4siIQT5bxa9xu4g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-47038&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u3&#34;&#xA;    },&#xA;    &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;: {&#xA;      &#34;id&#34;: &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;      &#34;description&#34;: &#34;Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-15281&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;: {&#xA;      &#34;id&#34;: &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-5709&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \&#34;dbentry-\u003en_key_data\&#34; in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \&#34;u4\&#34; variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2018-5709&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cZD87tDO2q60EFy3BAZ33g==&#34;: {&#xA;      &#34;id&#34;: &#34;cZD87tDO2q60EFy3BAZ33g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0464&#34;,&#xA;      &#34;description&#34;: &#34;A security vulnerability has been identified in all supported versions  of OpenSSL related to the verification of X.509 certificate chains that include policy constraints.  Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.  Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0464&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;ce9B0jxjyNiCfG4VtZhnVw==&#34;: {&#xA;      &#34;id&#34;: &#34;ce9B0jxjyNiCfG4VtZhnVw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2011-4116&#34;,&#xA;      &#34;description&#34;: &#34;_is_safe in the File::Temp module for Perl does not properly handle symlinks.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2011-4116&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;: {&#xA;      &#34;id&#34;: &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29491&#34;,&#xA;      &#34;description&#34;: &#34;ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-29491&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;6.2+20201114-2+deb11u2&#34;&#xA;    },&#xA;    &#34;dDtfYPtAiWG7x5kc85ma8w==&#34;: {&#xA;      &#34;id&#34;: &#34;dDtfYPtAiWG7x5kc85ma8w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5435&#34;,&#xA;      &#34;description&#34;: &#34;The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to enforce the caller-supplied buffer length, and can result in an out-of-bounds write when printing TSIG records.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5435&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-36054&#34;,&#xA;      &#34;description&#34;: &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-36054&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u4&#34;&#xA;    },&#xA;    &#34;dUTZP+bcDNUqytJV02E1dQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dUTZP+bcDNUqytJV02E1dQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6965&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dZ/H1sYv9QSX9VO93tlGLw==&#34;: {&#xA;      &#34;id&#34;: &#34;dZ/H1sYv9QSX9VO93tlGLw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-4xh5-x5gv-qwph&#34;,&#xA;      &#34;description&#34;: &#34;pip&#39;s fallback tar extraction doesn&#39;t check symbolic links point to extraction directory&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-24T15:31:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2025-8869 https://github.com/pypa/pip/pull/13550 https://github.com/pypa/pip/commit/f2b92314da012b9fffa36b3f3e67748a37ef464a https://github.com/pypa/pip https://lists.debian.org/debian-lts-announce/2025/10/msg00028.html https://mail.python.org/archives/list/security-announce@python.org/thread/IF5A3GCJY3VH7BVHJKOWOJFKTW7VFQEN https://pip.pypa.io/en/stable/news/#v25-2&#34;,&#xA;      &#34;severity&#34;: &#34;MODERATE&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=25.3&#34;&#xA;    },&#xA;    &#34;djiF0yOmYUIiWIfmt75aDA==&#34;: {&#xA;      &#34;id&#34;: &#34;djiF0yOmYUIiWIfmt75aDA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42011&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42011&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eietxU2AL+GdeSQwh6n6XA==&#34;: {&#xA;      &#34;id&#34;: &#34;eietxU2AL+GdeSQwh6n6XA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0215&#34;,&#xA;      &#34;description&#34;: &#34;The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications.  The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash.    This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7.  Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream.  The OpenSSL cms and smime command line applications are similarly affected.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0215&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;epkSU4TSX3BVrueh1mbRzg==&#34;: {&#xA;      &#34;id&#34;: &#34;epkSU4TSX3BVrueh1mbRzg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-13176&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation.  Impact summary: A timing side-channel in ECDSA signature computations could allow recovering the private key by an attacker. However, measuring the timing would require either local access to the signing application or a very fast network connection with low latency.  There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This can happen with significant probability only for some of the supported elliptic curves. In particular the NIST P-521 curve is affected. To be able to measure this leak, the attacker process must either be located in the same physical computer or must have a very fast network connection with low latency. For that reason the severity of this vulnerability is Low.  The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-13176&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u3&#34;&#xA;    },&#xA;    &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;: {&#xA;      &#34;id&#34;: &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6020&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.4.0-9+deb11u2&#34;&#xA;    },&#xA;    &#34;fUdim7gaWpwZtynNz5GiKg==&#34;: {&#xA;      &#34;id&#34;: &#34;fUdim7gaWpwZtynNz5GiKg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0361&#34;,&#xA;      &#34;description&#34;: &#34;A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0361&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u3&#34;&#xA;    },&#xA;    &#34;fXJD4KsFmfzjgWJPYHqTrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;fXJD4KsFmfzjgWJPYHqTrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-8457&#34;,&#xA;      &#34;description&#34;: &#34;SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-8457&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;db5.3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fharKhY7OXyx+gXJAwiegw==&#34;: {&#xA;      &#34;id&#34;: &#34;fharKhY7OXyx+gXJAwiegw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-29088&#34;,&#xA;      &#34;description&#34;: &#34;In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_config (in the C-language API) can cause a denial of service (application crash). An sz*nBig multiplication is not cast to a 64-bit integer, and consequently some memory allocations may be incorrect.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-29088&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;: {&#xA;      &#34;id&#34;: &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3184&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-3184&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;g44foSnimIkShQZtpEhjbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;g44foSnimIkShQZtpEhjbQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2011-3389&#34;,&#xA;      &#34;description&#34;: &#34;The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \&#34;BEAST\&#34; attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2011-3389&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;: {&#xA;      &#34;id&#34;: &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer.  Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service.  The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer.  The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.  OpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69419&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;: {&#xA;      &#34;id&#34;: &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings  The Name Service Cache Daemon&#39;s (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33602&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;h+ZYYwp9nAKs/v08piJa2A==&#34;: {&#xA;      &#34;id&#34;: &#34;h+ZYYwp9nAKs/v08piJa2A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33846&#34;,&#xA;      &#34;description&#34;: &#34;A heap buffer overflow vulnerability exists in the DTLS handshake fragment reassembly logic of GnuTLS. The issue arises in merge_handshake_packet() where incoming handshake fragments are matched and merged based solely on handshake type, without validating that the message_length field remains consistent across all fragments of the same logical message. An attacker can exploit this by sending crafted DTLS fragments with conflicting message_length values, causing the implementation to allocate a buffer based on a smaller initial fragment and subsequently write beyond its bounds using larger, inconsistent fragments. Because the merge operation does not enforce proper bounds checking against the allocated buffer size, this results in an out-of-bounds write on the heap. The vulnerability is remotely exploitable without authentication via the DTLS handshake path and can lead to application crashes or potential memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-33846&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;h7Lhy275V3QLvnBLGAulbw==&#34;: {&#xA;      &#34;id&#34;: &#34;h7Lhy275V3QLvnBLGAulbw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2023-62&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-02T18:15:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pallets/flask/commit/70f906c51ce49c485f1d355703e9cc3386b1cc2b https://github.com/pallets/flask/releases/tag/2.3.2 https://github.com/pallets/flask/releases/tag/2.2.5 https://github.com/pallets/flask/security/advisories/GHSA-m2qf-hxjv-5gpq https://github.com/pallets/flask/commit/afd63b16170b7c047f5758eb910c416511e9c965&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;flask&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=2.2.5&#34;&#xA;    },&#xA;    &#34;hb+m0qlWxENYdrb1R811qA==&#34;: {&#xA;      &#34;id&#34;: &#34;hb+m0qlWxENYdrb1R811qA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32776&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-32776&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;icG6omirC8ih0OmJHLIkrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;icG6omirC8ih0OmJHLIkrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5260&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5260&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;: {&#xA;      &#34;id&#34;: &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4806&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jS/WQ+ua63nFUvjSzoQw1g==&#34;: {&#xA;      &#34;id&#34;: &#34;jS/WQ+ua63nFUvjSzoQw1g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2236&#34;,&#xA;      &#34;description&#34;: &#34;A timing-based side-channel flaw was found in libgcrypt&#39;s RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-2236&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29383&#34;,&#xA;      &#34;description&#34;: &#34;In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \&#34;cat /etc/passwd\&#34; shows a rogue user account.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-29383&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:4.8.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;k6fjQGJuJ+9NXMFLa5+CgA==&#34;: {&#xA;      &#34;id&#34;: &#34;k6fjQGJuJ+9NXMFLa5+CgA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2016-2781&#34;,&#xA;      &#34;description&#34;: &#34;chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal&#39;s input buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2016-2781&#34;,&#xA;      &#34;severity&#34;: &#34;low&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k82HOcJqNkts86KJ0glvow==&#34;: {&#xA;      &#34;id&#34;: &#34;k82HOcJqNkts86KJ0glvow==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31484&#34;,&#xA;      &#34;description&#34;: &#34;CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31484&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u4&#34;&#xA;    },&#xA;    &#34;kgqUyyy6Fd5CUNREC3t1jg==&#34;: {&#xA;      &#34;id&#34;: &#34;kgqUyyy6Fd5CUNREC3t1jg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32988&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure.  This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-32988&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u8&#34;&#xA;    },&#xA;    &#34;khiBNMMi17UID6UagXI8LA==&#34;: {&#xA;      &#34;id&#34;: &#34;khiBNMMi17UID6UagXI8LA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36086&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36086&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0466&#34;,&#xA;      &#34;description&#34;: &#34;The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification.  As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function.  Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument.  Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0466&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;kwonOUycdcBenNhjZ1b//Q==&#34;: {&#xA;      &#34;id&#34;: &#34;kwonOUycdcBenNhjZ1b//Q==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-68rp-wp8r-4726&#34;,&#xA;      &#34;description&#34;: &#34;Flask session does not add `Vary: Cookie` header when accessed in some ways&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-19T20:45:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pallets/flask/security/advisories/GHSA-68rp-wp8r-4726 https://nvd.nist.gov/vuln/detail/CVE-2026-27205 https://github.com/pallets/flask/commit/089cb86dd22bff589a4eafb7ab8e42dc357623b4 https://github.com/pallets/flask https://github.com/pallets/flask/releases/tag/3.1.3&#34;,&#xA;      &#34;severity&#34;: &#34;LOW&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;flask&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=3.1.3&#34;&#xA;    },&#xA;    &#34;l6iyFrb04z9eZxh35gAtVA==&#34;: {&#xA;      &#34;id&#34;: &#34;l6iyFrb04z9eZxh35gAtVA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-0395&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u12&#34;&#xA;    },&#xA;    &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2011-3374&#34;,&#xA;      &#34;description&#34;: &#34;It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2011-3374&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;apt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31437&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \&#34;a reply denying that any of the finding was a security vulnerability.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31437&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;: {&#xA;      &#34;id&#34;: &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2650&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow.  Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service.  An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit.  OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods.  When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time.  The time complexity is O(n^2) with &#39;n&#39; being the size of the sub-identifiers in bytes (*).  With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced.  This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms.  Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data.  Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL.  If the use is for the mere purpose of display, the severity is considered low.  In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS.  It also impacts anything that processes X.509 certificates, including simple things like verifying its signature.  The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer&#39;s certificate chain.  Additionally, this only impacts clients, or servers that have explicitly enabled client authentication.  In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates.  This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-2650&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;lnMcIzRPoETIbrbgdDGINA==&#34;: {&#xA;      &#34;id&#34;: &#34;lnMcIzRPoETIbrbgdDGINA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-46848&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-46848&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;4.16.0-2+deb11u1&#34;&#xA;    },&#xA;    &#34;lpW8N25dDGtdRer0SxEc1A==&#34;: {&#xA;      &#34;id&#34;: &#34;lpW8N25dDGtdRer0SxEc1A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42009&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42009&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;: {&#xA;      &#34;id&#34;: &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7008&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-7008&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u6&#34;&#xA;    },&#xA;    &#34;m8d/cgBRVljmHKGy6mUUXw==&#34;: {&#xA;      &#34;id&#34;: &#34;m8d/cgBRVljmHKGy6mUUXw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;Perl threads have a working directory race condition where file operations may target unintended paths.  If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running.   This may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit.  The bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-40909&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u5&#34;&#xA;    },&#xA;    &#34;mJA9Uto8Hh0tElNp2qoYaA==&#34;: {&#xA;      &#34;id&#34;: &#34;mJA9Uto8Hh0tElNp2qoYaA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-7245&#34;,&#xA;      &#34;description&#34;: &#34;Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-7245&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;meQYB1JR+XE3En/RrDfPvA==&#34;: {&#xA;      &#34;id&#34;: &#34;meQYB1JR+XE3En/RrDfPvA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4415&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4415&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u2&#34;&#xA;    },&#xA;    &#34;mj6UKCnVoHnC6YBWJGf/Ug==&#34;: {&#xA;      &#34;id&#34;: &#34;mj6UKCnVoHnC6YBWJGf/Ug==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-mq26-g339-26xf&#34;,&#xA;      &#34;description&#34;: &#34;Command Injection in pip when used with Mercurial&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-25T18:32:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2023-5752 https://github.com/pypa/pip/pull/12306 https://github.com/pypa/pip/commit/389cb799d0da9a840749fcd14878928467ed49b4 https://github.com/pypa/advisory-database/tree/main/vulns/pip/PYSEC-2023-228.yaml https://github.com/pypa/pip https://lists.debian.org/debian-lts-announce/2025/10/msg00028.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/622OZXWG72ISQPLM5Y57YCVIMWHD4C3U https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65UKKF5LBHEFDCUSPBHUN4IHYX7SRMHH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXUVMJM25PUAZRQZBF54OFVKTY3MINPW https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFC2SPFG5FLCZBYY2K3T5MFW2D22NG6E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YBSB3SUPQ3VIFYUMHPO3MEQI4BJAXKCZ https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=23.3&#34;&#xA;    },&#xA;    &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;: {&#xA;      &#34;id&#34;: &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-0563&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \&#34;INPUTRC\&#34; environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-0563&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;: {&#xA;      &#34;id&#34;: &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50868&#34;,&#xA;      &#34;description&#34;: &#34;The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the \&#34;NSEC3\&#34; issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-50868&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u6&#34;&#xA;    },&#xA;    &#34;nApP7wP3SU/Fk79xF589WA==&#34;: {&#xA;      &#34;id&#34;: &#34;nApP7wP3SU/Fk79xF589WA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40226&#34;,&#xA;      &#34;description&#34;: &#34;In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40226&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;o75dmeL6883s7llfbkU+PA==&#34;: {&#xA;      &#34;id&#34;: &#34;o75dmeL6883s7llfbkU+PA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45490&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-45490&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;oeIf5WAd0bERBmJCeLsqIg==&#34;: {&#xA;      &#34;id&#34;: &#34;oeIf5WAd0bERBmJCeLsqIg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-7246&#34;,&#xA;      &#34;description&#34;: &#34;Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-7246&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pVmDd54NDrNeiY7vPLSO2A==&#34;: {&#xA;      &#34;id&#34;: &#34;pVmDd54NDrNeiY7vPLSO2A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42014&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42014&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pa+2016jZIT5xycgFHsAsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pa+2016jZIT5xycgFHsAsQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-20796&#34;,&#xA;      &#34;description&#34;: &#34;In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by &#39;(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+&#39; in grep.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2018-20796&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pmcR65l6CQ+6Qdh99gUtFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pmcR65l6CQ+6Qdh99gUtFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52425&#34;,&#xA;      &#34;description&#34;: &#34;libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-52425&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;: {&#xA;      &#34;id&#34;: &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5678&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow.  Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays.  Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.  While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn&#39;t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters.  Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn&#39;t check for an excessively large Q.  An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.  DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions.  An application calling any of those other functions may similarly be affected.  The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().  Also vulnerable are the OpenSSL pkey command line application when using the \&#34;-pubcheck\&#34; option, as well as the OpenSSL genpkey command line application.  The OpenSSL SSL/TLS implementation is not affected by this issue.  The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-5678&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;pvJrwAdasLbb4sLGcD48Jg==&#34;: {&#xA;      &#34;id&#34;: &#34;pvJrwAdasLbb4sLGcD48Jg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5450&#34;,&#xA;      &#34;description&#34;: &#34;Calling the scanf family of functions with a %mc (malloc&#39;d character match) in the GNU C Library version 2.7 to version 2.43 with a format width specifier with an explicit width greater than 1024 could result in a one byte heap buffer overflow.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5450&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qDLWFSo6NpfxWPhSeAS8zQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qDLWFSo6NpfxWPhSeAS8zQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28834&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28834&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u6&#34;&#xA;    },&#xA;    &#34;qGfgK6gESZLmw0X26VnrJw==&#34;: {&#xA;      &#34;id&#34;: &#34;qGfgK6gESZLmw0X26VnrJw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5958&#34;,&#xA;      &#34;description&#34;: &#34;When sed is invoked with both -i (in-place edit) and --follow-symlinks, the function open_next_file() performs two separate, non-atomic filesystem operations on the same path:  1. resolves symlink to its target and stores the resolved path for determining when output is written, 2. opens the original symlink path (not the resolved one) to read the file.  Between these two calls there is a race window. If an attacker atomically replaces the symlink with a different target during that window, sed will: read content from the new (attacker-chosen) symlink target and write the processed result to the path recorded in step 1. This can lead to arbitrary file overwrite with attacker-controlled content in the context of the sed process.   This issue was fixed in version 4.10.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5958&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sed&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;: {&#xA;      &#34;id&#34;: &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-14104&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;: {&#xA;      &#34;id&#34;: &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4641&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4641&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:4.8.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;: {&#xA;      &#34;id&#34;: &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69720&#34;,&#xA;      &#34;description&#34;: &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69720&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;r5SCr3Z1Q4buRwe6QvoIRg==&#34;: {&#xA;      &#34;id&#34;: &#34;r5SCr3Z1Q4buRwe6QvoIRg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41080&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-41080&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;s55QOTlka9E4jTdGv0d/FA==&#34;: {&#xA;      &#34;id&#34;: &#34;s55QOTlka9E4jTdGv0d/FA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-4802&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u13&#34;&#xA;    },&#xA;    &#34;srcIw8ffB6famHHqmqImEw==&#34;: {&#xA;      &#34;id&#34;: &#34;srcIw8ffB6famHHqmqImEw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3817&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Checking excessively long DH keys or parameters may be very slow.  Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.  The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p.  An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.  The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().  Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \&#34;-check\&#34; option.  The OpenSSL SSL/TLS implementation is not affected by this issue.  The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-3817&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1v-0~deb11u1&#34;&#xA;    },&#xA;    &#34;svo9ZP0wOZ7IXZp//n2f7g==&#34;: {&#xA;      &#34;id&#34;: &#34;svo9ZP0wOZ7IXZp//n2f7g==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-m2qf-hxjv-5gpq&#34;,&#xA;      &#34;description&#34;: &#34;Flask vulnerable to possible disclosure of permanent session cookie due to missing Vary: Cookie header&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-01T19:22:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pallets/flask/security/advisories/GHSA-m2qf-hxjv-5gpq https://nvd.nist.gov/vuln/detail/CVE-2023-30861 https://github.com/pallets/flask/commit/70f906c51ce49c485f1d355703e9cc3386b1cc2b https://github.com/pallets/flask/commit/afd63b16170b7c047f5758eb910c416511e9c965 https://github.com/pallets/flask https://github.com/pallets/flask/releases/tag/2.2.5 https://github.com/pallets/flask/releases/tag/2.3.2 https://github.com/pypa/advisory-database/tree/main/vulns/flask/PYSEC-2023-62.yaml https://lists.debian.org/debian-lts-announce/2023/08/msg00024.html https://security.netapp.com/advisory/ntap-20230818-0006 https://www.debian.org/security/2023/dsa-5442&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;flask&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=2.2.5&#34;&#xA;    },&#xA;    &#34;swQXHeTg1VEUQHser/6eEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;swQXHeTg1VEUQHser/6eEQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50387&#34;,&#xA;      &#34;description&#34;: &#34;Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the \&#34;KeyTrap\&#34; issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-50387&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u6&#34;&#xA;    },&#xA;    &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;: {&#xA;      &#34;id&#34;: &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0286&#34;,&#xA;      &#34;description&#34;: &#34;There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING.  When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0286&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;tBbOIOCaKVlwik7hH/baMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tBbOIOCaKVlwik7hH/baMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-45346&#34;,&#xA;      &#34;description&#34;: &#34;A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-45346&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tjx9raP+v/Zzj6SBJct3WA==&#34;: {&#xA;      &#34;id&#34;: &#34;tjx9raP+v/Zzj6SBJct3WA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7104&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-7104&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.34.1-3+deb11u1&#34;&#xA;    },&#xA;    &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;: {&#xA;      &#34;id&#34;: &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;nscd: Null pointer crashes after notfound response  If the Name Service Cache Daemon&#39;s (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference.  This flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33600&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;u+ya+p/mAtLPAYAgbSPTTw==&#34;: {&#xA;      &#34;id&#34;: &#34;u+ya+p/mAtLPAYAgbSPTTw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41409&#34;,&#xA;      &#34;description&#34;: &#34;Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-41409&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u4BvRhFacDxQuC7pVeExQg==&#34;: {&#xA;      &#34;id&#34;: &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27456&#34;,&#xA;      &#34;description&#34;: &#34;util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-27456&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uEg5UAxE9NNjF71OxdO7uQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uEg5UAxE9NNjF71OxdO7uQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-16231&#34;,&#xA;      &#34;description&#34;: &#34;In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-16231&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uTSYWROavw8Bf2n+4djlMg==&#34;: {&#xA;      &#34;id&#34;: &#34;uTSYWROavw8Bf2n+4djlMg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.  A SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-4598&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u7&#34;&#xA;    },&#xA;    &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;: {&#xA;      &#34;id&#34;: &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5535&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer.  Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application.  The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists).  This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \&#34;no overlap\&#34; response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem.  In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur.  This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely.  The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.  Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-5535&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;uspznaGFEzt4cX0xZ36sYw==&#34;: {&#xA;      &#34;id&#34;: &#34;uspznaGFEzt4cX0xZ36sYw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28390&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: During processing of a crafted CMS EnvelopedData message with KeyTransportRecipientInfo a NULL pointer dereference can happen.  Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service.  When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with RSA-OAEP encryption is processed, the optional parameters field of RSA-OAEP SourceFunc algorithm identifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing.  Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28390&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40228&#34;,&#xA;      &#34;description&#34;: &#34;In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a \&#34;logger -p emerg\&#34; command is executed, if ForwardToWall=yes is set.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40228&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vcYYj1nbYwczzoLG255iZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vcYYj1nbYwczzoLG255iZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4039&#34;,&#xA;      &#34;description&#34;: &#34;**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains  that target AArch64 allows an attacker to exploit an existing buffer  overflow in dynamically-sized local variables in your application  without this being detected. This stack-protector failure only applies  to C99-style dynamically-sized local variables or those created using  alloca(). The stack-protector operates as intended for statically-sized  local variables.  The default behavior when the stack-protector  detects an overflow is to terminate your application, resulting in  controlled loss of availability. An attacker who can exploit a buffer  overflow without triggering the stack-protector might be able to change  program flow control to cause an uncontrolled loss of availability or to  go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4039&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vmet9boOEsf+RUsh5rJnEw==&#34;: {&#xA;      &#34;id&#34;: &#34;vmet9boOEsf+RUsh5rJnEw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4741&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations  Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications.  The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use.  The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arrived. In this case calling SSL_free_buffers will succeed even though a record has only been partially processed and the buffer is still in use.  The second scenario occurs where a full record containing application data has been received and processed by OpenSSL but the application has only read part of this data. Again a call to SSL_free_buffers will succeed even though the buffer is still in use.  While these scenarios could occur accidentally during normal operation a malicious attacker could attempt to engineer a stituation where this occurs. We are not aware of this issue being actively exploited.  The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-4741&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2010-4756&#34;,&#xA;      &#34;description&#34;: &#34;The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2010-4756&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;: {&#xA;      &#34;id&#34;: &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4911&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u7&#34;&#xA;    },&#xA;    &#34;wzv81XuYHOFtlrLHaamjZg==&#34;: {&#xA;      &#34;id&#34;: &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-37371&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-37371&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u5&#34;&#xA;    },&#xA;    &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;: {&#xA;      &#34;id&#34;: &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27587&#34;,&#xA;      &#34;description&#34;: &#34;OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) from the signatures. Next, based on the bit size of the extracted nonce, one can compare the signing time of full-sized nonces to signatures that used smaller nonces, via statistical tests. There is a side-channel in the P-364 curve that allows private key extraction (also, there is a dependency between the bit size of K and the size of the side channel). NOTE: This CVE is disputed because the OpenSSL security policy explicitly notes that any side channels which require same physical system to be detected are outside of the threat model for the software. The timing signal is so small that it is infeasible to be detected without having the attacking process running on the same physical system.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-27587&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;: {&#xA;      &#34;id&#34;: &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-56433&#34;,&#xA;      &#34;description&#34;: &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-56433&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;y2mOh8WlJTCvA6wlULAyvA==&#34;: {&#xA;      &#34;id&#34;: &#34;y2mOh8WlJTCvA6wlULAyvA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;      &#34;description&#34;: &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-68973&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.27-2+deb11u3&#34;&#xA;    },&#xA;    &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;: {&#xA;      &#34;id&#34;: &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9143&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes.  Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we&#39;re aware of, either only \&#34;named curves\&#34; are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2^m)) curves that can&#39;t represent problematic input values. Thus the likelihood of existence of a vulnerable application is low.  In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates.  Any problematic use-cases would have to be using an \&#34;exotic\&#34; curve encoding.  The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions.  Applications working with \&#34;exotic\&#34; explicit binary (GF(2^m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds.  Remote code execution cannot easily be ruled out.  The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-9143&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;yyExMMKc3SPW2jNE01wTug==&#34;: {&#xA;      &#34;id&#34;: &#34;yyExMMKc3SPW2jNE01wTug==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file.  Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denial of Service.  A type confusion vulnerability exists in PKCS#12 parsing code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid pointer read.  The location is constrained to a 1-byte address space, meaning any attempted pointer manipulation can only target addresses between 0x00 and 0xFF. This range corresponds to the zero page, which is unmapped on most modern operating systems and will reliably result in a crash, leading only to a Denial of Service. Exploiting this issue also requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For these reasons, the issue was assessed as Low severity.  The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS12 implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.  OpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-22795&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;: {&#xA;      &#34;id&#34;: &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2097&#34;,&#xA;      &#34;description&#34;: &#34;AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn&#39;t written. In the special case of \&#34;in place\&#34; encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-2097&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29458&#34;,&#xA;      &#34;description&#34;: &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-29458&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;6.2+20201114-2+deb11u1&#34;&#xA;    },&#xA;    &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function.  Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files.  The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct parameter is NULL before dereferencing it. When called from PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can be NULL, causing a crash. The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure.  Exploiting this issue requires an attacker to provide a malformed PKCS#12 file to an application that processes it. For that reason the issue was assessed as Low severity according to our Security Policy.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69421&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    }&#xA;  },&#xA;  &#34;package_vulnerabilities&#34;: {&#xA;    &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;: [&#xA;      &#34;KwgIGMm765S+zvIBAwM9+g==&#34;&#xA;    ],&#xA;    &#34;2MObxiEVNllmUEzdVZM5qw==&#34;: [&#xA;      &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;&#xA;    ],&#xA;    &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;: [&#xA;      &#34;U3JbUhrT2SqWNuYU5d13cQ==&#34;,&#xA;      &#34;+aR35vFmeRYa8dLzBaCMmQ==&#34;,&#xA;      &#34;DfxJWBpJUY1aHu0ZUSilDg==&#34;,&#xA;      &#34;jS/WQ+ua63nFUvjSzoQw1g==&#34;&#xA;    ],&#xA;    &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;&#xA;    ],&#xA;    &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;: [&#xA;      &#34;pmcR65l6CQ+6Qdh99gUtFQ==&#34;,&#xA;      &#34;Ud6njM/DPIrfSPiFct82Lw==&#34;,&#xA;      &#34;UdV1OleGh/0MAkug0ZAlcQ==&#34;,&#xA;      &#34;5Cmp5KJXv+nVwwcs5/Kz7w==&#34;,&#xA;      &#34;DS2nhayHHtinLlFzZheSwg==&#34;,&#xA;      &#34;6jg3v7lJ92IZCQpZydR2sA==&#34;,&#xA;      &#34;9ThuL3zLKpmduvKpiDZ60w==&#34;,&#xA;      &#34;5+uzHCKkmvMK8jl2uJkFqQ==&#34;,&#xA;      &#34;/7UJLAHsMPxTtTxvuPgrzA==&#34;,&#xA;      &#34;KZ3Jt7zkiM272dGLstI4XA==&#34;,&#xA;      &#34;o75dmeL6883s7llfbkU+PA==&#34;,&#xA;      &#34;IJPGr43VMeLym6tW3EWgdg==&#34;,&#xA;      &#34;hb+m0qlWxENYdrb1R811qA==&#34;,&#xA;      &#34;BtqRPc7F47wJWygPNOxw1w==&#34;,&#xA;      &#34;MdrEi+/OrLlW3zDrheID2Q==&#34;,&#xA;      &#34;r5SCr3Z1Q4buRwe6QvoIRg==&#34;,&#xA;      &#34;IvA5abshk33BAuuBar/pVQ==&#34;&#xA;    ],&#xA;    &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;: [&#xA;      &#34;meQYB1JR+XE3En/RrDfPvA==&#34;,&#xA;      &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;,&#xA;      &#34;GRlufCZFwHNK64OQNCFIcg==&#34;,&#xA;      &#34;uTSYWROavw8Bf2n+4djlMg==&#34;,&#xA;      &#34;U5598afGvRaltva6Rjqnug==&#34;,&#xA;      &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;,&#xA;      &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;,&#xA;      &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;,&#xA;      &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;,&#xA;      &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;,&#xA;      &#34;nApP7wP3SU/Fk79xF589WA==&#34;,&#xA;      &#34;1dwwvWkARnFe67yAAGVglQ==&#34;,&#xA;      &#34;swQXHeTg1VEUQHser/6eEQ==&#34;,&#xA;      &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;,&#xA;      &#34;0q/btA3zBEGWWmFxU7cNig==&#34;,&#xA;      &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;&#xA;    ],&#xA;    &#34;Akbft1KN+9FKNhh1tM25eA==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;CBzoMmlXBcyP54HOnauO0g==&#34;: [&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;&#xA;    ],&#xA;    &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;: [&#xA;      &#34;l6iyFrb04z9eZxh35gAtVA==&#34;,&#xA;      &#34;MYYkxlB4Ank1zsdIh41apg==&#34;,&#xA;      &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;,&#xA;      &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;,&#xA;      &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;,&#xA;      &#34;IwuADin5bagOGQErETBgWw==&#34;,&#xA;      &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;,&#xA;      &#34;s55QOTlka9E4jTdGv0d/FA==&#34;,&#xA;      &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;,&#xA;      &#34;OTqcMsspao5I6JZMETZ06w==&#34;,&#xA;      &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;,&#xA;      &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;,&#xA;      &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;,&#xA;      &#34;XQ5gIRaXVhDd6S954jtG2g==&#34;,&#xA;      &#34;pvJrwAdasLbb4sLGcD48Jg==&#34;,&#xA;      &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;,&#xA;      &#34;pa+2016jZIT5xycgFHsAsQ==&#34;,&#xA;      &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;,&#xA;      &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;,&#xA;      &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;,&#xA;      &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;,&#xA;      &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;,&#xA;      &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;,&#xA;      &#34;dDtfYPtAiWG7x5kc85ma8w==&#34;,&#xA;      &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;,&#xA;      &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;,&#xA;      &#34;/cV7Fn8Va+poBGxbPjGjrQ==&#34;,&#xA;      &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;&#xA;    ],&#xA;    &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;: [&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;RxgProNqXCgPRgAzu8keFA==&#34;,&#xA;      &#34;WRwV7Adc7Zuy6O98PPaFDw==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;&#xA;    ],&#xA;    &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;: [&#xA;      &#34;CtYegggqGbMfg16G/qfITQ==&#34;,&#xA;      &#34;WCGqond4znYKCRcm4xyPrg==&#34;,&#xA;      &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;,&#xA;      &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;,&#xA;      &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;,&#xA;      &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;&#xA;    ],&#xA;    &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;: [&#xA;      &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;,&#xA;      &#34;uspznaGFEzt4cX0xZ36sYw==&#34;,&#xA;      &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;,&#xA;      &#34;epkSU4TSX3BVrueh1mbRzg==&#34;,&#xA;      &#34;eietxU2AL+GdeSQwh6n6XA==&#34;,&#xA;      &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;,&#xA;      &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;,&#xA;      &#34;cZD87tDO2q60EFy3BAZ33g==&#34;,&#xA;      &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;,&#xA;      &#34;+N61/5529gFt7RkD8ooeKQ==&#34;,&#xA;      &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;,&#xA;      &#34;EajCJi704nU1+LqESNMC1w==&#34;,&#xA;      &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;,&#xA;      &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;,&#xA;      &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;,&#xA;      &#34;yyExMMKc3SPW2jNE01wTug==&#34;,&#xA;      &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;,&#xA;      &#34;afNm575eldgXY3DOGUNdqQ==&#34;,&#xA;      &#34;vmet9boOEsf+RUsh5rJnEw==&#34;,&#xA;      &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;,&#xA;      &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;,&#xA;      &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;,&#xA;      &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;,&#xA;      &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;,&#xA;      &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;,&#xA;      &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;,&#xA;      &#34;srcIw8ffB6famHHqmqImEw==&#34;,&#xA;      &#34;P4mYk7npVU6t91mlbAb8QA==&#34;,&#xA;      &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;,&#xA;      &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;,&#xA;      &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;&#xA;    ],&#xA;    &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;: [&#xA;      &#34;u+ya+p/mAtLPAYAgbSPTTw==&#34;&#xA;    ],&#xA;    &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;: [&#xA;      &#34;Mxv06g47iCk7QIqi7Xbojw==&#34;,&#xA;      &#34;5OqCQlhu6kV+tAsgGEGuwQ==&#34;&#xA;    ],&#xA;    &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;: [&#xA;      &#34;CtYegggqGbMfg16G/qfITQ==&#34;,&#xA;      &#34;WCGqond4znYKCRcm4xyPrg==&#34;,&#xA;      &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;,&#xA;      &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;,&#xA;      &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;,&#xA;      &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;&#xA;    ],&#xA;    &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;: [&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;RxgProNqXCgPRgAzu8keFA==&#34;,&#xA;      &#34;WRwV7Adc7Zuy6O98PPaFDw==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;&#xA;    ],&#xA;    &#34;PgPY5hWnihXRN45byvzY0g==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;&#xA;    ],&#xA;    &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;: [&#xA;      &#34;CaLsKNvkpKlxKVBlUnje9Q==&#34;,&#xA;      &#34;1U/zi3CEao+52y8LKU0uvw==&#34;,&#xA;      &#34;bZ2m6J3EIvmTdjYJprlOKA==&#34;,&#xA;      &#34;khiBNMMi17UID6UagXI8LA==&#34;&#xA;    ],&#xA;    &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;: [&#xA;      &#34;bNvH54V1y9cXsGaCXVwFVw==&#34;,&#xA;      &#34;QGq5D5QwQKPerzYOBVoSsg==&#34;,&#xA;      &#34;Jl0PQIP9L3ufSvQ2j71iww==&#34;,&#xA;      &#34;Qd2XnJZ3qaQ3AbyDXUaR2A==&#34;,&#xA;      &#34;Pj9V3uC2c9o+P6lTpzzGeA==&#34;&#xA;    ],&#xA;    &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;: [&#xA;      &#34;aWm6E1ULjtuw0ydmFnsI4A==&#34;&#xA;    ],&#xA;    &#34;RgdwX+VC70nXZ2E527PXaA==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;: [&#xA;      &#34;vcYYj1nbYwczzoLG255iZQ==&#34;&#xA;    ],&#xA;    &#34;Wi4oa03apqVdR6okNeZiNA==&#34;: [&#xA;      &#34;XtT5+z5+yMbpdsyfkLItzA==&#34;,&#xA;      &#34;HuTBrVHKx7uaMtQjiqifKQ==&#34;,&#xA;      &#34;9sNDKQtqg7Z3gJr//JQlvg==&#34;,&#xA;      &#34;Ul/kdhde9MT/cThQqWyUBA==&#34;,&#xA;      &#34;djiF0yOmYUIiWIfmt75aDA==&#34;,&#xA;      &#34;bBymk1eoEM+tVYB+/Crz+g==&#34;,&#xA;      &#34;kgqUyyy6Fd5CUNREC3t1jg==&#34;,&#xA;      &#34;LAgKryCll+DIcYhTR/xbzg==&#34;,&#xA;      &#34;RsDeaOU1gcwrKfmGECEolg==&#34;,&#xA;      &#34;qDLWFSo6NpfxWPhSeAS8zQ==&#34;,&#xA;      &#34;SNR1VT02i1HBHxqGRTeBAQ==&#34;,&#xA;      &#34;2TcHkpRhAP0iTCSGAQKUOg==&#34;,&#xA;      &#34;icG6omirC8ih0OmJHLIkrQ==&#34;,&#xA;      &#34;20nlQwJu4gG0Ex/vty+hig==&#34;,&#xA;      &#34;KaoEuixR8E5nnpGZ1pG25w==&#34;,&#xA;      &#34;Y++3+aMTeU3vX7BI4/zG6w==&#34;,&#xA;      &#34;7N1fkfhDIULrLId2wh2Pqw==&#34;,&#xA;      &#34;pVmDd54NDrNeiY7vPLSO2A==&#34;,&#xA;      &#34;ZbWtFXr0WyByV4kCb3M6FA==&#34;,&#xA;      &#34;3cBlPR7Tm4BIC/+wflldAg==&#34;,&#xA;      &#34;DTII3LzSaQL1baKsoSwsqg==&#34;,&#xA;      &#34;fUdim7gaWpwZtynNz5GiKg==&#34;,&#xA;      &#34;lpW8N25dDGtdRer0SxEc1A==&#34;,&#xA;      &#34;ErraMUPFwrdWYaj+aBxTMw==&#34;,&#xA;      &#34;h+ZYYwp9nAKs/v08piJa2A==&#34;,&#xA;      &#34;g44foSnimIkShQZtpEhjbQ==&#34;&#xA;    ],&#xA;    &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;: [&#xA;      &#34;08pa4udz9bnA9IOsE208DA==&#34;&#xA;    ],&#xA;    &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;: [&#xA;      &#34;Xce4H7xsVfrtYV2aXED7xA==&#34;,&#xA;      &#34;QopvyNp/5Ata9NdAUhFygw==&#34;,&#xA;      &#34;k6fjQGJuJ+9NXMFLa5+CgA==&#34;&#xA;    ],&#xA;    &#34;bTSLWiizipO2axtmvXFuVg==&#34;: [&#xA;      &#34;YXTNVVKQsWY/LFuomB715g==&#34;,&#xA;      &#34;lnMcIzRPoETIbrbgdDGINA==&#34;,&#xA;      &#34;6j23t/n6B77cQMxfCeLKzA==&#34;&#xA;    ],&#xA;    &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;: [&#xA;      &#34;l6iyFrb04z9eZxh35gAtVA==&#34;,&#xA;      &#34;MYYkxlB4Ank1zsdIh41apg==&#34;,&#xA;      &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;,&#xA;      &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;,&#xA;      &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;,&#xA;      &#34;IwuADin5bagOGQErETBgWw==&#34;,&#xA;      &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;,&#xA;      &#34;s55QOTlka9E4jTdGv0d/FA==&#34;,&#xA;      &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;,&#xA;      &#34;OTqcMsspao5I6JZMETZ06w==&#34;,&#xA;      &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;,&#xA;      &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;,&#xA;      &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;,&#xA;      &#34;XQ5gIRaXVhDd6S954jtG2g==&#34;,&#xA;      &#34;pvJrwAdasLbb4sLGcD48Jg==&#34;,&#xA;      &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;,&#xA;      &#34;pa+2016jZIT5xycgFHsAsQ==&#34;,&#xA;      &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;,&#xA;      &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;,&#xA;      &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;,&#xA;      &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;,&#xA;      &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;,&#xA;      &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;,&#xA;      &#34;dDtfYPtAiWG7x5kc85ma8w==&#34;,&#xA;      &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;,&#xA;      &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;,&#xA;      &#34;/cV7Fn8Va+poBGxbPjGjrQ==&#34;,&#xA;      &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;&#xA;    ],&#xA;    &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;: [&#xA;      &#34;NYWveHKKsIYIKl+vE8UEhw==&#34;&#xA;    ],&#xA;    &#34;dXglURzzdbLnOf14mab1Hg==&#34;: [&#xA;      &#34;VzolVkOS5HseGzVTLzDMfA==&#34;,&#xA;      &#34;WWnQMI7f7f75SgC9Dcl+QQ==&#34;,&#xA;      &#34;EYo03ICovWfCjw2cKpwx4Q==&#34;,&#xA;      &#34;27BVJE6xR0Z84LzifDnFYA==&#34;,&#xA;      &#34;9xk1p07t4ZV999E3HyfhVA==&#34;&#xA;    ],&#xA;    &#34;dobmrwm7aq9puvFHwNgXxw==&#34;: [&#xA;      &#34;08pa4udz9bnA9IOsE208DA==&#34;&#xA;    ],&#xA;    &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;: [&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;&#xA;    ],&#xA;    &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;: [&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;&#xA;    ],&#xA;    &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;: [&#xA;      &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;,&#xA;      &#34;uspznaGFEzt4cX0xZ36sYw==&#34;,&#xA;      &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;,&#xA;      &#34;epkSU4TSX3BVrueh1mbRzg==&#34;,&#xA;      &#34;eietxU2AL+GdeSQwh6n6XA==&#34;,&#xA;      &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;,&#xA;      &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;,&#xA;      &#34;cZD87tDO2q60EFy3BAZ33g==&#34;,&#xA;      &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;,&#xA;      &#34;+N61/5529gFt7RkD8ooeKQ==&#34;,&#xA;      &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;,&#xA;      &#34;EajCJi704nU1+LqESNMC1w==&#34;,&#xA;      &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;,&#xA;      &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;,&#xA;      &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;,&#xA;      &#34;yyExMMKc3SPW2jNE01wTug==&#34;,&#xA;      &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;,&#xA;      &#34;afNm575eldgXY3DOGUNdqQ==&#34;,&#xA;      &#34;vmet9boOEsf+RUsh5rJnEw==&#34;,&#xA;      &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;,&#xA;      &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;,&#xA;      &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;,&#xA;      &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;,&#xA;      &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;,&#xA;      &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;,&#xA;      &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;,&#xA;      &#34;srcIw8ffB6famHHqmqImEw==&#34;,&#xA;      &#34;P4mYk7npVU6t91mlbAb8QA==&#34;,&#xA;      &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;,&#xA;      &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;,&#xA;      &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;&#xA;    ],&#xA;    &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;: [&#xA;      &#34;MDmWztEMrTY+VyVp5c+Fvw==&#34;,&#xA;      &#34;MXRm//dBCnWFem5zffvqmA==&#34;&#xA;    ],&#xA;    &#34;hdNUjYIlrdEAtBWAggakAw==&#34;: [&#xA;      &#34;7DtFnnE8FjIpCQKunutpeg==&#34;,&#xA;      &#34;AvPdNumiwGnBie+lo1du3A==&#34;,&#xA;      &#34;brAAPyN4siIQT5bxa9xu4g==&#34;,&#xA;      &#34;k82HOcJqNkts86KJ0glvow==&#34;,&#xA;      &#34;ce9B0jxjyNiCfG4VtZhnVw==&#34;,&#xA;      &#34;m8d/cgBRVljmHKGy6mUUXw==&#34;&#xA;    ],&#xA;    &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;: [&#xA;      &#34;ZrZi02myDWWW0L5oPQj/cg==&#34;,&#xA;      &#34;oeIf5WAd0bERBmJCeLsqIg==&#34;,&#xA;      &#34;uEg5UAxE9NNjF71OxdO7uQ==&#34;,&#xA;      &#34;G45dR+E8Wb+bEhCdwuqUDg==&#34;,&#xA;      &#34;mJA9Uto8Hh0tElNp2qoYaA==&#34;&#xA;    ],&#xA;    &#34;jErhz6PtXvAy/EPWJ425rA==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;: [&#xA;      &#34;kwonOUycdcBenNhjZ1b//Q==&#34;,&#xA;      &#34;svo9ZP0wOZ7IXZp//n2f7g==&#34;,&#xA;      &#34;h7Lhy275V3QLvnBLGAulbw==&#34;&#xA;    ],&#xA;    &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;&#xA;    ],&#xA;    &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;: [&#xA;      &#34;ANq7+l7+5U6IDt9eU02u5w==&#34;,&#xA;      &#34;y2mOh8WlJTCvA6wlULAyvA==&#34;,&#xA;      &#34;F0zkrLGlbsix59P9mqoAOg==&#34;,&#xA;      &#34;WxlxRC1KqAo8Mejv03fZGA==&#34;&#xA;    ],&#xA;    &#34;lCjIskl1HulEHShaXtgmwQ==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;&#xA;    ],&#xA;    &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;: [&#xA;      &#34;dZ/H1sYv9QSX9VO93tlGLw==&#34;,&#xA;      &#34;PFkN8K2aK2XnSQjmAIry9A==&#34;,&#xA;      &#34;PUY4fn57nsAU2qBLtgRtdw==&#34;,&#xA;      &#34;8uv2vKf0QrdM+zJP4ufG+Q==&#34;,&#xA;      &#34;mj6UKCnVoHnC6YBWJGf/Ug==&#34;,&#xA;      &#34;WcYPrwv9PSVoVoof5MRsxQ==&#34;&#xA;    ],&#xA;    &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;: [&#xA;      &#34;tBbOIOCaKVlwik7hH/baMQ==&#34;,&#xA;      &#34;DRKFIYYNzLumACBV1CW/rw==&#34;,&#xA;      &#34;1VnWeA5AZgybyD8+PiXyiw==&#34;,&#xA;      &#34;tjx9raP+v/Zzj6SBJct3WA==&#34;,&#xA;      &#34;fharKhY7OXyx+gXJAwiegw==&#34;,&#xA;      &#34;dUTZP+bcDNUqytJV02E1dQ==&#34;,&#xA;      &#34;BxMnseA9J6OW2RWxSrlbyQ==&#34;&#xA;    ],&#xA;    &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;: [&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;RxgProNqXCgPRgAzu8keFA==&#34;,&#xA;      &#34;WRwV7Adc7Zuy6O98PPaFDw==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;&#xA;    ],&#xA;    &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;: [&#xA;      &#34;meQYB1JR+XE3En/RrDfPvA==&#34;,&#xA;      &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;,&#xA;      &#34;GRlufCZFwHNK64OQNCFIcg==&#34;,&#xA;      &#34;uTSYWROavw8Bf2n+4djlMg==&#34;,&#xA;      &#34;U5598afGvRaltva6Rjqnug==&#34;,&#xA;      &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;,&#xA;      &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;,&#xA;      &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;,&#xA;      &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;,&#xA;      &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;,&#xA;      &#34;nApP7wP3SU/Fk79xF589WA==&#34;,&#xA;      &#34;1dwwvWkARnFe67yAAGVglQ==&#34;,&#xA;      &#34;swQXHeTg1VEUQHser/6eEQ==&#34;,&#xA;      &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;,&#xA;      &#34;0q/btA3zBEGWWmFxU7cNig==&#34;,&#xA;      &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;&#xA;    ],&#xA;    &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;: [&#xA;      &#34;B78vSIll2muNDyY3F7urzw==&#34;&#xA;    ],&#xA;    &#34;tYADP/V07/lE8Qno1R/hhg==&#34;: [&#xA;      &#34;08pa4udz9bnA9IOsE208DA==&#34;&#xA;    ],&#xA;    &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;: [&#xA;      &#34;fXJD4KsFmfzjgWJPYHqTrQ==&#34;&#xA;    ],&#xA;    &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;: [&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;RxgProNqXCgPRgAzu8keFA==&#34;,&#xA;      &#34;WRwV7Adc7Zuy6O98PPaFDw==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;&#xA;    ],&#xA;    &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;: [&#xA;      &#34;qGfgK6gESZLmw0X26VnrJw==&#34;&#xA;    ],&#xA;    &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;: [&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;&#xA;    ],&#xA;    &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;: [&#xA;      &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;&#xA;    ]&#xA;  },&#xA;  &#34;enrichments&#34;: {}&#xA;}&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-clair-scan-pod | container step-oci-attach-report: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw&#xA;Attaching clair-report-amd64.json to quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#xA;Executing: oras attach --no-tty --format go-template={{.digest}} --registry-config /home/oras/auth.json --artifact-type application/vnd.redhat.clair-report+json quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 clair-report-amd64.json:application/vnd.redhat.clair-report+json&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-clair-scan-pod | container step-conftest-vulnerabilities: &#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/clair-result-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 7,&#xA;&#x9;&#x9;&#34;warnings&#34;: [&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched medium vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: coreutils-8.32-4+b1 (CVE-2016-2781)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 1&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libexpat1-2.2.10-2+deb11u5 (CVE-2013-0340, CVE-2023-52426, CVE-2024-28757), libpcre3-2:8.39-13 (CVE-2017-11164, CVE-2017-16231, CVE-2017-7245, CVE-2017-7246, CVE-2019-20838), libgssapi-krb5-2-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), bsdutils-1:2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libudev1-247.3-7+deb11u1 (CVE-2013-4392, CVE-2020-13529, CVE-2023-31437, CVE-2023-31438, CVE-2023-31439), libkrb5support0-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), libsqlite3-0-3.34.1-3 (CVE-2021-45346, CVE-2022-35737, CVE-2025-29088, CVE-2025-70873), libapt-pkg6.0-2.2.4 (CVE-2011-3374), libk5crypto3-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), libgcc-s1-10.2.1-6 (CVE-2023-4039), mount-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libc6-2.31-13+deb11u5 (CVE-2010-4756, CVE-2018-20796, CVE-2019-1010022, CVE-2019-1010023, CVE-2019-1010024, CVE-2019-1010025, CVE-2019-9192), coreutils-8.32-4+b1 (CVE-2017-18018, CVE-2025-5278), libc-bin-2.31-13+deb11u5 (CVE-2010-4756, CVE-2018-20796, CVE-2019-1010022, CVE-2019-1010023, CVE-2019-1010024, CVE-2019-1010025, CVE-2019-9192), libblkid1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), gcc-9-base-9.3.0-22 (CVE-2023-4039), sysvinit-utils-2.96-7+deb11u1 (TEMP-0517018-A83CE6), libssl1.1-1.1.1n-0+deb11u3 (CVE-2025-27587), libuuid1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libsmartcols1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libgcrypt20-1.8.7-6 (CVE-2018-6829, CVE-2024-2236), gcc-10-base-10.2.1-6 (CVE-2023-4039), bash-5.1-2+deb11u1 (TEMP-0841856-B18BAF), util-linux-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libmount1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), passwd-1:4.8.1-1 (CVE-2007-5686, CVE-2013-4235, TEMP-0628843-DBAD28), perl-base-5.32.1-4+deb11u2 (CVE-2011-4116, CVE-2023-31486), gpgv-2.2.27-2+deb11u2 (CVE-2022-3219), libgnutls30-3.7.1-5+deb11u2 (CVE-2011-3389), libstdc++6-10.2.1-6 (CVE-2023-4039), openssl-1.1.1n-0+deb11u3 (CVE-2025-27587), libpcre2-8-0-10.36-2+deb11u1 (CVE-2022-41409), libkrb5-3-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), apt-2.2.4 (CVE-2011-3374), login-1:4.8.1-1 (CVE-2007-5686, CVE-2013-4235, TEMP-0628843-DBAD28), libsystemd0-247.3-7+deb11u1 (CVE-2013-4392, CVE-2020-13529, CVE-2023-31437, CVE-2023-31438, CVE-2023-31439), tar-1.34+dfsg-1 (CVE-2005-2541, TEMP-0290435-0B57B5)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_low_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 89&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched unknown vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libexpat1-2.2.10-2+deb11u5 (CVE-2024-8176, CVE-2025-59375, CVE-2025-66382, CVE-2026-24515, CVE-2026-25210, CVE-2026-32776, CVE-2026-32777, CVE-2026-32778, CVE-2026-41080), libgssapi-krb5-2-1.18.3-6+deb11u3 (CVE-2026-40355, CVE-2026-40356), bsdutils-1:2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), zlib1g-1:1.2.11.dfsg-2+deb11u2 (CVE-2023-45853, CVE-2026-27171), libzstd1-1.4.8+dfsg-2.1 (CVE-2022-4899), sed-4.7-1 (CVE-2026-5958), dpkg-1.20.12 (CVE-2025-6297), libudev1-247.3-7+deb11u1 (CVE-2026-40228), libkrb5support0-1.18.3-6+deb11u3 (CVE-2026-40355, CVE-2026-40356), libsqlite3-0-3.34.1-3 (CVE-2025-6965), libk5crypto3-1.18.3-6+deb11u3 (CVE-2026-40355, CVE-2026-40356), mount-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libc6-2.31-13+deb11u5 (CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-8058, CVE-2026-0861, CVE-2026-0915, CVE-2026-4046, CVE-2026-4437, CVE-2026-4438, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928, CVE-2026-6238), libc-bin-2.31-13+deb11u5 (CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-8058, CVE-2026-0861, CVE-2026-0915, CVE-2026-4046, CVE-2026-4437, CVE-2026-4438, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928, CVE-2026-6238), libblkid1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), ncurses-bin-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), ncurses-base-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libssl1.1-1.1.1n-0+deb11u3 (CVE-2026-28387, CVE-2026-28388, CVE-2026-28389, CVE-2026-28390), libuuid1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libtinfo6-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libsmartcols1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libgcrypt20-1.8.7-6 (CVE-2021-33560, CVE-2026-41989), libpam-runtime-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), libpam-modules-bin-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), bash-5.1-2+deb11u1 (CVE-2022-3715), util-linux-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libmount1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), passwd-1:4.8.1-1 (CVE-2024-56433), gpgv-2.2.27-2+deb11u2 (CVE-2025-30258, CVE-2025-68972), libgnutls30-3.7.1-5+deb11u2 (CVE-2026-33845, CVE-2026-33846, CVE-2026-3832, CVE-2026-3833, CVE-2026-42009, CVE-2026-42010, CVE-2026-42011, CVE-2026-42012, CVE-2026-42013, CVE-2026-42014, CVE-2026-42015, CVE-2026-5260, CVE-2026-5419), libpam0g-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), openssl-1.1.1n-0+deb11u3 (CVE-2026-28387, CVE-2026-28388, CVE-2026-28389, CVE-2026-28390), liblzma5-5.2.5-2.1~deb11u1 (CVE-2026-34743), libkrb5-3-1.18.3-6+deb11u3 (CVE-2026-40355, CVE-2026-40356), libtasn1-6-4.16.0-2 (CVE-2025-13151), login-1:4.8.1-1 (CVE-2024-56433), libncursesw6-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libsystemd0-247.3-7+deb11u1 (CVE-2026-40228), tar-1.34+dfsg-1 (CVE-2026-5704), libpam-modules-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), libdb5.3-5.3.28+dfsg1-0.8 (CVE-2019-8457)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_unknown_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 117&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;]&#xA;&#x9;}&#xA;]&#xA;{&#34;vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:0,&#34;medium&#34;:0,&#34;low&#34;:0,&#34;unknown&#34;:0},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:0,&#34;medium&#34;:1,&#34;low&#34;:89,&#34;unknown&#34;:117}}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;, &#34;digests&#34;: [&#34;sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#34;]}}&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:10:38+00:00&#34;,&#34;note&#34;:&#34;Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-clamav-scan-pod | init container: prepare&#xA;2026/05/06 07:06:31 Entrypoint initialization&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-clamav-scan-pod | init container: place-scripts&#xA;2026/05/06 07:06:32 Decoded script /tekton/scripts/script-0-6ztxf&#xA;2026/05/06 07:06:32 Decoded script /tekton/scripts/script-1-c99ql&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-clamav-scan-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 36.216 sec (0 m 36 s)&#xA;Start Date: 2026:05:06 07:07:45&#xA;End Date:   2026:05:06 07:08:21&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27992/Tue May  5 06:26:41 2026 Database version: 27992&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1778051301&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778051301&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778051301&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;, &#34;digests&#34;: [&#34;sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#34;]}}&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-clamav-scan-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Uploading c839dba5b03b clamscan-ec-test-amd64.json&#xA;Uploading d9a4c7777edc clamscan-result-amd64.log&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploaded  d9a4c7777edc clamscan-result-amd64.log&#xA;Uploaded  c839dba5b03b clamscan-ec-test-amd64.json&#xA;Uploading e2da341f91e0 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  e2da341f91e0 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#xA;Digest: sha256:e2da341f91e0f9b3a973f687b955a8fbf78c6d9319add48a7cf5255cdbfe786b&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-clone-repository-pod | init container: prepare&#xA;2026/05/06 07:03:39 Entrypoint initialization&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-clone-repository-pod | init container: place-scripts&#xA;2026/05/06 07:03:40 Decoded script /tekton/scripts/script-0-gdp28&#xA;2026/05/06 07:03:40 Decoded script /tekton/scripts/script-1-lvnn2&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051025.3977282,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051025.6252344,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-python-basic @ 2d475b7ced7f2f9adb74a83b290655cff6ef2c07 (grafted, HEAD) in path /workspace/output/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051025.6253035,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051025.6526341,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /workspace/output/source&#34;}&#xA;Merge option disabled. Using checked-out revision 2d475b7ced7f2f9adb74a83b290655cff6ef2c07 directly.&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-init-pod | init container: prepare&#xA;2026/05/06 07:03:14 Entrypoint initialization&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-init-pod | container step-init: &#xA;time=&#34;2026-05-06T07:03:30Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-06T07:03:30Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-06T07:03:30Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-06T07:03:30Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-06T07:03:30Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-06T07:03:30Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:03:30Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-06T07:03:30Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-06T07:03:30Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-prefetch-dependencies-pod | init container: prepare&#xA;2026/05/06 07:03:59 Entrypoint initialization&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-prefetch-dependencies-pod | init container: place-scripts&#xA;2026/05/06 07:04:00 Decoded script /tekton/scripts/script-0-hwnzd&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-prefetch-dependencies-pod | container step-prefetch-dependencies: &#xA;Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using mounted service CA bundle: /mnt/service-ca/ca-bundle.crt&#xA;&#39;/mnt/service-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/service-ca.crt&#39;&#xA;time=&#34;2026-05-06T07:04:14Z&#34; level=debug msg=&#34;Starting prefetch-dependencies&#34;&#xA;time=&#34;2026-05-06T07:04:14Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:04:14Z&#34; level=info msg=&#34;Not using package registry proxy because allow-package-registry-proxy is not set to `true` on the cluster level&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-06T07:04:14Z&#34; level=info msg=&#34;[param] source-dir: /workspace/source/source&#34;&#xA;time=&#34;2026-05-06T07:04:14Z&#34; level=info msg=&#34;[param] output-dir: /workspace/source/cachi2/output&#34;&#xA;time=&#34;2026-05-06T07:04:14Z&#34; level=info msg=&#34;[param] sbom-format: spdx&#34;&#xA;time=&#34;2026-05-06T07:04:14Z&#34; level=info msg=&#34;[param] mode: strict&#34;&#xA;time=&#34;2026-05-06T07:04:14Z&#34; level=info msg=&#34;[param] output-dir-mount-point: /cachi2/output&#34;&#xA;time=&#34;2026-05-06T07:04:14Z&#34; level=info msg=&#34;[param] env-files: [/workspace/source/cachi2/cachi2.env /workspace/source/cachi2/prefetch.env /workspace/source/cachi2/prefetch-env.json]&#34;&#xA;time=&#34;2026-05-06T07:04:14Z&#34; level=info msg=&#34;[param] git-auth-directory: /workspace/git-basic-auth&#34;&#xA;time=&#34;2026-05-06T07:04:15Z&#34; level=info msg=&#34;hermeto [stdout] hermeto 0.51.0&#34; logger=CliExecutor&#xA;time=&#34;2026-05-06T07:04:15Z&#34; level=warning msg=&#34;No input provided; skipping prefetch-dependencies&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-06T07:04:15Z&#34; level=debug msg=&#34;Finished prefetch-dependencies&#34;&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-push-dockerfile-pod | init container: prepare&#xA;2026/05/06 07:06:33 Entrypoint initialization&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-push-dockerfile-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-push-dockerfile-pod | container step-push: &#xA;time=&#34;2026-05-06T07:06:36Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;&#xA;time=&#34;2026-05-06T07:06:36Z&#34; level=info msg=&#34;[param] image-digest: sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#34;&#xA;time=&#34;2026-05-06T07:06:36Z&#34; level=info msg=&#34;[param] containerfile: docker/Dockerfile&#34;&#xA;time=&#34;2026-05-06T07:06:36Z&#34; level=info msg=&#34;[param] context: .&#34;&#xA;time=&#34;2026-05-06T07:06:36Z&#34; level=info msg=&#34;[param] tag-suffix: .dockerfile&#34;&#xA;time=&#34;2026-05-06T07:06:36Z&#34; level=info msg=&#34;[param] artifact-type: application/vnd.konflux.dockerfile&#34;&#xA;time=&#34;2026-05-06T07:06:36Z&#34; level=info msg=&#34;[param] source: source&#34;&#xA;time=&#34;2026-05-06T07:06:36Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-06T07:06:36Z&#34; level=info msg=&#34;[param] alternative-filename: Dockerfile&#34;&#xA;time=&#34;2026-05-06T07:06:37Z&#34; level=info msg=&#34;oras [stdout] quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw@sha256:f7e78519b04d36c00cd8d7f12463ae4b8cccfe287ef637a9e7438467b7d942f2&#34; logger=CliExecutor&#xA;time=&#34;2026-05-06T07:06:37Z&#34; level=info msg=&#34;Containerfile &#39;/workspace/workspace/source/docker/Dockerfile&#39; is pushed to registry with tag: sha256-37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745.dockerfile&#34;&#xA;{&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw@sha256:f7e78519b04d36c00cd8d7f12463ae4b8cccfe287ef637a9e7438467b7d942f2&#34;}&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-rpms-signature-scan-pod | init container: prepare&#xA;2026/05/06 07:06:31 Entrypoint initialization&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-rpms-signature-scan-pod | init container: place-scripts&#xA;2026/05/06 07:06:32 Decoded script /tekton/scripts/script-0-kxlnk&#xA;2026/05/06 07:06:32 Decoded script /tekton/scripts/script-1-dwfws&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-rpms-signature-scan-pod | container step-rpms-signature-scan: &#xA;+ set -o pipefail&#xA;+ rpm_verifier --image-url quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07 --image-digest sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 --workdir /tmp&#xA;Image: quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#xA;No unsigned RPMs found&#xA;&#xA;{&#39;keys&#39;: {&#39;unsigned&#39;: 0}}&#xA;====================================&#xA;&#xA;Final results:&#xA;{&#34;keys&#34;: {&#34;unsigned&#34;: 0}}&#xA;Images processed:&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;, &#34;digests&#34;: [&#34;sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#34;]}}&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-rpms-signature-scan-pod | container step-output-results: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;++ cat /tmp/status&#xA;+ status=SUCCESS&#xA;++ cat /tmp/results&#xA;+ rpms_data=&#39;{&#34;keys&#34;: {&#34;unsigned&#34;: 0}}&#39;&#xA;++ cat /tmp/images_processed&#xA;+ images_processed=&#39;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;, &#34;digests&#34;: [&#34;sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#34;]}}&#39;&#xA;+ &#39;[&#39; SUCCESS == ERROR &#39;]&#39;&#xA;+ note=&#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-06T07:08:58+00:00 --arg result SUCCESS --arg note &#39;Task rpms-signature-scan completed successfully&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:08:58+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:08:58+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:08:58+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:08:58+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:08:58+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ echo &#39;{&#34;keys&#34;: {&#34;unsigned&#34;: 0}}&#39;&#xA;+ tee /tekton/results/RPMS_DATA&#xA;{&#34;keys&#34;: {&#34;unsigned&#34;: 0}}&#xA;+ echo &#39;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;, &#34;digests&#34;: [&#34;sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#34;]}}&#39;&#xA;+ tee /tekton/results/IMAGES_PROCESSED&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#34;, &#34;digests&#34;: [&#34;sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#34;]}}&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-sast-shell-check-pod | init container: prepare&#xA;2026/05/06 07:11:58 Entrypoint initialization&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-sast-shell-check-pod | init container: place-scripts&#xA;2026/05/06 07:11:59 Decoded script /tekton/scripts/script-0-glxkk&#xA;2026/05/06 07:11:59 Decoded script /tekton/scripts/script-1-7r7hx&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-sast-shell-check-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-sast-shell-check-pod | container step-sast-shell-check: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=test-comp-jnrw&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: test-comp-jnrw&#39;&#xA;INFO: The PROJECT_NAME used is: test-comp-jnrw&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;++ rpm -q --queryformat &#39;%{NAME}-%{VERSION}-%{RELEASE}\n&#39; ShellCheck&#xA;+ PACKAGE_VERSION=ShellCheck-0.10.0-3.el9&#xA;+ OUTPUT_FILE=shellcheck-results.json&#xA;+ SOURCE_CODE_DIR=/workspace/workspace/source&#xA;+ declare -a ALL_TARGETS&#xA;+ IFS=,&#xA;+ read -ra TARGET_ARRAY&#xA;+ for d in &#34;${TARGET_ARRAY[@]}&#34;&#xA;+ potential_path=/workspace/workspace/source/.&#xA;++ realpath -m /workspace/workspace/source/.&#xA;+ resolved_path=/workspace/workspace/source&#xA;+ [[ /workspace/workspace/source == \/\w\o\r\k\s\p\a\c\e\/\w\o\r\k\s\p\a\c\e\/\s\o\u\r\c\e* ]]&#xA;+ ALL_TARGETS+=(&#34;$resolved_path&#34;)&#xA;+ &#39;[&#39; -z &#39;&#39; &#39;]&#39;&#xA;+ &#39;[&#39; -r /sys/fs/cgroup/cpu.max &#39;]&#39;&#xA;+ read -r quota period&#xA;+ &#39;[&#39; 800000 &#39;!=&#39; max &#39;]&#39;&#xA;+ &#39;[&#39; -n 100000 &#39;]&#39;&#xA;+ &#39;[&#39; 100000 -gt 0 &#39;]&#39;&#xA;+ export SC_JOBS=8&#xA;+ SC_JOBS=8&#xA;+ echo &#39;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#39;&#xA;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#xA;+ /usr/share/csmock/scripts/run-shellcheck.sh /workspace/workspace/source&#xA;Looking for shell scripts................ done&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/applypatch-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/post-update.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/prepare-commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-applypatch.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-merge-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-push.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-rebase.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-receive.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/push-to-checkout.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/sendemail-validate.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/update.sample&#xA;+ CSGREP_OPTS=(--mode=json --strip-path-prefix=&#34;$SOURCE_CODE_DIR&#34;/ --remove-duplicates --embed-context=3 --set-scan-prop=&#34;ShellCheck:${PACKAGE_VERSION}&#34;)&#xA;+ [[ true == \t\r\u\e ]]&#xA;+ CSGREP_EVENT_FILTER=&#39;\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2218|2224|2225|2242|2256|2258|2261)\]$&#39;&#xA;+ CSGREP_OPTS+=(--event=&#34;$CSGREP_EVENT_FILTER&#34;)&#xA;+ csgrep --mode=json --strip-path-prefix=/workspace/workspace/source/ --remove-duplicates --embed-context=3 --set-scan-prop=ShellCheck:ShellCheck-0.10.0-3.el9 &#39;--event=\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|2218|2224|2225|2242|2256|2258|2261)\]$&#39; ./shellcheck-results/empty.json ./shellcheck-results/sc-103.json ./shellcheck-results/sc-110.json ./shellcheck-results/sc-114.json ./shellcheck-results/sc-124.json ./shellcheck-results/sc-70.json ./shellcheck-results/sc-76.json ./shellcheck-results/sc-79.json ./shellcheck-results/sc-81.json ./shellcheck-results/sc-82.json ./shellcheck-results/sc-85.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;+ curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;+ echo &#39;ShellCheck results have been saved to shellcheck-results.json&#39;&#xA;ShellCheck results have been saved to shellcheck-results.json&#xA;+ csgrep --mode=evtstat shellcheck-results.json&#xA;+ csgrep --mode=sarif shellcheck-results.json&#xA;+ TEST_OUTPUT=&#xA;+ parse_test_output sast-shell-check sarif shellcheck-results.sarif&#xA;+ TEST_NAME=sast-shell-check&#xA;+ TEST_RESULT_FORMAT=sarif&#xA;+ TEST_RESULT_FILE=shellcheck-results.sarif&#xA;+ &#39;[&#39; -z sast-shell-check &#39;]&#39;&#xA;+ &#39;[&#39; -z sarif &#39;]&#39;&#xA;+ &#39;[&#39; -z shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; &#39;!&#39; -f shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; sarif = sarif &#39;]&#39;&#xA;+++ jq -rce &#39;(if (.runs[].results | length &gt; 0) then &#34;FAILURE&#34; else &#34;SUCCESS&#34; end)&#39; shellcheck-results.sarif&#xA;+++ jq -rce &#39;(.runs[].results | length)&#39; shellcheck-results.sarif&#xA;++ make_result_json -r SUCCESS -f 0&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ FAILURES=0&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-06T07:12:32+00:00 --arg result SUCCESS --arg note &#39;For details, check Tekton task log.&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:12:32+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:12:32+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:12:32+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:12:32+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ jq .failures&#xA;+ &#39;[&#39; 0 -gt 0 &#39;]&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:12:32+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:12:32+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-sast-shell-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 shellcheck-results.sarif:application/sarif+json&#xA;Preparing shellcheck-results.sarif&#xA;Uploading da808faebf6f shellcheck-results.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploaded  da808faebf6f shellcheck-results.sarif&#xA;Uploading 23db8064cdd9 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  23db8064cdd9 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#xA;Digest: sha256:23db8064cdd9523b67afd6e48463479cf4ed244f8f846e5621560d9f359c5b2f&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-sast-snyk-check-pod | init container: prepare&#xA;2026/05/06 07:06:33 Entrypoint initialization&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-sast-snyk-check-pod | init container: place-scripts&#xA;2026/05/06 07:06:33 Decoded script /tekton/scripts/script-0-ltcpf&#xA;2026/05/06 07:06:33 Decoded script /tekton/scripts/script-1-zspwc&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-sast-snyk-check-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-sast-snyk-check-pod | container step-sast-snyk-check: &#xA;INFO: The PROJECT_NAME used is: test-comp-jnrw&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;{&#34;result&#34;:&#34;SKIPPED&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:07:19+00:00&#34;,&#34;note&#34;:&#34;Task sast-snyk-check skipped: If you wish to use the Snyk code SAST task, please create a secret name snyk-secret with the key &#39;snyk_token&#39; containing the Snyk token by following the steps given [here](https://konflux-ci.dev/docs/testing/build/snyk/)&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-sast-snyk-check-pod | container step-upload: &#xA;No sast_snyk_check_out.sarif exists. Skipping upload.&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-sast-unicode-check-pod | init container: prepare&#xA;2026/05/06 07:06:32 Entrypoint initialization&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-sast-unicode-check-pod | init container: place-scripts&#xA;2026/05/06 07:06:33 Decoded script /tekton/scripts/script-0-4tkzw&#xA;2026/05/06 07:06:33 Decoded script /tekton/scripts/script-1-7sr2b&#xA;&#xA; pod: test-comp-jnrw-on-pull-request-p8rhm-sast-unicode-check-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-sast-unicode-check-pod | container step-sast-unicode-check: &#xA;+ . /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=test-comp-jnrw&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: test-comp-jnrw&#39;&#xA;INFO: The PROJECT_NAME used is: test-comp-jnrw&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;+ SCAN_PROP=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58&#xA;+ FUC_EXIT_CODE=0&#xA;+ declare -a ALL_TARGETS&#xA;+ OLD_IFS=&#39; &#x9;&#xA;&#39;&#xA;+ IFS=,&#xA;+ for d in $TARGET_DIRS&#xA;+ ALL_TARGETS+=(&#34;${SOURCE_CODE_DIR}/source/${d}&#34;)&#xA;+ IFS=&#39; &#x9;&#xA;&#39;&#xA;+ LANG=en_US.utf8&#xA;+ find_unicode_control.py -p bidi -v -d -t /workspace/workspace/source/.&#xA;+ [[ 0 -ne 0 ]]&#xA;+ sed -i raw_sast_unicode_check_out.txt -E -e &#39;s|(.*:[0-9]+)(.*)|\1: warning:\2|&#39; -e &#39;s|^|Error: UNICONTROL_WARNING:\n|&#39;&#xA;+ CSGERP_OPTS=(--mode=json --remove-duplicates --embed-context=3 --set-scan-prop=&#34;${SCAN_PROP}&#34; --strip-path-prefix=&#34;${SOURCE_CODE_DIR}&#34;/source/)&#xA;+ csgrep --mode=json --remove-duplicates --embed-context=3 --set-scan-prop=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58 --strip-path-prefix=/workspace/workspace/source/ raw_sast_unicode_check_out.txt&#xA;+ csgrep --mode=evtstat processed_sast_unicode_check_out.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;+ mv processed_sast_unicode_check_out.json sast_unicode_check_out.json&#xA;+ csgrep --mode=sarif sast_unicode_check_out.json&#xA;+ [[ 0 -eq 0 ]]&#xA;+ note=&#39;Task sast-unicode-check success: No finding was detected&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task sast-unicode-check success: No finding was detected&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task sast-unicode-check success: No finding was detected&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-06T07:07:19+00:00 --arg result SUCCESS --arg note &#39;Task sast-unicode-check success: No finding was detected&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:07:19+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:07:19+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ ERROR_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:07:19+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:07:19+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:07:19+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: test-comp-jnrw-on-pull-request-p8rhm-sast-unicode-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745 sast_unicode_check_out.sarif:application/sarif+json&#xA;Preparing sast_unicode_check_out.sarif&#xA;Uploading 0e9806f310b4 sast_unicode_check_out.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploaded  0e9806f310b4 sast_unicode_check_out.sarif&#xA;Uploading e963d3f9112e application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  e963d3f9112e application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-jnrw:on-pr-2d475b7ced7f2f9adb74a83b290655cff6ef2c07@sha256:37f25d7a43c381e79a2e46fe641d411d2d056ae66ef3382fda09340f833c5745&#xA;Digest: sha256:e963d3f9112e08668cecc6a59c89913169af0d2bd549a6773ec4546aed1c0a8c&#xA;No excluded-findings.json exists. Skipping upload.&#xA;New PipelineRun test-comp-jnrw-on-pull-request-m8thq found after retrigger for component build-e2e-fnei/test-comp-jnrw&#xA;PipelineRun test-comp-jnrw-on-pull-request-m8thq found for Component build-e2e-fnei/test-comp-jnrw&#xA;PipelineRun test-comp-jnrw-on-pull-request-m8thq reason: ResolvingTaskRef&#xA;PipelineRun test-comp-jnrw-on-pull-request-m8thq reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-m8thq reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-m8thq reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-m8thq reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-m8thq reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-m8thq reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-m8thq reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-m8thq reason: Running&#xA;PipelineRun test-comp-jnrw-on-pull-request-m8thq reason: Completed&#xA;&lt; Exit [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:356 @ 05/06/26 07:16:03.407 (11m16.303s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:03.407&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:03.407 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="5.092225523">
              <system-err>&gt; Enter [It] should push Dockerfile to registry - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:366 @ 05/06/26 07:16:03.408&#xA;&lt; Exit [It] should push Dockerfile to registry - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:366 @ 05/06/26 07:16:08.5 (5.092s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:08.5&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:08.5 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.000497684">
              <skipped message="skipped - floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic"></skipped>
              <system-err>&gt; Enter [It] floating tags are created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:378 @ 05/06/26 07:16:08.501&#xA;[SKIPPED] floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:380 @ 05/06/26 07:16:08.501&#xA;&lt; Exit [It] floating tags are created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:378 @ 05/06/26 07:16:08.501 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:08.501&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:08.501 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.304225937">
              <system-err>&gt; Enter [It] image manifest mediaType is correct - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:395 @ 05/06/26 07:16:08.502&#xA;&lt; Exit [It] image manifest mediaType is correct - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:395 @ 05/06/26 07:16:08.806 (304ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:08.806&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:08.806 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.01331167">
              <skipped message="skipped - Skipping source image check since it is not enabled in the pipeline"></skipped>
              <system-err>&gt; Enter [It] check for source images if enabled in pipeline - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:420 @ 05/06/26 07:16:08.806&#xA;Source build is enabled: false&#xA;[SKIPPED] Skipping source image check since it is not enabled in the pipeline&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:440 @ 05/06/26 07:16:08.819&#xA;&lt; Exit [It] check for source images if enabled in pipeline - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:420 @ 05/06/26 07:16:08.819 (13ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:08.82&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:08.82 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="0.219471042">
              <system-err>&gt; Enter [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:477 @ 05/06/26 07:16:08.82&#xA;&lt; Exit [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:477 @ 05/06/26 07:16:08.924 (104ms)&#xA;&gt; Enter [It] should have Pipeline Records - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:498 @ 05/06/26 07:16:08.925&#xA;records for PipelineRun test-comp-jnrw-on-pull-request-m8thq:&#xA;&amp;{[{build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/aef78efb-573d-4ab3-b9de-2e8ab06ee422 0f9ee3fc-1b56-4b84-94e6-ba0d6316a964 0f9ee3fc-1b56-4b84-94e6-ba0d6316a964} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/9e18e7de-9d52-43f7-a323-ebc2330d5310 153cbcf4-8f9d-444f-b5f5-98a5355aacae 153cbcf4-8f9d-444f-b5f5-98a5355aacae} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/a84e7778-b071-4fca-9f64-b7a0ad2f797e 16a71161-edaf-436f-9937-dd61df47a97e 16a71161-edaf-436f-9937-dd61df47a97e} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/622bbb20-2f8a-4576-bfa5-fae1194da964 300fb672-3dd6-4b25-bbca-d4cbd50388ef 300fb672-3dd6-4b25-bbca-d4cbd50388ef} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/9d292885-3907-4ef8-ada2-6b56360481cd 319604e2-31f2-4f52-9eed-651b50769c32 319604e2-31f2-4f52-9eed-651b50769c32} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/1f88bd1d-2f28-440e-945d-fc8b6302a766 39b69093-8742-4466-85ae-149eb7fd2571 39b69093-8742-4466-85ae-149eb7fd2571} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/5d6b7cfc-4348-4f68-9837-d062161e861f 4fc116d2-c41f-448f-8d08-8db06a91cf61 4fc116d2-c41f-448f-8d08-8db06a91cf61} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/5fc1d8d4-42dc-4a18-ae72-93499631ca38 70323961-3ff4-4cfb-9d96-427a43e55efb 70323961-3ff4-4cfb-9d96-427a43e55efb} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/bfd1c40e-7efd-4e69-a574-0042eb8a909f 872489de-de45-4ad8-baa6-7ebf1cb025fc 872489de-de45-4ad8-baa6-7ebf1cb025fc} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/0b27d26b-d6ac-4ffc-9250-91af8d403189 8ad9a57d-9d3d-4659-8197-a840f5917ec3 8ad9a57d-9d3d-4659-8197-a840f5917ec3} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/c9e3f5ba-4888-4be1-9d12-aea72ee58092 9bfde6c9-30e4-4689-87c9-28af13137e12 9bfde6c9-30e4-4689-87c9-28af13137e12} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/d3e6ecf7-d29a-4fb5-88cc-da7de370498b d13ce1d2-5882-49d7-ad0f-0311669c646f d13ce1d2-5882-49d7-ad0f-0311669c646f} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/a3f9f275-8b7f-4640-8d59-79b7609d51a3 d49b5857-68a4-4c95-b92a-493a18bd7e5e d49b5857-68a4-4c95-b92a-493a18bd7e5e} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/15df734d-5401-46c9-89fc-86a16e811970 d5c0a1d1-effc-4ef6-8a5a-75cb05d9f11b d5c0a1d1-effc-4ef6-8a5a-75cb05d9f11b} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/6c501c84-b871-4342-ae52-4183f65d5268 e3d88ffd-608b-4979-9506-5d9ee8c46a71 e3d88ffd-608b-4979-9506-5d9ee8c46a71} {build-e2e-fnei/results/09ed1f44-cc9f-4396-a6ae-029406d246f1/records/09ed1f44-cc9f-4396-a6ae-029406d246f1 e9efd2e4-4bec-463e-8ff4-b2aae6991b0d e9efd2e4-4bec-463e-8ff4-b2aae6991b0d}]}&#xA;&lt; Exit [It] should have Pipeline Records - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:498 @ 05/06/26 07:16:09.039 (114ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:09.039&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:09.04 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.245125473">
              <system-err>&gt; Enter [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:540 @ 05/06/26 07:16:09.041&#xA;&lt; Exit [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:540 @ 05/06/26 07:16:09.285 (245ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:09.286&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:09.286 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.008934245">
              <skipped message="skipped - Hermetic build is not enabled, skipping the test"></skipped>
              <system-err>&gt; Enter [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:550 @ 05/06/26 07:16:09.287&#xA;&lt; Exit [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:550 @ 05/06/26 07:16:09.295 (8ms)&#xA;&gt; Enter [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:661 @ 05/06/26 07:16:09.295&#xA;[SKIPPED] Hermetic build is not enabled, skipping the test&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:663 @ 05/06/26 07:16:09.295&#xA;&lt; Exit [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:661 @ 05/06/26 07:16:09.295 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:09.295&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:16:09.295 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="175.013566638">
              <system-err>&gt; Enter [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:356 @ 05/06/26 07:16:09.296&#xA;PipelineRun test-comp-ewin-on-pull-request-gs2jz found for Component build-e2e-fnei/test-comp-ewin&#xA;PipelineRun test-comp-ewin-on-pull-request-gs2jz reason: Failed&#xA;attempt 1/3: PipelineRun &#34;test-comp-ewin-on-pull-request-gs2jz&#34; failed: &#xA; pod: test-comp-ewin-on-pull-requ470f7c58152749b86d52657e1a9b0065-pod | init container: prepare&#xA;2026/05/06 07:06:34 Entrypoint initialization&#xA;&#xA; pod: test-comp-ewin-on-pull-requ470f7c58152749b86d52657e1a9b0065-pod | init container: place-scripts&#xA;2026/05/06 07:06:41 Decoded script /tekton/scripts/script-0-5c8v6&#xA;2026/05/06 07:06:41 Decoded script /tekton/scripts/script-1-sfm95&#xA;2026/05/06 07:06:41 Decoded script /tekton/scripts/script-2-gknqx&#xA;2026/05/06 07:06:41 Decoded script /tekton/scripts/script-3-gfm49&#xA;2026/05/06 07:06:41 Decoded script /tekton/scripts/script-4-mznfw&#xA;2026/05/06 07:06:41 Decoded script /tekton/scripts/script-5-9wc95&#xA;&#xA;pod: test-comp-ewin-on-pull-requ470f7c58152749b86d52657e1a9b0065-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#xA;The media type of the OCI artifact is application/vnd.oci.image.manifest.v1+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: test-comp-ewin-on-pull-requ470f7c58152749b86d52657e1a9b0065-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: test-comp-ewin-on-pull-requ470f7c58152749b86d52657e1a9b0065-pod | container step-set-skip-for-bundles: &#xA;2026/05/06 07:07:16 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: test-comp-ewin-on-pull-requ470f7c58152749b86d52657e1a9b0065-pod | container step-app-check: &#xA;time=&#34;2026-05-06T07:07:17Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.17.2 &lt;commit: eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&gt;&#34;&#xA;time=&#34;2026-05-06T07:07:17Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc for platform amd64&#34;&#xA;time=&#34;2026-05-06T07:07:17Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#34;&#xA;time=&#34;2026-05-06T07:07:21Z&#34; level=error msg=&#34;could not get rpm list, continuing without it&#34; error=&#34;could not find rpm db/packages: stat /tmp/preflight-3020478813/fs/usr/lib/sysimage/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-3020478813/fs/var/lib/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-3020478813/fs/var/lib/rpm/Packages: no such file or directory&#34;&#xA;time=&#34;2026-05-06T07:07:21Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-3020478813/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-05-06T07:07:21Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-05-06T07:07:21Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-05-06T07:07:21Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-05-06T07:07:21Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages err=&#34;unable to get a list of all packages in the image: could not get rpm list: could not find rpm db/packages: stat /tmp/preflight-3020478813/fs/usr/lib/sysimage/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-3020478813/fs/var/lib/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-3020478813/fs/var/lib/rpm/Packages: no such file or directory&#34; result=ERROR&#xA;time=&#34;2026-05-06T07:07:21Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=FAILED&#xA;time=&#34;2026-05-06T07:07:21Z&#34; level=info msg=&#34;detected empty USER. Presumed to be running as root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-06T07:07:21Z&#34; level=info msg=&#34;USER value must be provided and be a non-root value for this check to pass&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-06T07:07:21Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=FAILED&#xA;time=&#34;2026-05-06T07:07:25Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-05-06T07:07:25Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=FAILED&#xA;time=&#34;2026-05-06T07:07:25Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc will be paired with digest sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.17.2&#34;,&#xA;        &#34;commit&#34;: &#34;eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 3674,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;,&#xA;                &#34;help&#34;: &#34;Check HasRequiredLabel encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Add the following labels to your Dockerfile or Containerfile: name, vendor, version, release, summary, description, maintainer.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;,&#xA;                &#34;help&#34;: &#34;Check RunAsNonRoot encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Indicate a specific USER in the dockerfile or containerfile&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 145,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;,&#xA;                &#34;help&#34;: &#34;Check BasedOnUbi encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Change the FROM directive in your Dockerfile or Containerfile, for the latest list of images and details refer to: https://catalog.redhat.com/software/base-images&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;,&#xA;                &#34;help&#34;: &#34;Check HasNoProhibitedPackages encountered an error. Please review the preflight.log file for more information.&#34;&#xA;            }&#xA;        ]&#xA;    }&#xA;}&#xA;time=&#34;2026-05-06T07:07:25Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;&#xA;pod: test-comp-ewin-on-pull-requ470f7c58152749b86d52657e1a9b0065-pod | container step-app-set-outcome: &#xA;{&#34;result&#34;:&#34;ERROR&#34;,&#34;timestamp&#34;:&#34;1778051245&#34;,&#34;note&#34;:&#34;Task preflight is a ERROR: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:3,&#34;failures&#34;:4,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#xA;&#xA;pod: test-comp-ewin-on-pull-requ470f7c58152749b86d52657e1a9b0065-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;ERROR&#34;,&#34;timestamp&#34;:&#34;1778051245&#34;,&#34;note&#34;:&#34;Task preflight is a ERROR: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:3,&#34;failures&#34;:4,&#34;warnings&#34;:0}&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-apply-tags-pod | init container: prepare&#xA;2026/05/06 07:06:34 Entrypoint initialization&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-apply-tags-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-05-06T07:06:43Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#34;&#xA;time=&#34;2026-05-06T07:06:43Z&#34; level=info msg=&#34;[param] digest: sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#34;&#xA;time=&#34;2026-05-06T07:06:43Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-05-06T07:06:44Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-build-container-pod | init container: prepare&#xA;2026/05/06 07:04:35 Entrypoint initialization&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-build-container-pod | init container: place-scripts&#xA;2026/05/06 07:04:35 Decoded script /tekton/scripts/script-1-hqdjj&#xA;2026/05/06 07:04:35 Decoded script /tekton/scripts/script-2-xxn8k&#xA;2026/05/06 07:04:35 Decoded script /tekton/scripts/script-3-2phdb&#xA;2026/05/06 07:04:35 Decoded script /tekton/scripts/script-4-mjw8t&#xA;2026/05/06 07:04:35 Decoded script /tekton/scripts/script-5-jjj4x&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-build-container-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.pbXXuX/auth-5acFGY.json quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:6a47c6bf7dc3eabf4e15441f8a3fdec1e0c421c5ed5ef9b3976fc7df590545ee --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:6a47c6bf7dc3eabf4e15441f8a3fdec1e0c421c5ed5ef9b3976fc7df590545ee to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-build-container-pod | container step-build: &#xA;[2026-05-06T07:05:08,866215969+00:00] Validate context path&#xA;[2026-05-06T07:05:08,869425359+00:00] Update CA trust&#xA;[2026-05-06T07:05:08,870507100+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-06T07:05:11,014691449+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-06T07:05:11,020148590+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-06T07:05:11,068769540+00:00] Setup prefetched&#xA;Trying to pull quay.io/devfile/python:slim...&#xA;Getting image source signatures&#xA;Copying blob sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#xA;Copying blob sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#xA;Copying blob sha256:30fb943195a7f7cee90a9c67461c338d1d76a7004d2f94792b774ef71d875a02&#xA;Copying blob sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#xA;Copying blob sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#xA;Copying config sha256:04f51101c1b979fb8a45a5332bfa8ed2c60f613ea396c3edd40f3d91702b24ef&#xA;Writing manifest to image destination&#xA;[2026-05-06T07:05:38,894268323+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;6h&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-06T07:05:11Z&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-06T07:05:11Z&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;&#xA;}&#xA;[2026-05-06T07:05:38,950657773+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-06T07:05:38,953944771+00:00] Add secrets&#xA;[2026-05-06T07:05:38,961497939+00:00] Run buildah build&#xA;[2026-05-06T07:05:38,962544036+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=7ef594af8804f542e0ce08ca6eb1b4cc840deffc --label org.opencontainers.image.revision=7ef594af8804f542e0ce08ca6eb1b4cc840deffc --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --label quay.expires-after=6h --label build-date=2026-05-06T07:05:11Z --label org.opencontainers.image.created=2026-05-06T07:05:11Z --annotation org.opencontainers.image.revision=7ef594af8804f542e0ce08ca6eb1b4cc840deffc --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --annotation org.opencontainers.image.created=2026-05-06T07:05:11Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.Vo1LaL -t quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc . &#xA;STEP 1/11: FROM quay.io/devfile/python:slim&#xA;STEP 2/11: EXPOSE 8081/tcp&#xA;STEP 3/11: ENV FLASK_PORT=8081&#xA;STEP 4/11: WORKDIR /projects&#xA;STEP 5/11: COPY requirements.txt .&#xA;STEP 6/11: RUN pip install -r requirements.txt&#xA;Collecting Flask==2.1.0&#xA;  Downloading Flask-2.1.0-py3-none-any.whl (95 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 95.2/95.2 kB 18.6 MB/s eta 0:00:00&#xA;Collecting Werkzeug&gt;=2.0&#xA;  Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 226.5/226.5 kB 79.4 MB/s eta 0:00:00&#xA;Collecting Jinja2&gt;=3.0&#xA;  Downloading jinja2-3.1.6-py3-none-any.whl (134 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 134.9/134.9 kB 115.9 MB/s eta 0:00:00&#xA;Collecting itsdangerous&gt;=2.0&#xA;  Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB)&#xA;Collecting click&gt;=8.0&#xA;  Downloading click-8.3.3-py3-none-any.whl (110 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 110.5/110.5 kB 118.9 MB/s eta 0:00:00&#xA;Collecting MarkupSafe&gt;=2.0&#xA;  Downloading markupsafe-3.0.3-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (22 kB)&#xA;Installing collected packages: MarkupSafe, itsdangerous, click, Werkzeug, Jinja2, Flask&#xA;Successfully installed Flask-2.1.0 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 click-8.3.3 itsdangerous-2.2.0&#xA;WARNING: Running pip as the &#39;root&#39; user can result in broken permissions and conflicting behaviour with the system package manager. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv&#xA;&#xA;[notice] A new release of pip available: 22.3.1 -&gt; 26.1.1&#xA;[notice] To update, run: pip install --upgrade pip&#xA;STEP 7/11: COPY . .&#xA;STEP 8/11: CMD [ &#34;python&#34;, &#34;./app.py&#34; ]&#xA;STEP 9/11: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 10/11: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 11/11: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#34; &#34;org.opencontainers.image.revision&#34;=&#34;7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34; &#34;quay.expires-after&#34;=&#34;6h&#34; &#34;build-date&#34;=&#34;2026-05-06T07:05:11Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-06T07:05:11Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#xA;--&gt; ff5da7b47d53&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#xA;ff5da7b47d53d26efde6c8211fd3976b78ffa55d97bfc974df0d7913d373513f&#xA;[2026-05-06T07:05:42,985974559+00:00] Unsetting proxy&#xA;[2026-05-06T07:05:42,987229326+00:00] Add metadata&#xA;Recording base image digests used&#xA;quay.io/devfile/python:slim quay.io/devfile/python:slim@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;Getting image source signatures&#xA;Copying blob sha256:758ca54a0af8a188d7d5e1757abf2aced2860888baee8f3941c91970d735a8b4&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying config sha256:ff5da7b47d53d26efde6c8211fd3976b78ffa55d97bfc974df0d7913d373513f&#xA;Writing manifest to image destination&#xA;[2026-05-06T07:05:46,411012707+00:00] End build&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-build-container-pod | container step-push: &#xA;[2026-05-06T07:05:46,972187917+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-06T07:05:49,033131291+00:00] Convert image&#xA;[2026-05-06T07:05:49,034205851+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:test-comp-ewin-on-pull-request-gs2jz-build-container&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc docker://quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:test-comp-ewin-on-pull-request-gs2jz-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:758ca54a0af8a188d7d5e1757abf2aced2860888baee8f3941c91970d735a8b4&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying config sha256:ff5da7b47d53d26efde6c8211fd3976b78ffa55d97bfc974df0d7913d373513f&#xA;Writing manifest to image destination&#xA;[2026-05-06T07:05:53,926997473+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc docker://quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#xA;Getting image source signatures&#xA;Copying blob sha256:758ca54a0af8a188d7d5e1757abf2aced2860888baee8f3941c91970d735a8b4&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying config sha256:ff5da7b47d53d26efde6c8211fd3976b78ffa55d97bfc974df0d7913d373513f&#xA;Writing manifest to image destination&#xA;sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-05-06T07:05:54,746706547+00:00] End push&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-build-container-pod | container step-sbom-syft-generate: &#xA;[2026-05-06T07:05:54,913669590+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-05-06T07:06:00,124512590+00:00] End sbom-syft-generate&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-build-container-pod | container step-prepare-sboms: &#xA;[2026-05-06T07:06:00,461851970+00:00] Prepare SBOM&#xA;[2026-05-06T07:06:00,465794709+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-05-06 07:06:01,607 [INFO] mobster.log: Logging level set to 20&#xA;2026-05-06 07:06:01,686 [INFO] mobster.oci: Fetching manifest for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;2026-05-06 07:06:02,233 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:02,433 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:02,877 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:03,139 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:03,582 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:03,822 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:04,238 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:04,440 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:04,440 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-05-06 07:06:04,440 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-05-06 07:06:04,441 [INFO] mobster.log: Contextual workflow completed in 2.77s&#xA;2026-05-06 07:06:04,463 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-05-06T07:06:04,530058277+00:00] End prepare-sboms&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-build-container-pod | container step-upload-sbom: &#xA;[2026-05-06T07:06:04,542581085+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc@sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3] to [quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:sha256-11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:27c3cf3c13b304c064ffb9fadc50435ecb321481b73c698df1db09d7e4c3b7cd&#xA;[2026-05-06T07:06:08,460607848+00:00] End upload-sbom&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-build-image-index-pod | init container: prepare&#xA;2026/05/06 07:06:10 Entrypoint initialization&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-build-image-index-pod | init container: place-scripts&#xA;2026/05/06 07:06:11 Decoded script /tekton/scripts/script-0-cjlm2&#xA;2026/05/06 07:06:11 Decoded script /tekton/scripts/script-1-s949g&#xA;2026/05/06 07:06:11 Decoded script /tekton/scripts/script-2-fd22f&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-build-image-index-pod | container step-build: &#xA;[2026-05-06T07:06:24,788532939+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Running konflux-build-cli&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc@sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3]&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] buildah-format: oci&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] additional-tags: [test-comp-ewin-on-pull-request-gs2jz-build-image-index]&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#34;&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;buildah [stdout] 2abf831442d8b584db0bfaa8bbd7abd0c99b69908cbfe6e5574e88e4c4ca683e&#34; logger=CliExecutor&#xA;time=&#34;2026-05-06T07:06:26Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;{&#34;image_digest&#34;:&#34;sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#34;}&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-build-image-index-pod | container step-create-sbom: &#xA;The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-build-image-index-pod | container step-upload-sbom: &#xA;[2026-05-06T07:06:28,079654302+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-clair-scan-pod | init container: prepare&#xA;2026/05/06 07:06:33 Entrypoint initialization&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-clair-scan-pod | init container: place-scripts&#xA;2026/05/06 07:06:45 Decoded script /tekton/scripts/script-0-bmwz8&#xA;2026/05/06 07:06:45 Decoded script /tekton/scripts/script-1-f2s5s&#xA;2026/05/06 07:06:45 Decoded script /tekton/scripts/script-2-tw8gd&#xA;2026/05/06 07:06:45 Decoded script /tekton/scripts/script-3-nwntj&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-clair-scan-pod | container step-get-image-manifests: &#xA;Inspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3.&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-clair-scan-pod | container step-get-vulnerabilities: &#xA;Running clair-action on amd64 image manifest...&#xA;�[90m2026-05-06T07:10:23Z�[0m �[32mINF�[0m �[1mmatchers created�[0m �[36mcomponent=�[0mlibvuln/New �[36mmatchers=�[0m[{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/gobin&#34;,&#34;name&#34;:&#34;gobin&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/java&#34;,&#34;name&#34;:&#34;java-maven&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu&#34;,&#34;name&#34;:&#34;ubuntu-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel&#34;,&#34;name&#34;:&#34;rhel&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/aws&#34;,&#34;name&#34;:&#34;aws-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/python&#34;,&#34;name&#34;:&#34;python&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ruby&#34;,&#34;name&#34;:&#34;ruby-gem&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/suse&#34;,&#34;name&#34;:&#34;suse&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/alpine&#34;,&#34;name&#34;:&#34;alpine-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/debian&#34;,&#34;name&#34;:&#34;debian-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/photon&#34;,&#34;name&#34;:&#34;photon&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc&#34;,&#34;name&#34;:&#34;rhel-container-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/oracle&#34;,&#34;name&#34;:&#34;oracle&#34;}]&#xA;�[90m2026-05-06T07:10:23Z�[0m �[32mINF�[0m �[1mlibvuln initialized�[0m �[36mcomponent=�[0mlibvuln/New&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mregistered configured scanners�[0m �[36mcomponent=�[0mlibindex/New&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mNewLayerScanner: constructing a new layer-scanner�[0m �[36mcomponent=�[0mindexer.NewLayerScanner&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mindex request start�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mstarting scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mmanifest to be scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3 �[36mstate=�[0mCheckManifest&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mlayers fetch start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mlayers fetch success�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mlayers fetch done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mlayers scan start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3 �[36mstate=�[0mScanLayers&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mlayers scan done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3 �[36mstate=�[0mScanLayers&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mstarting index manifest�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3 �[36mstate=�[0mIndexManifest&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mfinishing scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mmanifest successfully scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-05-06T07:10:26Z�[0m �[32mINF�[0m �[1mindex request done�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#xA;{&#xA;  &#34;manifest_hash&#34;: &#34;sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#34;,&#xA;  &#34;packages&#34;: {&#xA;    &#34;+GDQTbek1zYvATiVR/wBCA==&#34;: {&#xA;      &#34;id&#34;: &#34;+GDQTbek1zYvATiVR/wBCA==&#34;,&#xA;      &#34;name&#34;: &#34;gzip&#34;,&#xA;      &#34;version&#34;: &#34;1.10-4+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gzip&#34;,&#xA;        &#34;version&#34;: &#34;1.10-4+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+aaqENN9U+Kuxcb1tQ8Utg==&#34;: {&#xA;      &#34;id&#34;: &#34;+aaqENN9U+Kuxcb1tQ8Utg==&#34;,&#xA;      &#34;name&#34;: &#34;netbase&#34;,&#xA;      &#34;version&#34;: &#34;6.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;netbase&#34;,&#xA;        &#34;version&#34;: &#34;6.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;: {&#xA;      &#34;id&#34;: &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;,&#xA;      &#34;name&#34;: &#34;libcom-err2&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;05vApGRmP6ko1S0ji87IIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;05vApGRmP6ko1S0ji87IIQ==&#34;,&#xA;      &#34;name&#34;: &#34;libunistring2&#34;,&#xA;      &#34;version&#34;: &#34;0.9.10-4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libunistring&#34;,&#xA;        &#34;version&#34;: &#34;0.9.10-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;: {&#xA;      &#34;id&#34;: &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;,&#xA;      &#34;name&#34;: &#34;libzstd1&#34;,&#xA;      &#34;version&#34;: &#34;1.4.8+dfsg-2.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libzstd&#34;,&#xA;        &#34;version&#34;: &#34;1.4.8+dfsg-2.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1jyJPCL93kiEbfmNKeyz3g==&#34;: {&#xA;      &#34;id&#34;: &#34;1jyJPCL93kiEbfmNKeyz3g==&#34;,&#xA;      &#34;name&#34;: &#34;jinja2&#34;,&#xA;      &#34;version&#34;: &#34;3.1.6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.3.1.6.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2MObxiEVNllmUEzdVZM5qw==&#34;: {&#xA;      &#34;id&#34;: &#34;2MObxiEVNllmUEzdVZM5qw==&#34;,&#xA;      &#34;name&#34;: &#34;apt&#34;,&#xA;      &#34;version&#34;: &#34;2.2.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;apt&#34;,&#xA;        &#34;version&#34;: &#34;2.2.4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;: {&#xA;      &#34;id&#34;: &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;,&#xA;      &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;      &#34;version&#34;: &#34;1.8.7-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;1.8.7-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4672uZtn8TnHDEzWVyhfjw==&#34;: {&#xA;      &#34;id&#34;: &#34;4672uZtn8TnHDEzWVyhfjw==&#34;,&#xA;      &#34;name&#34;: &#34;base-files&#34;,&#xA;      &#34;version&#34;: &#34;11.1+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;base-files&#34;,&#xA;        &#34;version&#34;: &#34;11.1+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;: {&#xA;      &#34;id&#34;: &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5zxxTA220k9gPCegfDHkag==&#34;: {&#xA;      &#34;id&#34;: &#34;5zxxTA220k9gPCegfDHkag==&#34;,&#xA;      &#34;name&#34;: &#34;libgmp10&#34;,&#xA;      &#34;version&#34;: &#34;2:6.2.1+dfsg-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gmp&#34;,&#xA;        &#34;version&#34;: &#34;2:6.2.1+dfsg-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;,&#xA;      &#34;name&#34;: &#34;libexpat1&#34;,&#xA;      &#34;version&#34;: &#34;2.2.10-2+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;2.2.10-2+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;,&#xA;      &#34;name&#34;: &#34;libudev1&#34;,&#xA;      &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9snKXrH4dQy2IXHQ01Lg0A==&#34;: {&#xA;      &#34;id&#34;: &#34;9snKXrH4dQy2IXHQ01Lg0A==&#34;,&#xA;      &#34;name&#34;: &#34;libaudit1&#34;,&#xA;      &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;audit&#34;,&#xA;        &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Akbft1KN+9FKNhh1tM25eA==&#34;: {&#xA;      &#34;id&#34;: &#34;Akbft1KN+9FKNhh1tM25eA==&#34;,&#xA;      &#34;name&#34;: &#34;mount&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;: {&#xA;      &#34;id&#34;: &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;,&#xA;      &#34;name&#34;: &#34;libblkid1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CBzoMmlXBcyP54HOnauO0g==&#34;: {&#xA;      &#34;id&#34;: &#34;CBzoMmlXBcyP54HOnauO0g==&#34;,&#xA;      &#34;name&#34;: &#34;libpam-runtime&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CpILSbg3p6D7Gsp8sCW1Rg==&#34;: {&#xA;      &#34;id&#34;: &#34;CpILSbg3p6D7Gsp8sCW1Rg==&#34;,&#xA;      &#34;name&#34;: &#34;libsemanage1&#34;,&#xA;      &#34;version&#34;: &#34;3.1-1+b2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsemanage&#34;,&#xA;        &#34;version&#34;: &#34;3.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;,&#xA;      &#34;name&#34;: &#34;libc6&#34;,&#xA;      &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DY5Co0gkGtbgwDlkjfJLWA==&#34;: {&#xA;      &#34;id&#34;: &#34;DY5Co0gkGtbgwDlkjfJLWA==&#34;,&#xA;      &#34;name&#34;: &#34;markupsafe&#34;,&#xA;      &#34;version&#34;: &#34;3.0.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.3.0.3.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;: {&#xA;      &#34;id&#34;: &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;,&#xA;      &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EVGnnBfWyiVHhoIR4vEpgg==&#34;: {&#xA;      &#34;id&#34;: &#34;EVGnnBfWyiVHhoIR4vEpgg==&#34;,&#xA;      &#34;name&#34;: &#34;libbz2-1.0&#34;,&#xA;      &#34;version&#34;: &#34;1.0.8-4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2&#34;,&#xA;        &#34;version&#34;: &#34;1.0.8-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;: {&#xA;      &#34;id&#34;: &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;,&#xA;      &#34;name&#34;: &#34;libk5crypto3&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;: {&#xA;      &#34;id&#34;: &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;,&#xA;      &#34;name&#34;: &#34;login&#34;,&#xA;      &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FOAAB3KiNsLyi03hQsjRTA==&#34;: {&#xA;      &#34;id&#34;: &#34;FOAAB3KiNsLyi03hQsjRTA==&#34;,&#xA;      &#34;name&#34;: &#34;libcrypt1&#34;,&#xA;      &#34;version&#34;: &#34;1:4.4.18-4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;        &#34;version&#34;: &#34;1:4.4.18-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FrUy4mOCaHm5aGT53as3JQ==&#34;: {&#xA;      &#34;id&#34;: &#34;FrUy4mOCaHm5aGT53as3JQ==&#34;,&#xA;      &#34;name&#34;: &#34;diffutils&#34;,&#xA;      &#34;version&#34;: &#34;1:3.7-5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;diffutils&#34;,&#xA;        &#34;version&#34;: &#34;1:3.7-5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;,&#xA;      &#34;name&#34;: &#34;libssl1.1&#34;,&#xA;      &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GGaavnLgXX31qx9chfhdOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GGaavnLgXX31qx9chfhdOQ==&#34;,&#xA;      &#34;name&#34;: &#34;libaudit-common&#34;,&#xA;      &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;audit&#34;,&#xA;        &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;: {&#xA;      &#34;id&#34;: &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;,&#xA;      &#34;name&#34;: &#34;libpcre2-8-0&#34;,&#xA;      &#34;version&#34;: &#34;10.36-2+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.36-2+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HFwGHerHwgvY8vkjr3x1Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;HFwGHerHwgvY8vkjr3x1Pg==&#34;,&#xA;      &#34;name&#34;: &#34;itsdangerous&#34;,&#xA;      &#34;version&#34;: &#34;2.2.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.2.2.0.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;: {&#xA;      &#34;id&#34;: &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;,&#xA;      &#34;name&#34;: &#34;bsdutils&#34;,&#xA;      &#34;version&#34;: &#34;1:2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IiJKm8T4olfm6rhuKayFOw==&#34;: {&#xA;      &#34;id&#34;: &#34;IiJKm8T4olfm6rhuKayFOw==&#34;,&#xA;      &#34;name&#34;: &#34;lsb-base&#34;,&#xA;      &#34;version&#34;: &#34;11.1.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lsb&#34;,&#xA;        &#34;version&#34;: &#34;11.1.0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Jg2vDvx1JxyPDIrUzzR9NQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Jg2vDvx1JxyPDIrUzzR9NQ==&#34;,&#xA;      &#34;name&#34;: &#34;grep&#34;,&#xA;      &#34;version&#34;: &#34;3.6-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;grep&#34;,&#xA;        &#34;version&#34;: &#34;3.6-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;: {&#xA;      &#34;id&#34;: &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;,&#xA;      &#34;name&#34;: &#34;zlib1g&#34;,&#xA;      &#34;version&#34;: &#34;1:1.2.11.dfsg-2+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;1:1.2.11.dfsg-2+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LVHVhWoZgWwWvOspyUwb1w==&#34;: {&#xA;      &#34;id&#34;: &#34;LVHVhWoZgWwWvOspyUwb1w==&#34;,&#xA;      &#34;name&#34;: &#34;libreadline8&#34;,&#xA;      &#34;version&#34;: &#34;8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;readline&#34;,&#xA;        &#34;version&#34;: &#34;8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;,&#xA;      &#34;name&#34;: &#34;passwd&#34;,&#xA;      &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NA4G2YrIZ73fsX7d5r5rGw==&#34;: {&#xA;      &#34;id&#34;: &#34;NA4G2YrIZ73fsX7d5r5rGw==&#34;,&#xA;      &#34;name&#34;: &#34;debconf&#34;,&#xA;      &#34;version&#34;: &#34;1.5.77&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;debconf&#34;,&#xA;        &#34;version&#34;: &#34;1.5.77&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;: {&#xA;      &#34;id&#34;: &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;,&#xA;      &#34;name&#34;: &#34;libkrb5support0&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OgJFdUXRfF1Ls8u1+eOivw==&#34;: {&#xA;      &#34;id&#34;: &#34;OgJFdUXRfF1Ls8u1+eOivw==&#34;,&#xA;      &#34;name&#34;: &#34;libgpg-error0&#34;,&#xA;      &#34;version&#34;: &#34;1.38-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;        &#34;version&#34;: &#34;1.38-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PaaRbD/FkW3JARtSKQgRcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;PaaRbD/FkW3JARtSKQgRcQ==&#34;,&#xA;      &#34;name&#34;: &#34;libattr1&#34;,&#xA;      &#34;version&#34;: &#34;1:2.4.48-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;attr&#34;,&#xA;        &#34;version&#34;: &#34;1:2.4.48-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PgPY5hWnihXRN45byvzY0g==&#34;: {&#xA;      &#34;id&#34;: &#34;PgPY5hWnihXRN45byvzY0g==&#34;,&#xA;      &#34;name&#34;: &#34;libncursesw6&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;: {&#xA;      &#34;id&#34;: &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsepol1&#34;,&#xA;      &#34;version&#34;: &#34;3.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;3.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;: {&#xA;      &#34;id&#34;: &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;,&#xA;      &#34;name&#34;: &#34;setuptools&#34;,&#xA;      &#34;version&#34;: &#34;65.5.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.65.5.0.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RVoqRXLcdKU5LYfyLKdi3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;RVoqRXLcdKU5LYfyLKdi3Q==&#34;,&#xA;      &#34;name&#34;: &#34;click&#34;,&#xA;      &#34;version&#34;: &#34;8.3.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.8.3.3.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;: {&#xA;      &#34;id&#34;: &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;,&#xA;      &#34;name&#34;: &#34;dpkg&#34;,&#xA;      &#34;version&#34;: &#34;1.20.12&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dpkg&#34;,&#xA;        &#34;version&#34;: &#34;1.20.12&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RgdwX+VC70nXZ2E527PXaA==&#34;: {&#xA;      &#34;id&#34;: &#34;RgdwX+VC70nXZ2E527PXaA==&#34;,&#xA;      &#34;name&#34;: &#34;logsave&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SWnjL4fWu+WMpxhSCWLhZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SWnjL4fWu+WMpxhSCWLhZQ==&#34;,&#xA;      &#34;name&#34;: &#34;base-passwd&#34;,&#xA;      &#34;version&#34;: &#34;3.5.51&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;base-passwd&#34;,&#xA;        &#34;version&#34;: &#34;3.5.51&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;T5NuX1yinNyGoZNN2r9u4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;T5NuX1yinNyGoZNN2r9u4Q==&#34;,&#xA;      &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;      &#34;version&#34;: &#34;20210119&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;        &#34;version&#34;: &#34;20210119&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VVXsYlCxogg17Ti1iR03Mw==&#34;: {&#xA;      &#34;id&#34;: &#34;VVXsYlCxogg17Ti1iR03Mw==&#34;,&#xA;      &#34;name&#34;: &#34;libseccomp2&#34;,&#xA;      &#34;version&#34;: &#34;2.5.1-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libseccomp&#34;,&#xA;        &#34;version&#34;: &#34;2.5.1-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;: {&#xA;      &#34;id&#34;: &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;,&#xA;      &#34;name&#34;: &#34;gcc-9-base&#34;,&#xA;      &#34;version&#34;: &#34;9.3.0-22&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-9&#34;,&#xA;        &#34;version&#34;: &#34;9.3.0-22&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Wi4oa03apqVdR6okNeZiNA==&#34;: {&#xA;      &#34;id&#34;: &#34;Wi4oa03apqVdR6okNeZiNA==&#34;,&#xA;      &#34;name&#34;: &#34;libgnutls30&#34;,&#xA;      &#34;version&#34;: &#34;3.7.1-5+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;3.7.1-5+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZPlAztePXX+uFLVDX2lgNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZPlAztePXX+uFLVDX2lgNQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsemanage-common&#34;,&#xA;      &#34;version&#34;: &#34;3.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsemanage&#34;,&#xA;        &#34;version&#34;: &#34;3.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;,&#xA;      &#34;name&#34;: &#34;libmount1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;: {&#xA;      &#34;id&#34;: &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;,&#xA;      &#34;name&#34;: &#34;gcc-10-base&#34;,&#xA;      &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;: {&#xA;      &#34;id&#34;: &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;,&#xA;      &#34;name&#34;: &#34;coreutils&#34;,&#xA;      &#34;version&#34;: &#34;8.32-4+b1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;8.32-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bTSLWiizipO2axtmvXFuVg==&#34;: {&#xA;      &#34;id&#34;: &#34;bTSLWiizipO2axtmvXFuVg==&#34;,&#xA;      &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;      &#34;version&#34;: &#34;4.16.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;4.16.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;be3s5y0dx4bgsQboIoDduw==&#34;: {&#xA;      &#34;id&#34;: &#34;be3s5y0dx4bgsQboIoDduw==&#34;,&#xA;      &#34;name&#34;: &#34;libp11-kit0&#34;,&#xA;      &#34;version&#34;: &#34;0.23.22-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.23.22-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;,&#xA;      &#34;name&#34;: &#34;libext2fs2&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;: {&#xA;      &#34;id&#34;: &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;,&#xA;      &#34;name&#34;: &#34;libc-bin&#34;,&#xA;      &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dRfu6Up2F2Ze+gJ21oSeug==&#34;: {&#xA;      &#34;id&#34;: &#34;dRfu6Up2F2Ze+gJ21oSeug==&#34;,&#xA;      &#34;name&#34;: &#34;libgdbm6&#34;,&#xA;      &#34;version&#34;: &#34;1.19-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdbm&#34;,&#xA;        &#34;version&#34;: &#34;1.19-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;: {&#xA;      &#34;id&#34;: &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;,&#xA;      &#34;name&#34;: &#34;sysvinit-utils&#34;,&#xA;      &#34;version&#34;: &#34;2.96-7+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sysvinit&#34;,&#xA;        &#34;version&#34;: &#34;2.96-7+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dXglURzzdbLnOf14mab1Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;dXglURzzdbLnOf14mab1Hg==&#34;,&#xA;      &#34;name&#34;: &#34;tar&#34;,&#xA;      &#34;version&#34;: &#34;1.34+dfsg-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;1.34+dfsg-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dobmrwm7aq9puvFHwNgXxw==&#34;: {&#xA;      &#34;id&#34;: &#34;dobmrwm7aq9puvFHwNgXxw==&#34;,&#xA;      &#34;name&#34;: &#34;libstdc++6&#34;,&#xA;      &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;,&#xA;      &#34;name&#34;: &#34;libpam-modules-bin&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eF2QIdrTmJlWmjQTkhntow==&#34;: {&#xA;      &#34;id&#34;: &#34;eF2QIdrTmJlWmjQTkhntow==&#34;,&#xA;      &#34;name&#34;: &#34;wheel&#34;,&#xA;      &#34;version&#34;: &#34;0.38.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.0.38.4.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;: {&#xA;      &#34;id&#34;: &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;,&#xA;      &#34;name&#34;: &#34;libpam-modules&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;: {&#xA;      &#34;id&#34;: &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;,&#xA;      &#34;name&#34;: &#34;openssl&#34;,&#xA;      &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;: {&#xA;      &#34;id&#34;: &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;,&#xA;      &#34;name&#34;: &#34;bash&#34;,&#xA;      &#34;version&#34;: &#34;5.1-2+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;5.1-2+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fqwKjkzVNvsxh6040zt05g==&#34;: {&#xA;      &#34;id&#34;: &#34;fqwKjkzVNvsxh6040zt05g==&#34;,&#xA;      &#34;name&#34;: &#34;hostname&#34;,&#xA;      &#34;version&#34;: &#34;3.23&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;hostname&#34;,&#xA;        &#34;version&#34;: &#34;3.23&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fyM9Y65kt8cTfJv4LKF7bg==&#34;: {&#xA;      &#34;id&#34;: &#34;fyM9Y65kt8cTfJv4LKF7bg==&#34;,&#xA;      &#34;name&#34;: &#34;libcap-ng0&#34;,&#xA;      &#34;version&#34;: &#34;0.7.9-2.2+b1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;        &#34;version&#34;: &#34;0.7.9-2.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gP9HgvZWct50Kw/hM7BCKg==&#34;: {&#xA;      &#34;id&#34;: &#34;gP9HgvZWct50Kw/hM7BCKg==&#34;,&#xA;      &#34;name&#34;: &#34;libtirpc-common&#34;,&#xA;      &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtirpc&#34;,&#xA;        &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gv6x84VyNacZgvJrC59jbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;gv6x84VyNacZgvJrC59jbQ==&#34;,&#xA;      &#34;name&#34;: &#34;libffi7&#34;,&#xA;      &#34;version&#34;: &#34;3.3-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libffi&#34;,&#xA;        &#34;version&#34;: &#34;3.3-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hdNUjYIlrdEAtBWAggakAw==&#34;: {&#xA;      &#34;id&#34;: &#34;hdNUjYIlrdEAtBWAggakAw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-base&#34;,&#xA;      &#34;version&#34;: &#34;5.32.1-4+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-4+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;i4JkQ9JgSpZVyPFWOY5Bxw==&#34;: {&#xA;      &#34;id&#34;: &#34;i4JkQ9JgSpZVyPFWOY5Bxw==&#34;,&#xA;      &#34;name&#34;: &#34;liblz4-1&#34;,&#xA;      &#34;version&#34;: &#34;1.9.3-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lz4&#34;,&#xA;        &#34;version&#34;: &#34;1.9.3-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;: {&#xA;      &#34;id&#34;: &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;,&#xA;      &#34;name&#34;: &#34;libpcre3&#34;,&#xA;      &#34;version&#34;: &#34;2:8.39-13&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;2:8.39-13&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jErhz6PtXvAy/EPWJ425rA==&#34;: {&#xA;      &#34;id&#34;: &#34;jErhz6PtXvAy/EPWJ425rA==&#34;,&#xA;      &#34;name&#34;: &#34;libuuid1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;: {&#xA;      &#34;id&#34;: &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;,&#xA;      &#34;name&#34;: &#34;libsmartcols1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;: {&#xA;      &#34;id&#34;: &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;,&#xA;      &#34;name&#34;: &#34;flask&#34;,&#xA;      &#34;version&#34;: &#34;2.1.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.2.1.0.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-bin&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;,&#xA;      &#34;name&#34;: &#34;gpgv&#34;,&#xA;      &#34;version&#34;: &#34;2.2.27-2+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;2.2.27-2+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lCjIskl1HulEHShaXtgmwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lCjIskl1HulEHShaXtgmwQ==&#34;,&#xA;      &#34;name&#34;: &#34;libtinfo6&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lvz5sq0NbU6sy/F1tg9uiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lvz5sq0NbU6sy/F1tg9uiQ==&#34;,&#xA;      &#34;name&#34;: &#34;libkeyutils1&#34;,&#xA;      &#34;version&#34;: &#34;1.6.1-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;keyutils&#34;,&#xA;        &#34;version&#34;: &#34;1.6.1-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mlFDx1iAC2OWpmYHut2JHw==&#34;: {&#xA;      &#34;id&#34;: &#34;mlFDx1iAC2OWpmYHut2JHw==&#34;,&#xA;      &#34;name&#34;: &#34;libnettle8&#34;,&#xA;      &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nettle&#34;,&#xA;        &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nV87o429QBKIpM8DyOv4wg==&#34;: {&#xA;      &#34;id&#34;: &#34;nV87o429QBKIpM8DyOv4wg==&#34;,&#xA;      &#34;name&#34;: &#34;debian-archive-keyring&#34;,&#xA;      &#34;version&#34;: &#34;2021.1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;debian-archive-keyring&#34;,&#xA;        &#34;version&#34;: &#34;2021.1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ngOu/a+sfrdDkZtETF1mgg==&#34;: {&#xA;      &#34;id&#34;: &#34;ngOu/a+sfrdDkZtETF1mgg==&#34;,&#xA;      &#34;name&#34;: &#34;libselinux1&#34;,&#xA;      &#34;version&#34;: &#34;3.1-3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libselinux&#34;,&#xA;        &#34;version&#34;: &#34;3.1-3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nmd/xrCD27AKRWAzA5JZCA==&#34;: {&#xA;      &#34;id&#34;: &#34;nmd/xrCD27AKRWAzA5JZCA==&#34;,&#xA;      &#34;name&#34;: &#34;mawk&#34;,&#xA;      &#34;version&#34;: &#34;1.3.4.20200120-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;mawk&#34;,&#xA;        &#34;version&#34;: &#34;1.3.4.20200120-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;npX4tBmidkxp2QJN/c3Ktw==&#34;: {&#xA;      &#34;id&#34;: &#34;npX4tBmidkxp2QJN/c3Ktw==&#34;,&#xA;      &#34;name&#34;: &#34;libdebconfclient0&#34;,&#xA;      &#34;version&#34;: &#34;0.260&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cdebconf&#34;,&#xA;        &#34;version&#34;: &#34;0.260&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;,&#xA;      &#34;name&#34;: &#34;pip&#34;,&#xA;      &#34;version&#34;: &#34;22.3.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.22.3.1.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oH9T0w9ZyXDCGJ6Np6n1Iw==&#34;: {&#xA;      &#34;id&#34;: &#34;oH9T0w9ZyXDCGJ6Np6n1Iw==&#34;,&#xA;      &#34;name&#34;: &#34;init-system-helpers&#34;,&#xA;      &#34;version&#34;: &#34;1.60&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;init-system-helpers&#34;,&#xA;        &#34;version&#34;: &#34;1.60&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ozJ983JkaV259+RUbqutzw==&#34;: {&#xA;      &#34;id&#34;: &#34;ozJ983JkaV259+RUbqutzw==&#34;,&#xA;      &#34;name&#34;: &#34;dash&#34;,&#xA;      &#34;version&#34;: &#34;0.5.11+git20200708+dd9ef66-5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dash&#34;,&#xA;        &#34;version&#34;: &#34;0.5.11+git20200708+dd9ef66-5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;p+J9YgA22NC8PDODpTSxgw==&#34;: {&#xA;      &#34;id&#34;: &#34;p+J9YgA22NC8PDODpTSxgw==&#34;,&#xA;      &#34;name&#34;: &#34;libidn2-0&#34;,&#xA;      &#34;version&#34;: &#34;2.3.0-5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libidn2&#34;,&#xA;        &#34;version&#34;: &#34;2.3.0-5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pHAWej2qVWZtoCQ5DGoRcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pHAWej2qVWZtoCQ5DGoRcQ==&#34;,&#xA;      &#34;name&#34;: &#34;tzdata&#34;,&#xA;      &#34;version&#34;: &#34;2021a-1+deb11u8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tzdata&#34;,&#xA;        &#34;version&#34;: &#34;2021a-1+deb11u8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;: {&#xA;      &#34;id&#34;: &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;,&#xA;      &#34;name&#34;: &#34;libss2&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;q78XIEiJs5tQHLZtjoU3Fg==&#34;: {&#xA;      &#34;id&#34;: &#34;q78XIEiJs5tQHLZtjoU3Fg==&#34;,&#xA;      &#34;name&#34;: &#34;adduser&#34;,&#xA;      &#34;version&#34;: &#34;3.118&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;adduser&#34;,&#xA;        &#34;version&#34;: &#34;3.118&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;: {&#xA;      &#34;id&#34;: &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;,&#xA;      &#34;name&#34;: &#34;libsqlite3-0&#34;,&#xA;      &#34;version&#34;: &#34;3.34.1-3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;3.34.1-3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;: {&#xA;      &#34;id&#34;: &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;,&#xA;      &#34;name&#34;: &#34;libgssapi-krb5-2&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rJ4UB7yOdBPwgrk5WLwIQw==&#34;: {&#xA;      &#34;id&#34;: &#34;rJ4UB7yOdBPwgrk5WLwIQw==&#34;,&#xA;      &#34;name&#34;: &#34;libhogweed6&#34;,&#xA;      &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nettle&#34;,&#xA;        &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rUyBCRoo9C2erJrGUkvuDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rUyBCRoo9C2erJrGUkvuDQ==&#34;,&#xA;      &#34;name&#34;: &#34;libtirpc3&#34;,&#xA;      &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtirpc&#34;,&#xA;        &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;: {&#xA;      &#34;id&#34;: &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;,&#xA;      &#34;name&#34;: &#34;libsystemd0&#34;,&#xA;      &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sU05gaIadSYQd4+DxTnInw==&#34;: {&#xA;      &#34;id&#34;: &#34;sU05gaIadSYQd4+DxTnInw==&#34;,&#xA;      &#34;name&#34;: &#34;libacl1&#34;,&#xA;      &#34;version&#34;: &#34;2.2.53-10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;acl&#34;,&#xA;        &#34;version&#34;: &#34;2.2.53-10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sXwy5mmgqLM9WC30BdKwTA==&#34;: {&#xA;      &#34;id&#34;: &#34;sXwy5mmgqLM9WC30BdKwTA==&#34;,&#xA;      &#34;name&#34;: &#34;readline-common&#34;,&#xA;      &#34;version&#34;: &#34;8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;readline&#34;,&#xA;        &#34;version&#34;: &#34;8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;,&#xA;      &#34;name&#34;: &#34;liblzma5&#34;,&#xA;      &#34;version&#34;: &#34;5.2.5-2.1~deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz-utils&#34;,&#xA;        &#34;version&#34;: &#34;5.2.5-2.1~deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tYADP/V07/lE8Qno1R/hhg==&#34;: {&#xA;      &#34;id&#34;: &#34;tYADP/V07/lE8Qno1R/hhg==&#34;,&#xA;      &#34;name&#34;: &#34;libgcc-s1&#34;,&#xA;      &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uRB+svwXXxpR9DkvUVmAUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uRB+svwXXxpR9DkvUVmAUQ==&#34;,&#xA;      &#34;name&#34;: &#34;werkzeug&#34;,&#xA;      &#34;version&#34;: &#34;3.1.8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.3.1.8.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uXsuLx/plg6mDddGlE/9EA==&#34;: {&#xA;      &#34;id&#34;: &#34;uXsuLx/plg6mDddGlE/9EA==&#34;,&#xA;      &#34;name&#34;: &#34;libxxhash0&#34;,&#xA;      &#34;version&#34;: &#34;0.8.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xxhash&#34;,&#xA;        &#34;version&#34;: &#34;0.8.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;,&#xA;      &#34;name&#34;: &#34;libdb5.3&#34;,&#xA;      &#34;version&#34;: &#34;5.3.28+dfsg1-0.8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;db5.3&#34;,&#xA;        &#34;version&#34;: &#34;5.3.28+dfsg1-0.8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;: {&#xA;      &#34;id&#34;: &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;,&#xA;      &#34;name&#34;: &#34;util-linux&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xaMEpa2lawXi7R9jqzX8hA==&#34;: {&#xA;      &#34;id&#34;: &#34;xaMEpa2lawXi7R9jqzX8hA==&#34;,&#xA;      &#34;name&#34;: &#34;findutils&#34;,&#xA;      &#34;version&#34;: &#34;4.8.0-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;findutils&#34;,&#xA;        &#34;version&#34;: &#34;4.8.0-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;: {&#xA;      &#34;id&#34;: &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;,&#xA;      &#34;name&#34;: &#34;libkrb5-3&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;,&#xA;      &#34;name&#34;: &#34;sed&#34;,&#xA;      &#34;version&#34;: &#34;4.7-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sed&#34;,&#xA;        &#34;version&#34;: &#34;4.7-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zQ8wKwnOqSw7e/gsx76vLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zQ8wKwnOqSw7e/gsx76vLQ==&#34;,&#xA;      &#34;name&#34;: &#34;debianutils&#34;,&#xA;      &#34;version&#34;: &#34;4.11.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;debianutils&#34;,&#xA;        &#34;version&#34;: &#34;4.11.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zRv/Q67g6qJWTz0qqj4+BA==&#34;: {&#xA;      &#34;id&#34;: &#34;zRv/Q67g6qJWTz0qqj4+BA==&#34;,&#xA;      &#34;name&#34;: &#34;libnsl2&#34;,&#xA;      &#34;version&#34;: &#34;1.3.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libnsl&#34;,&#xA;        &#34;version&#34;: &#34;1.3.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;: {&#xA;      &#34;id&#34;: &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;,&#xA;      &#34;name&#34;: &#34;libpam0g&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;: {&#xA;      &#34;id&#34;: &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;,&#xA;      &#34;name&#34;: &#34;libapt-pkg6.0&#34;,&#xA;      &#34;version&#34;: &#34;2.2.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;apt&#34;,&#xA;        &#34;version&#34;: &#34;2.2.4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;distributions&#34;: {&#xA;    &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;: {&#xA;      &#34;id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;      &#34;did&#34;: &#34;debian&#34;,&#xA;      &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;      &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;      &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;      &#34;version_id&#34;: &#34;11&#34;,&#xA;      &#34;arch&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;,&#xA;      &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;    }&#xA;  },&#xA;  &#34;repository&#34;: {&#xA;    &#34;34e1f956-ee87-432d-913e-4074f2e2763d&#34;: {&#xA;      &#34;id&#34;: &#34;34e1f956-ee87-432d-913e-4074f2e2763d&#34;,&#xA;      &#34;name&#34;: &#34;pypi&#34;,&#xA;      &#34;uri&#34;: &#34;https://pypi.org/simple&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;environments&#34;: {&#xA;    &#34;+GDQTbek1zYvATiVR/wBCA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;+aaqENN9U+Kuxcb1tQ8Utg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;05vApGRmP6ko1S0ji87IIQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;1jyJPCL93kiEbfmNKeyz3g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:b6c8c943d979d9c37e3796cdc3ec5c1911f78585f467d6d94dd1c0fa64b1d230&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;34e1f956-ee87-432d-913e-4074f2e2763d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;2MObxiEVNllmUEzdVZM5qw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;4672uZtn8TnHDEzWVyhfjw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;5zxxTA220k9gPCegfDHkag==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;9snKXrH4dQy2IXHQ01Lg0A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Akbft1KN+9FKNhh1tM25eA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;CBzoMmlXBcyP54HOnauO0g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;CpILSbg3p6D7Gsp8sCW1Rg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;DY5Co0gkGtbgwDlkjfJLWA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:b6c8c943d979d9c37e3796cdc3ec5c1911f78585f467d6d94dd1c0fa64b1d230&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;34e1f956-ee87-432d-913e-4074f2e2763d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;EVGnnBfWyiVHhoIR4vEpgg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FOAAB3KiNsLyi03hQsjRTA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FrUy4mOCaHm5aGT53as3JQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;GGaavnLgXX31qx9chfhdOQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;HFwGHerHwgvY8vkjr3x1Pg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:b6c8c943d979d9c37e3796cdc3ec5c1911f78585f467d6d94dd1c0fa64b1d230&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;34e1f956-ee87-432d-913e-4074f2e2763d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;IiJKm8T4olfm6rhuKayFOw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Jg2vDvx1JxyPDIrUzzR9NQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;LVHVhWoZgWwWvOspyUwb1w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;NA4G2YrIZ73fsX7d5r5rGw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;OgJFdUXRfF1Ls8u1+eOivw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;PaaRbD/FkW3JARtSKQgRcQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;PgPY5hWnihXRN45byvzY0g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;34e1f956-ee87-432d-913e-4074f2e2763d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RVoqRXLcdKU5LYfyLKdi3Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:b6c8c943d979d9c37e3796cdc3ec5c1911f78585f467d6d94dd1c0fa64b1d230&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;34e1f956-ee87-432d-913e-4074f2e2763d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;RgdwX+VC70nXZ2E527PXaA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;SWnjL4fWu+WMpxhSCWLhZQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;T5NuX1yinNyGoZNN2r9u4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;VVXsYlCxogg17Ti1iR03Mw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Wi4oa03apqVdR6okNeZiNA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ZPlAztePXX+uFLVDX2lgNQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bTSLWiizipO2axtmvXFuVg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;be3s5y0dx4bgsQboIoDduw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dRfu6Up2F2Ze+gJ21oSeug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dXglURzzdbLnOf14mab1Hg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dobmrwm7aq9puvFHwNgXxw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;eF2QIdrTmJlWmjQTkhntow==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;34e1f956-ee87-432d-913e-4074f2e2763d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;fqwKjkzVNvsxh6040zt05g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;fyM9Y65kt8cTfJv4LKF7bg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;gP9HgvZWct50Kw/hM7BCKg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;gv6x84VyNacZgvJrC59jbQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;hdNUjYIlrdEAtBWAggakAw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;i4JkQ9JgSpZVyPFWOY5Bxw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;jErhz6PtXvAy/EPWJ425rA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:b6c8c943d979d9c37e3796cdc3ec5c1911f78585f467d6d94dd1c0fa64b1d230&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;34e1f956-ee87-432d-913e-4074f2e2763d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;lCjIskl1HulEHShaXtgmwQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;lvz5sq0NbU6sy/F1tg9uiQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;mlFDx1iAC2OWpmYHut2JHw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nV87o429QBKIpM8DyOv4wg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ngOu/a+sfrdDkZtETF1mgg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nmd/xrCD27AKRWAzA5JZCA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;npX4tBmidkxp2QJN/c3Ktw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;34e1f956-ee87-432d-913e-4074f2e2763d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;oH9T0w9ZyXDCGJ6Np6n1Iw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ozJ983JkaV259+RUbqutzw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;p+J9YgA22NC8PDODpTSxgw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;pHAWej2qVWZtoCQ5DGoRcQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;q78XIEiJs5tQHLZtjoU3Fg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rJ4UB7yOdBPwgrk5WLwIQw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rUyBCRoo9C2erJrGUkvuDQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;sU05gaIadSYQd4+DxTnInw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;sXwy5mmgqLM9WC30BdKwTA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;tYADP/V07/lE8Qno1R/hhg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;uRB+svwXXxpR9DkvUVmAUQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:b6c8c943d979d9c37e3796cdc3ec5c1911f78585f467d6d94dd1c0fa64b1d230&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;34e1f956-ee87-432d-913e-4074f2e2763d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uXsuLx/plg6mDddGlE/9EA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;xaMEpa2lawXi7R9jqzX8hA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zQ8wKwnOqSw7e/gsx76vLQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zRv/Q67g6qJWTz0qqj4+BA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;301485d7-24b6-4c47-aef1-c0adff4e8471&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ]&#xA;  },&#xA;  &#34;vulnerabilities&#34;: {&#xA;    &#34;+N61/5529gFt7RkD8ooeKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+N61/5529gFt7RkD8ooeKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0465&#34;,&#xA;      &#34;description&#34;: &#34;Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks.  Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether.  Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0465&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;+aR35vFmeRYa8dLzBaCMmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+aR35vFmeRYa8dLzBaCMmQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41989&#34;,&#xA;      &#34;description&#34;: &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-41989&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;: {&#xA;      &#34;id&#34;: &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-13529&#34;,&#xA;      &#34;description&#34;: &#34;An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2020-13529&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/7UJLAHsMPxTtTxvuPgrzA==&#34;: {&#xA;      &#34;id&#34;: &#34;/7UJLAHsMPxTtTxvuPgrzA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45491&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-45491&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010022&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \&#34;this is being treated as a non-security bug and no real threat.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010022&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/cV7Fn8Va+poBGxbPjGjrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/cV7Fn8Va+poBGxbPjGjrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6238&#34;,&#xA;      &#34;description&#34;: &#34;The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to validate the RDATA content against the RDATA length in a DNS response when processing LOC, CERT, TKEY or TSIG records, which may allow an attacker to craft a DNS response, causing a target application to crash or read uninitialized memory.  These functions are for application debugging only and hence not in the path of code executed by the DNS resolver.  Further, they have been deprecated since version 2.34 and should not be used by any new applications.  Applications should consider porting away from these interfaces since they may be removed in future versions.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-6238&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;08pa4udz9bnA9IOsE208DA==&#34;: {&#xA;      &#34;id&#34;: &#34;08pa4udz9bnA9IOsE208DA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4039&#34;,&#xA;      &#34;description&#34;: &#34;**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains  that target AArch64 allows an attacker to exploit an existing buffer  overflow in dynamically-sized local variables in your application  without this being detected. This stack-protector failure only applies  to C99-style dynamically-sized local variables or those created using  alloca(). The stack-protector operates as intended for statically-sized  local variables.  The default behavior when the stack-protector  detects an overflow is to terminate your application, resulting in  controlled loss of availability. An attacker who can exploit a buffer  overflow without triggering the stack-protector might be able to change  program flow control to cause an uncontrolled loss of availability or to  go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4039&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;: {&#xA;      &#34;id&#34;: &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26458&#34;,&#xA;      &#34;description&#34;: &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-26458&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0q/btA3zBEGWWmFxU7cNig==&#34;: {&#xA;      &#34;id&#34;: &#34;0q/btA3zBEGWWmFxU7cNig==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40225&#34;,&#xA;      &#34;description&#34;: &#34;In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40225&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;1U/zi3CEao+52y8LKU0uvw==&#34;: {&#xA;      &#34;id&#34;: &#34;1U/zi3CEao+52y8LKU0uvw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36084&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36084&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;1VnWeA5AZgybyD8+PiXyiw==&#34;: {&#xA;      &#34;id&#34;: &#34;1VnWeA5AZgybyD8+PiXyiw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-70873&#34;,&#xA;      &#34;description&#34;: &#34;An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-70873&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1dwwvWkARnFe67yAAGVglQ==&#34;: {&#xA;      &#34;id&#34;: &#34;1dwwvWkARnFe67yAAGVglQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31438&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \&#34;a reply denying that any of the finding was a security vulnerability.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31438&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;20nlQwJu4gG0Ex/vty+hig==&#34;: {&#xA;      &#34;id&#34;: &#34;20nlQwJu4gG0Ex/vty+hig==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5419&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5419&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;27BVJE6xR0Z84LzifDnFYA==&#34;: {&#xA;      &#34;id&#34;: &#34;27BVJE6xR0Z84LzifDnFYA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48303&#34;,&#xA;      &#34;description&#34;: &#34;GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-48303&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.34+dfsg-1+deb11u1&#34;&#xA;    },&#xA;    &#34;2TcHkpRhAP0iTCSGAQKUOg==&#34;: {&#xA;      &#34;id&#34;: &#34;2TcHkpRhAP0iTCSGAQKUOg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3833&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in gnutls. This vulnerability occurs because gnutls performs case-sensitive comparisons of `nameConstraints` labels, specifically for `dNSName` (DNS) or `rfc822Name` (email) constraints within `excludedSubtrees` or `permittedSubtrees`. A remote attacker can exploit this by crafting a leaf certificate with casing differences in the Subject Alternative Name (SAN), leading to a policy bypass where a certificate that should be rejected is instead accepted. This could result in unauthorized access or information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-3833&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;: {&#xA;      &#34;id&#34;: &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write.  Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application.  The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the BIO implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-68160&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;: {&#xA;      &#34;id&#34;: &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file.  Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service.  The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash.  Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial of Service. For these reasons the issue was assessed as Low severity.  The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the TimeStamp Response implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.  OpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69420&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;3cBlPR7Tm4BIC/+wflldAg==&#34;: {&#xA;      &#34;id&#34;: &#34;3cBlPR7Tm4BIC/+wflldAg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12243&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-12243&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u7&#34;&#xA;    },&#xA;    &#34;5+uzHCKkmvMK8jl2uJkFqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5+uzHCKkmvMK8jl2uJkFqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32777&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.5 allows an infinite loop while parsing DTD content.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-32777&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;: {&#xA;      &#34;id&#34;: &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-37370&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-37370&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u5&#34;&#xA;    },&#xA;    &#34;5Cmp5KJXv+nVwwcs5/Kz7w==&#34;: {&#xA;      &#34;id&#34;: &#34;5Cmp5KJXv+nVwwcs5/Kz7w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-50602&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-50602&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u7&#34;&#xA;    },&#xA;    &#34;5OqCQlhu6kV+tAsgGEGuwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5OqCQlhu6kV+tAsgGEGuwQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;      &#34;description&#34;: &#34;zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-27171&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;: {&#xA;      &#34;id&#34;: &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-29111&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;6j23t/n6B77cQMxfCeLKzA==&#34;: {&#xA;      &#34;id&#34;: &#34;6j23t/n6B77cQMxfCeLKzA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12133&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-12133&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;4.16.0-2+deb11u2&#34;&#xA;    },&#xA;    &#34;6jg3v7lJ92IZCQpZydR2sA==&#34;: {&#xA;      &#34;id&#34;: &#34;6jg3v7lJ92IZCQpZydR2sA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28757&#34;,&#xA;      &#34;description&#34;: &#34;libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28757&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7DtFnnE8FjIpCQKunutpeg==&#34;: {&#xA;      &#34;id&#34;: &#34;7DtFnnE8FjIpCQKunutpeg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-16156&#34;,&#xA;      &#34;description&#34;: &#34;CPAN 2.28 allows Signature Verification Bypass.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2020-16156&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u4&#34;&#xA;    },&#xA;    &#34;7N1fkfhDIULrLId2wh2Pqw==&#34;: {&#xA;      &#34;id&#34;: &#34;7N1fkfhDIULrLId2wh2Pqw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42012&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42012&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8uv2vKf0QrdM+zJP4ufG+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;8uv2vKf0QrdM+zJP4ufG+Q==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-jp4c-xjxw-mgf9&#34;,&#xA;      &#34;description&#34;: &#34;pip Vulnerable to Inclusion of Functionality from Untrusted Control Sphere&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-27T15:30:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2026-6357 https://github.com/pypa/pip/pull/13923 https://github.com/pypa/pip/commit/b369bfc96cc524e00c267e1693290e6599c36bad https://github.com/pypa/pip https://ichard26.github.io/blog/2026/04/whats-new-in-pip-26.1/#security-fixes http://www.openwall.com/lists/oss-security/2026/04/27/7&#34;,&#xA;      &#34;severity&#34;: &#34;MODERATE&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=26.1&#34;&#xA;    },&#xA;    &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;The regcomp function in the GNU C library version from 2.4 to 2.41 is  subject to a double free if some previous allocation fails. It can be  accomplished either by a malloc failure or by using an interposed malloc  that injects random malloc failures. The double free can allow buffer  manipulation depending of how the regex is constructed. This issue  affects all architectures and ABIs supported by the GNU C library.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-8058&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9ThuL3zLKpmduvKpiDZ60w==&#34;: {&#xA;      &#34;id&#34;: &#34;9ThuL3zLKpmduvKpiDZ60w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24515&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-24515&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9sNDKQtqg7Z3gJr//JQlvg==&#34;: {&#xA;      &#34;id&#34;: &#34;9sNDKQtqg7Z3gJr//JQlvg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32990&#34;,&#xA;      &#34;description&#34;: &#34;A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-32990&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u8&#34;&#xA;    },&#xA;    &#34;9xk1p07t4ZV999E3HyfhVA==&#34;: {&#xA;      &#34;id&#34;: &#34;9xk1p07t4ZV999E3HyfhVA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5704&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allowing an attacker to introduce malicious files onto a system without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5704&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ANq7+l7+5U6IDt9eU02u5w==&#34;: {&#xA;      &#34;id&#34;: &#34;ANq7+l7+5U6IDt9eU02u5w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3219&#34;,&#xA;      &#34;description&#34;: &#34;GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-3219&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;: {&#xA;      &#34;id&#34;: &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3821&#34;,&#xA;      &#34;description&#34;: &#34;An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-3821&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u2&#34;&#xA;    },&#xA;    &#34;AvPdNumiwGnBie+lo1du3A==&#34;: {&#xA;      &#34;id&#34;: &#34;AvPdNumiwGnBie+lo1du3A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31486&#34;,&#xA;      &#34;description&#34;: &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31486&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;B78vSIll2muNDyY3F7urzw==&#34;: {&#xA;      &#34;id&#34;: &#34;B78vSIll2muNDyY3F7urzw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34743&#34;,&#xA;      &#34;description&#34;: &#34;XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-34743&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz-utils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8941&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a \&#34;complete\&#34; fix for CVE-2025-6020.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-8941&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BtqRPc7F47wJWygPNOxw1w==&#34;: {&#xA;      &#34;id&#34;: &#34;BtqRPc7F47wJWygPNOxw1w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32778&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-32778&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BxMnseA9J6OW2RWxSrlbyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;BxMnseA9J6OW2RWxSrlbyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36690&#34;,&#xA;      &#34;description&#34;: &#34;A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36690&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.34.1-3+deb11u1&#34;&#xA;    },&#xA;    &#34;CaLsKNvkpKlxKVBlUnje9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;CaLsKNvkpKlxKVBlUnje9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36087&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36087&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;: {&#xA;      &#34;id&#34;: &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4438&#34;,&#xA;      &#34;description&#34;: &#34;Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library&#39;s DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4438&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CtYegggqGbMfg16G/qfITQ==&#34;: {&#xA;      &#34;id&#34;: &#34;CtYegggqGbMfg16G/qfITQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2013-4235&#34;,&#xA;      &#34;description&#34;: &#34;shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2013-4235&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;: {&#xA;      &#34;id&#34;: &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;nscd: netgroup cache may terminate daemon on memory allocation failure  The Name Service Cache Daemon&#39;s (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients.  The flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33601&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;DRKFIYYNzLumACBV1CW/rw==&#34;: {&#xA;      &#34;id&#34;: &#34;DRKFIYYNzLumACBV1CW/rw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-35737&#34;,&#xA;      &#34;description&#34;: &#34;SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-35737&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DS2nhayHHtinLlFzZheSwg==&#34;: {&#xA;      &#34;id&#34;: &#34;DS2nhayHHtinLlFzZheSwg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66382&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-66382&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DTII3LzSaQL1baKsoSwsqg==&#34;: {&#xA;      &#34;id&#34;: &#34;DTII3LzSaQL1baKsoSwsqg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42010&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42010&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DfxJWBpJUY1aHu0ZUSilDg==&#34;: {&#xA;      &#34;id&#34;: &#34;DfxJWBpJUY1aHu0ZUSilDg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-6829&#34;,&#xA;      &#34;description&#34;: &#34;cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt&#39;s ElGamal implementation.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2018-6829&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;: {&#xA;      &#34;id&#34;: &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4437&#34;,&#xA;      &#34;description&#34;: &#34;Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library&#39;s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4437&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EYo03ICovWfCjw2cKpwx4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;EYo03ICovWfCjw2cKpwx4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2005-2541&#34;,&#xA;      &#34;description&#34;: &#34;Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2005-2541&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EajCJi704nU1+LqESNMC1w==&#34;: {&#xA;      &#34;id&#34;: &#34;EajCJi704nU1+LqESNMC1w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0727&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack  Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly.  A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue.  OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass().  We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant.  The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-0727&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;ErraMUPFwrdWYaj+aBxTMw==&#34;: {&#xA;      &#34;id&#34;: &#34;ErraMUPFwrdWYaj+aBxTMw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33845&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read. This issue is remotely exploitable and may cause information disclosure or denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-33845&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EvarhwbaAMrD3meGYFByGg==&#34;: {&#xA;      &#34;id&#34;: &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50495&#34;,&#xA;      &#34;description&#34;: &#34;NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-50495&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;F0zkrLGlbsix59P9mqoAOg==&#34;: {&#xA;      &#34;id&#34;: &#34;F0zkrLGlbsix59P9mqoAOg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-30258&#34;,&#xA;      &#34;description&#34;: &#34;In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a \&#34;verification DoS.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-30258&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G45dR+E8Wb+bEhCdwuqUDg==&#34;: {&#xA;      &#34;id&#34;: &#34;G45dR+E8Wb+bEhCdwuqUDg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-20838&#34;,&#xA;      &#34;description&#34;: &#34;libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-20838&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GPLYq884jQKVksfMc+b7OQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GPLYq884jQKVksfMc+b7OQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-1304&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-1304&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.46.2-2+deb11u1&#34;&#xA;    },&#xA;    &#34;GRlufCZFwHNK64OQNCFIcg==&#34;: {&#xA;      &#34;id&#34;: &#34;GRlufCZFwHNK64OQNCFIcg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2013-4392&#34;,&#xA;      &#34;description&#34;: &#34;systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2013-4392&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010024&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \&#34;this is being treated as a non-security bug and no real threat.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010024&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write.  Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code.  Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy.  The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-9230&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u4&#34;&#xA;    },&#xA;    &#34;HuTBrVHKx7uaMtQjiqifKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HuTBrVHKx7uaMtQjiqifKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0567&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-0567&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u5&#34;&#xA;    },&#xA;    &#34;IJPGr43VMeLym6tW3EWgdg==&#34;: {&#xA;      &#34;id&#34;: &#34;IJPGr43VMeLym6tW3EWgdg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8176&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-8176&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IvA5abshk33BAuuBar/pVQ==&#34;: {&#xA;      &#34;id&#34;: &#34;IvA5abshk33BAuuBar/pVQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45492&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-45492&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;IwuADin5bagOGQErETBgWw==&#34;: {&#xA;      &#34;id&#34;: &#34;IwuADin5bagOGQErETBgWw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4046&#34;,&#xA;      &#34;description&#34;: &#34;The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.    This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4046&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Jl0PQIP9L3ufSvQ2j71iww==&#34;: {&#xA;      &#34;id&#34;: &#34;Jl0PQIP9L3ufSvQ2j71iww==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-r9hx-vwmv-q579&#34;,&#xA;      &#34;description&#34;: &#34;pypa/setuptools vulnerable to Regular Expression Denial of Service (ReDoS)&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-23T00:30:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2022-40897 https://github.com/pypa/setuptools/issues/3659 https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be https://setuptools.pypa.io/en/latest https://security.netapp.com/advisory/ntap-20240621-0006 https://security.netapp.com/advisory/ntap-20230214-0001 https://pyup.io/vulnerabilities/CVE-2022-40897/52495 https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1 https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200 https://github.com/pypa/setuptools https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2022-43012.yaml&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=65.5.1&#34;&#xA;    },&#xA;    &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;: {&#xA;      &#34;id&#34;: &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4304&#34;,&#xA;      &#34;description&#34;: &#34;A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE.  For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4304&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;KZ3Jt7zkiM272dGLstI4XA==&#34;: {&#xA;      &#34;id&#34;: &#34;KZ3Jt7zkiM272dGLstI4XA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2013-0340&#34;,&#xA;      &#34;description&#34;: &#34;expat before version 2.4.0 does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue.  NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2013-0340&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KaoEuixR8E5nnpGZ1pG25w==&#34;: {&#xA;      &#34;id&#34;: &#34;KaoEuixR8E5nnpGZ1pG25w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0553&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-0553&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u5&#34;&#xA;    },&#xA;    &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;: {&#xA;      &#34;id&#34;: &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-10041&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-10041&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KwgIGMm765S+zvIBAwM9+g==&#34;: {&#xA;      &#34;id&#34;: &#34;KwgIGMm765S+zvIBAwM9+g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4899&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4899&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libzstd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LAgKryCll+DIcYhTR/xbzg==&#34;: {&#xA;      &#34;id&#34;: &#34;LAgKryCll+DIcYhTR/xbzg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42013&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42013&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;: {&#xA;      &#34;id&#34;: &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0628843-DBAD28&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MDmWztEMrTY+VyVp5c+Fvw==&#34;: {&#xA;      &#34;id&#34;: &#34;MDmWztEMrTY+VyVp5c+Fvw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0841856-B18BAF&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MXRm//dBCnWFem5zffvqmA==&#34;: {&#xA;      &#34;id&#34;: &#34;MXRm//dBCnWFem5zffvqmA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3715&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-3715&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MYYkxlB4Ank1zsdIh41apg==&#34;: {&#xA;      &#34;id&#34;: &#34;MYYkxlB4Ank1zsdIh41apg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-2961&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u9&#34;&#xA;    },&#xA;    &#34;MdrEi+/OrLlW3zDrheID2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;MdrEi+/OrLlW3zDrheID2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59375&#34;,&#xA;      &#34;description&#34;: &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-59375&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;: {&#xA;      &#34;id&#34;: &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data.  Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service.  The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash.  Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be using the CMS API instead. For these reasons the issue was assessed as Low severity.  The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-22796&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;: {&#xA;      &#34;id&#34;: &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28387&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: An uncommon configuration of clients performing DANE TLSA-based server authentication, when paired with uncommon server DANE TLSA records, may result in a use-after-free and/or double-free on the client side.  Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code.  However, the issue only affects clients that make use of TLSA records with both the PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate usage.  By far the most common deployment of DANE is in SMTP MTAs for which RFC7672 recommends that clients treat as &#39;unusable&#39; any TLSA records that have the PKIX certificate usages.  These SMTP (or other similar) clients are not vulnerable to this issue.  Conversely, any clients that support only the PKIX usages, and ignore the DANE-TA(2) usage are also not vulnerable.  The client would also need to be communicating with a server that publishes a TLSA RRset with both types of TLSA records.  No FIPS modules are affected by this issue, the problem code is outside the FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28387&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Mxv06g47iCk7QIqi7Xbojw==&#34;: {&#xA;      &#34;id&#34;: &#34;Mxv06g47iCk7QIqi7Xbojw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45853&#34;,&#xA;      &#34;description&#34;: &#34;MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-45853&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NYWveHKKsIYIKl+vE8UEhw==&#34;: {&#xA;      &#34;id&#34;: &#34;NYWveHKKsIYIKl+vE8UEhw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0517018-A83CE6&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sysvinit&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;: {&#xA;      &#34;id&#34;: &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22365&#34;,&#xA;      &#34;description&#34;: &#34;linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-22365&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.4.0-9+deb11u2&#34;&#xA;    },&#xA;    &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;: {&#xA;      &#34;id&#34;: &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26461&#34;,&#xA;      &#34;description&#34;: &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-26461&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3576&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-3576&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u7&#34;&#xA;    },&#xA;    &#34;OTqcMsspao5I6JZMETZ06w==&#34;: {&#xA;      &#34;id&#34;: &#34;OTqcMsspao5I6JZMETZ06w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;      &#34;description&#34;: &#34;Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library&#39;s DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-0915&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;P4mYk7npVU6t91mlbAb8QA==&#34;: {&#xA;      &#34;id&#34;: &#34;P4mYk7npVU6t91mlbAb8QA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2511&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions  Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service  This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation.  This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients.  The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-2511&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;PFkN8K2aK2XnSQjmAIry9A==&#34;: {&#xA;      &#34;id&#34;: &#34;PFkN8K2aK2XnSQjmAIry9A==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-58qw-9mgm-455v&#34;,&#xA;      &#34;description&#34;: &#34;pip has an interpretation conflict due to handling both concatenated tar and ZIP files as ZIP files&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-20T18:31:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2026-3219 https://github.com/pypa/pip/pull/13870 https://github.com/pypa/pip https://mail.python.org/archives/list/security-announce@python.org/thread/QAJ5JIVWWCAJ4EZL2FP5MOOW35JS7LRJ http://www.openwall.com/lists/oss-security/2026/04/20/8&#34;,&#xA;      &#34;severity&#34;: &#34;MODERATE&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;lastAffected=26.0.1&#34;&#xA;    },&#xA;    &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;: {&#xA;      &#34;id&#34;: &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28085&#34;,&#xA;      &#34;description&#34;: &#34;wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users&#39; terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28085&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.36.1-8+deb11u2&#34;&#xA;    },&#xA;    &#34;PUY4fn57nsAU2qBLtgRtdw==&#34;: {&#xA;      &#34;id&#34;: &#34;PUY4fn57nsAU2qBLtgRtdw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-6vgw-5pg2-w6jp&#34;,&#xA;      &#34;description&#34;: &#34;pip Path Traversal vulnerability&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-02T15:30:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2026-1703 https://github.com/pypa/pip/pull/13777 https://github.com/pypa/pip/commit/8e227a9be4faa9594e05d02ca05a413a2a4e7735 https://github.com/pypa/pip https://mail.python.org/archives/list/security-announce@python.org/thread/WIEA34D4TABF2UNQJAOMXKCICSPBE2DJ&#34;,&#xA;      &#34;severity&#34;: &#34;LOW&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=26.0&#34;&#xA;    },&#xA;    &#34;Pj9V3uC2c9o+P6lTpzzGeA==&#34;: {&#xA;      &#34;id&#34;: &#34;Pj9V3uC2c9o+P6lTpzzGeA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2025-49&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-17T16:15:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html https://github.com/pypa/setuptools/issues/4946 https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=78.1.1&#34;&#xA;    },&#xA;    &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;: {&#xA;      &#34;id&#34;: &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: When using the low-level OCB API directly with AES-NI or\u003cbr\u003eother hardware-accelerated code paths, inputs whose length is not a multiple\u003cbr\u003eof 16 bytes can leave the final partial block unencrypted and unauthenticated.\u003cbr\u003e\u003cbr\u003eImpact summary: The trailing 1-15 bytes of a message may be exposed in\u003cbr\u003ecleartext on encryption and are not covered by the authentication tag,\u003cbr\u003eallowing an attacker to read or tamper with those bytes without detection.\u003cbr\u003e\u003cbr\u003eThe low-level OCB encrypt and decrypt routines in the hardware-accelerated\u003cbr\u003estream path process full 16-byte blocks but do not advance the input/output\u003cbr\u003epointers. The subsequent tail-handling code then operates on the original\u003cbr\u003ebase pointers, effectively reprocessing the beginning of the buffer while\u003cbr\u003eleaving the actual trailing bytes unprocessed. The authentication checksum\u003cbr\u003ealso excludes the true tail bytes.\u003cbr\u003e\u003cbr\u003eHowever, typical OpenSSL consumers using EVP are not affected because the\u003cbr\u003ehigher-level EVP and provider OCB implementations split inputs so that full\u003cbr\u003eblocks and trailing partial blocks are processed in separate calls, avoiding\u003cbr\u003ethe problematic code path. Additionally, TLS does not use OCB ciphersuites.\u003cbr\u003eThe vulnerability only affects applications that call the low-level\u003cbr\u003eCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with\u003cbr\u003enon-block-aligned lengths in a single call on hardware-accelerated builds.\u003cbr\u003eFor these reasons the issue was assessed as Low severity.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected\u003cbr\u003eby this issue, as OCB mode is not a FIPS-approved algorithm.\u003cbr\u003e\u003cbr\u003eOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\u003cbr\u003e\u003cbr\u003eOpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69418&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;QGq5D5QwQKPerzYOBVoSsg==&#34;: {&#xA;      &#34;id&#34;: &#34;QGq5D5QwQKPerzYOBVoSsg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-cx63-2mw6-8hw5&#34;,&#xA;      &#34;description&#34;: &#34;setuptools vulnerable to Command Injection via package URL&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-15T03:30:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2024-6345 https://github.com/pypa/setuptools/pull/4332 https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0 https://github.com/pypa/setuptools https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5 https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=70.0.0&#34;&#xA;    },&#xA;    &#34;Qd2XnJZ3qaQ3AbyDXUaR2A==&#34;: {&#xA;      &#34;id&#34;: &#34;Qd2XnJZ3qaQ3AbyDXUaR2A==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2022-43012&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-23T00:15:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200 https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1 https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be https://pyup.io/vulnerabilities/CVE-2022-40897/52495/&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=65.5.1&#34;&#xA;    },&#xA;    &#34;QopvyNp/5Ata9NdAUhFygw==&#34;: {&#xA;      &#34;id&#34;: &#34;QopvyNp/5Ata9NdAUhFygw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5278&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU Coreutils. The sort utility&#39;s begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-5278&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RsDeaOU1gcwrKfmGECEolg==&#34;: {&#xA;      &#34;id&#34;: &#34;RsDeaOU1gcwrKfmGECEolg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42015&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42015&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RxgProNqXCgPRgAzu8keFA==&#34;: {&#xA;      &#34;id&#34;: &#34;RxgProNqXCgPRgAzu8keFA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40355&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.22.3, there is a NULL pointer dereference if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, causing the process to terminate in parse_nego_message.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40355&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SNR1VT02i1HBHxqGRTeBAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SNR1VT02i1HBHxqGRTeBAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-9820&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u9&#34;&#xA;    },&#xA;    &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;: {&#xA;      &#34;id&#34;: &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010025&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor&#39;s position is \&#34;ASLR bypass itself is not a vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010025&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;: {&#xA;      &#34;id&#34;: &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-24528&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-24528&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u6&#34;&#xA;    },&#xA;    &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;: {&#xA;      &#34;id&#34;: &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4450&#34;,&#xA;      &#34;description&#34;: &#34;The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \&#34;name\&#34; (e.g. \&#34;CERTIFICATE\&#34;), any header data and the payload data. If the function succeeds then the \&#34;name_out\&#34;, \&#34;header\&#34; and \&#34;data\&#34; arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack.  The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected.  These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0.  The OpenSSL asn1parse command line application is also impacted by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4450&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;: {&#xA;      &#34;id&#34;: &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6141&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6141&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;U3JbUhrT2SqWNuYU5d13cQ==&#34;: {&#xA;      &#34;id&#34;: &#34;U3JbUhrT2SqWNuYU5d13cQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-33560&#34;,&#xA;      &#34;description&#34;: &#34;Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-33560&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;U5598afGvRaltva6Rjqnug==&#34;: {&#xA;      &#34;id&#34;: &#34;U5598afGvRaltva6Rjqnug==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4105&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4105&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;Ud6njM/DPIrfSPiFct82Lw==&#34;: {&#xA;      &#34;id&#34;: &#34;Ud6njM/DPIrfSPiFct82Lw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52426&#34;,&#xA;      &#34;description&#34;: &#34;libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-52426&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UdV1OleGh/0MAkug0ZAlcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UdV1OleGh/0MAkug0ZAlcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25210&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-25210&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ul/kdhde9MT/cThQqWyUBA==&#34;: {&#xA;      &#34;id&#34;: &#34;Ul/kdhde9MT/cThQqWyUBA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3832&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in gnutls. A remote attacker could exploit this vulnerability by presenting a specially crafted Online Certificate Status Protocol (OCSP) response during a TLS handshake. Due to a logic error in how gnutls processes multi-record OCSP responses, a client with OCSP verification enabled may incorrectly accept a revoked server certificate, potentially leading to a compromise of trust.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-3832&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VzolVkOS5HseGzVTLzDMfA==&#34;: {&#xA;      &#34;id&#34;: &#34;VzolVkOS5HseGzVTLzDMfA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39804&#34;,&#xA;      &#34;description&#34;: &#34;In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-39804&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.34+dfsg-1+deb11u1&#34;&#xA;    },&#xA;    &#34;WCGqond4znYKCRcm4xyPrg==&#34;: {&#xA;      &#34;id&#34;: &#34;WCGqond4znYKCRcm4xyPrg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2007-5686&#34;,&#xA;      &#34;description&#34;: &#34;initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts.  NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2007-5686&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31439&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \&#34;a reply denying that any of the finding was a security vulnerability.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31439&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;: {&#xA;      &#34;id&#34;: &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;nscd: Stack-based buffer overflow in netgroup cache  If the Name Service Cache Daemon&#39;s (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow.  This flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33599&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;WRwV7Adc7Zuy6O98PPaFDw==&#34;: {&#xA;      &#34;id&#34;: &#34;WRwV7Adc7Zuy6O98PPaFDw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40356&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.22.3, there is an integer underflow and resultant out-of-bounds read if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, possibly causing the process to terminate in parse_message.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40356&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WWnQMI7f7f75SgC9Dcl+QQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WWnQMI7f7f75SgC9Dcl+QQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0290435-0B57B5&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WcYPrwv9PSVoVoof5MRsxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WcYPrwv9PSVoVoof5MRsxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2023-228&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-25T18:17:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL/ https://github.com/pypa/pip/pull/12306&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=23.3&#34;&#xA;    },&#xA;    &#34;WxlxRC1KqAo8Mejv03fZGA==&#34;: {&#xA;      &#34;id&#34;: &#34;WxlxRC1KqAo8Mejv03fZGA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68972&#34;,&#xA;      &#34;description&#34;: &#34;In GnuPG through 2.4.8, if a signed message has \\f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an \&#34;invalid armor\&#34; message is printed during verification). This is related to use of \\f as a marker to denote truncation of a long plaintext line.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-68972&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XQ5gIRaXVhDd6S954jtG2g==&#34;: {&#xA;      &#34;id&#34;: &#34;XQ5gIRaXVhDd6S954jtG2g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5928&#34;,&#xA;      &#34;description&#34;: &#34;Calling the ungetwc function on a FILE stream with wide characters encoded in a character set that has overlaps between its single byte and multi-byte character encodings, in the GNU C Library version 2.43 or earlier, may result in an attempt to read bytes before an allocated buffer, potentially resulting in unintentional disclosure of neighboring data in the heap, or a program crash.  A bug in the wide character pushback implementation (_IO_wdefault_pbackfail in libio/wgenops.c) causes ungetwc() to operate on the regular character buffer (fp-\u003e_IO_read_ptr) instead of the actual wide-stream read pointer (fp-\u003e_wide_data-\u003e_IO_read_ptr). The program crash may happen in cases where fp-\u003e_IO_read_ptr is not initialized and hence points to NULL. The buffer under-read requires a special situation where the input character encoding is such that there are overlaps between single byte representations and multibyte representations in that encoding, resulting in spurious matches. The spurious match case is not possible in the standard Unicode character sets.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5928&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Xce4H7xsVfrtYV2aXED7xA==&#34;: {&#xA;      &#34;id&#34;: &#34;Xce4H7xsVfrtYV2aXED7xA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-18018&#34;,&#xA;      &#34;description&#34;: &#34;In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX \&#34;-R -L\&#34; options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-18018&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XtT5+z5+yMbpdsyfkLItzA==&#34;: {&#xA;      &#34;id&#34;: &#34;XtT5+z5+yMbpdsyfkLItzA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6395&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6395&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u8&#34;&#xA;    },&#xA;    &#34;Y++3+aMTeU3vX7BI4/zG6w==&#34;: {&#xA;      &#34;id&#34;: &#34;Y++3+aMTeU3vX7BI4/zG6w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-14831&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u9&#34;&#xA;    },&#xA;    &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;: {&#xA;      &#34;id&#34;: &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;      &#34;description&#34;: &#34;Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.  Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1\u003c\u003c62+ 1, 1\u003c\u003c63] and exactly 1\u003c\u003c63 for posix_memalign and aligned_alloc.  Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-0861&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YXTNVVKQsWY/LFuomB715g==&#34;: {&#xA;      &#34;id&#34;: &#34;YXTNVVKQsWY/LFuomB715g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13151&#34;,&#xA;      &#34;description&#34;: &#34;Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-13151&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZbWtFXr0WyByV4kCb3M6FA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZbWtFXr0WyByV4kCb3M6FA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5981&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-5981&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u4&#34;&#xA;    },&#xA;    &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010023&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \&#34;this is being treated as a non-security bug and no real threat.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010023&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZrZi02myDWWW0L5oPQj/cg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZrZi02myDWWW0L5oPQj/cg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-11164&#34;,&#xA;      &#34;description&#34;: &#34;In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-11164&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4813&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aWm6E1ULjtuw0ydmFnsI4A==&#34;: {&#xA;      &#34;id&#34;: &#34;aWm6E1ULjtuw0ydmFnsI4A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6297&#34;,&#xA;      &#34;description&#34;: &#34;It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6297&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dpkg&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;afNm575eldgXY3DOGUNdqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;afNm575eldgXY3DOGUNdqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28388&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: When a delta CRL that contains a Delta CRL Indicator extension is processed a NULL pointer dereference might happen if the required CRL Number extension is missing.  Impact summary: A NULL pointer dereference can trigger a crash which leads to a Denial of Service for an application.  When CRL processing and delta CRL processing is enabled during X.509 certificate verification, the delta CRL processing does not check whether the CRL Number extension is NULL before dereferencing it. When a malformed delta CRL file is being processed, this parameter can be NULL, causing a NULL pointer dereference.  Exploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in the verification context, the certificate being verified to contain a freshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and an attacker to provide a malformed CRL to an application that processes it.  The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure. For that reason the issue was assessed as Low severity according to our Security Policy.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28388&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;: {&#xA;      &#34;id&#34;: &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-9192&#34;,&#xA;      &#34;description&#34;: &#34;In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by &#39;(|)(\\\\1\\\\1)*&#39; in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-9192&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;: {&#xA;      &#34;id&#34;: &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3446&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Checking excessively long DH keys or parameters may be very slow.  Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.  The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (&#39;p&#39; parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length.  However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large.  An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack.  The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().  Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the &#39;-check&#39; option.  The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-3446&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1v-0~deb11u1&#34;&#xA;    },&#xA;    &#34;bBymk1eoEM+tVYB+/Crz+g==&#34;: {&#xA;      &#34;id&#34;: &#34;bBymk1eoEM+tVYB+/Crz+g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28835&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \&#34;certtool --verify-chain\&#34; command.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28835&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u6&#34;&#xA;    },&#xA;    &#34;bNvH54V1y9cXsGaCXVwFVw==&#34;: {&#xA;      &#34;id&#34;: &#34;bNvH54V1y9cXsGaCXVwFVw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-5rjg-fvgr-3xxf&#34;,&#xA;      &#34;description&#34;: &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T16:52:43Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf https://nvd.nist.gov/vuln/detail/CVE-2025-47273 https://github.com/pypa/setuptools/issues/4946 https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2025-49.yaml https://github.com/pypa/setuptools https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88 https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html&#34;,&#xA;      &#34;severity&#34;: &#34;HIGH&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=78.1.1&#34;&#xA;    },&#xA;    &#34;bZ2m6J3EIvmTdjYJprlOKA==&#34;: {&#xA;      &#34;id&#34;: &#34;bZ2m6J3EIvmTdjYJprlOKA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36085&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36085&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;: {&#xA;      &#34;id&#34;: &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28389&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen.  Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service.  When a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is processed, the optional parameters field of KeyEncryptionAlgorithmIdentifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing.  Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28389&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;brAAPyN4siIQT5bxa9xu4g==&#34;: {&#xA;      &#34;id&#34;: &#34;brAAPyN4siIQT5bxa9xu4g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-47038&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u3&#34;&#xA;    },&#xA;    &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;: {&#xA;      &#34;id&#34;: &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;      &#34;description&#34;: &#34;Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-15281&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;: {&#xA;      &#34;id&#34;: &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-5709&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \&#34;dbentry-\u003en_key_data\&#34; in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \&#34;u4\&#34; variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2018-5709&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cZD87tDO2q60EFy3BAZ33g==&#34;: {&#xA;      &#34;id&#34;: &#34;cZD87tDO2q60EFy3BAZ33g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0464&#34;,&#xA;      &#34;description&#34;: &#34;A security vulnerability has been identified in all supported versions  of OpenSSL related to the verification of X.509 certificate chains that include policy constraints.  Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.  Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0464&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;ce9B0jxjyNiCfG4VtZhnVw==&#34;: {&#xA;      &#34;id&#34;: &#34;ce9B0jxjyNiCfG4VtZhnVw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2011-4116&#34;,&#xA;      &#34;description&#34;: &#34;_is_safe in the File::Temp module for Perl does not properly handle symlinks.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2011-4116&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;: {&#xA;      &#34;id&#34;: &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29491&#34;,&#xA;      &#34;description&#34;: &#34;ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-29491&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;6.2+20201114-2+deb11u2&#34;&#xA;    },&#xA;    &#34;dDtfYPtAiWG7x5kc85ma8w==&#34;: {&#xA;      &#34;id&#34;: &#34;dDtfYPtAiWG7x5kc85ma8w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5435&#34;,&#xA;      &#34;description&#34;: &#34;The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to enforce the caller-supplied buffer length, and can result in an out-of-bounds write when printing TSIG records.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5435&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-36054&#34;,&#xA;      &#34;description&#34;: &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-36054&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u4&#34;&#xA;    },&#xA;    &#34;dUTZP+bcDNUqytJV02E1dQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dUTZP+bcDNUqytJV02E1dQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6965&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dZ/H1sYv9QSX9VO93tlGLw==&#34;: {&#xA;      &#34;id&#34;: &#34;dZ/H1sYv9QSX9VO93tlGLw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-4xh5-x5gv-qwph&#34;,&#xA;      &#34;description&#34;: &#34;pip&#39;s fallback tar extraction doesn&#39;t check symbolic links point to extraction directory&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-24T15:31:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2025-8869 https://github.com/pypa/pip/pull/13550 https://github.com/pypa/pip/commit/f2b92314da012b9fffa36b3f3e67748a37ef464a https://github.com/pypa/pip https://lists.debian.org/debian-lts-announce/2025/10/msg00028.html https://mail.python.org/archives/list/security-announce@python.org/thread/IF5A3GCJY3VH7BVHJKOWOJFKTW7VFQEN https://pip.pypa.io/en/stable/news/#v25-2&#34;,&#xA;      &#34;severity&#34;: &#34;MODERATE&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=25.3&#34;&#xA;    },&#xA;    &#34;djiF0yOmYUIiWIfmt75aDA==&#34;: {&#xA;      &#34;id&#34;: &#34;djiF0yOmYUIiWIfmt75aDA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42011&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42011&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eietxU2AL+GdeSQwh6n6XA==&#34;: {&#xA;      &#34;id&#34;: &#34;eietxU2AL+GdeSQwh6n6XA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0215&#34;,&#xA;      &#34;description&#34;: &#34;The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications.  The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash.    This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7.  Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream.  The OpenSSL cms and smime command line applications are similarly affected.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0215&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;epkSU4TSX3BVrueh1mbRzg==&#34;: {&#xA;      &#34;id&#34;: &#34;epkSU4TSX3BVrueh1mbRzg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-13176&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation.  Impact summary: A timing side-channel in ECDSA signature computations could allow recovering the private key by an attacker. However, measuring the timing would require either local access to the signing application or a very fast network connection with low latency.  There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This can happen with significant probability only for some of the supported elliptic curves. In particular the NIST P-521 curve is affected. To be able to measure this leak, the attacker process must either be located in the same physical computer or must have a very fast network connection with low latency. For that reason the severity of this vulnerability is Low.  The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-13176&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u3&#34;&#xA;    },&#xA;    &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;: {&#xA;      &#34;id&#34;: &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6020&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.4.0-9+deb11u2&#34;&#xA;    },&#xA;    &#34;fUdim7gaWpwZtynNz5GiKg==&#34;: {&#xA;      &#34;id&#34;: &#34;fUdim7gaWpwZtynNz5GiKg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0361&#34;,&#xA;      &#34;description&#34;: &#34;A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0361&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u3&#34;&#xA;    },&#xA;    &#34;fXJD4KsFmfzjgWJPYHqTrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;fXJD4KsFmfzjgWJPYHqTrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-8457&#34;,&#xA;      &#34;description&#34;: &#34;SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-8457&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;db5.3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fharKhY7OXyx+gXJAwiegw==&#34;: {&#xA;      &#34;id&#34;: &#34;fharKhY7OXyx+gXJAwiegw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-29088&#34;,&#xA;      &#34;description&#34;: &#34;In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_config (in the C-language API) can cause a denial of service (application crash). An sz*nBig multiplication is not cast to a 64-bit integer, and consequently some memory allocations may be incorrect.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-29088&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;: {&#xA;      &#34;id&#34;: &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3184&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-3184&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;g44foSnimIkShQZtpEhjbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;g44foSnimIkShQZtpEhjbQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2011-3389&#34;,&#xA;      &#34;description&#34;: &#34;The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \&#34;BEAST\&#34; attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2011-3389&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;: {&#xA;      &#34;id&#34;: &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer.  Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service.  The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer.  The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.  OpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69419&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;: {&#xA;      &#34;id&#34;: &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings  The Name Service Cache Daemon&#39;s (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33602&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;h+ZYYwp9nAKs/v08piJa2A==&#34;: {&#xA;      &#34;id&#34;: &#34;h+ZYYwp9nAKs/v08piJa2A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33846&#34;,&#xA;      &#34;description&#34;: &#34;A heap buffer overflow vulnerability exists in the DTLS handshake fragment reassembly logic of GnuTLS. The issue arises in merge_handshake_packet() where incoming handshake fragments are matched and merged based solely on handshake type, without validating that the message_length field remains consistent across all fragments of the same logical message. An attacker can exploit this by sending crafted DTLS fragments with conflicting message_length values, causing the implementation to allocate a buffer based on a smaller initial fragment and subsequently write beyond its bounds using larger, inconsistent fragments. Because the merge operation does not enforce proper bounds checking against the allocated buffer size, this results in an out-of-bounds write on the heap. The vulnerability is remotely exploitable without authentication via the DTLS handshake path and can lead to application crashes or potential memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-33846&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;h7Lhy275V3QLvnBLGAulbw==&#34;: {&#xA;      &#34;id&#34;: &#34;h7Lhy275V3QLvnBLGAulbw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2023-62&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-02T18:15:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pallets/flask/commit/70f906c51ce49c485f1d355703e9cc3386b1cc2b https://github.com/pallets/flask/releases/tag/2.3.2 https://github.com/pallets/flask/releases/tag/2.2.5 https://github.com/pallets/flask/security/advisories/GHSA-m2qf-hxjv-5gpq https://github.com/pallets/flask/commit/afd63b16170b7c047f5758eb910c416511e9c965&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;flask&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=2.2.5&#34;&#xA;    },&#xA;    &#34;hb+m0qlWxENYdrb1R811qA==&#34;: {&#xA;      &#34;id&#34;: &#34;hb+m0qlWxENYdrb1R811qA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32776&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-32776&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;icG6omirC8ih0OmJHLIkrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;icG6omirC8ih0OmJHLIkrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5260&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5260&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;: {&#xA;      &#34;id&#34;: &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4806&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jS/WQ+ua63nFUvjSzoQw1g==&#34;: {&#xA;      &#34;id&#34;: &#34;jS/WQ+ua63nFUvjSzoQw1g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2236&#34;,&#xA;      &#34;description&#34;: &#34;A timing-based side-channel flaw was found in libgcrypt&#39;s RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-2236&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29383&#34;,&#xA;      &#34;description&#34;: &#34;In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \&#34;cat /etc/passwd\&#34; shows a rogue user account.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-29383&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:4.8.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;k6fjQGJuJ+9NXMFLa5+CgA==&#34;: {&#xA;      &#34;id&#34;: &#34;k6fjQGJuJ+9NXMFLa5+CgA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2016-2781&#34;,&#xA;      &#34;description&#34;: &#34;chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal&#39;s input buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2016-2781&#34;,&#xA;      &#34;severity&#34;: &#34;low&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k82HOcJqNkts86KJ0glvow==&#34;: {&#xA;      &#34;id&#34;: &#34;k82HOcJqNkts86KJ0glvow==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31484&#34;,&#xA;      &#34;description&#34;: &#34;CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31484&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u4&#34;&#xA;    },&#xA;    &#34;kgqUyyy6Fd5CUNREC3t1jg==&#34;: {&#xA;      &#34;id&#34;: &#34;kgqUyyy6Fd5CUNREC3t1jg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32988&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure.  This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-32988&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u8&#34;&#xA;    },&#xA;    &#34;khiBNMMi17UID6UagXI8LA==&#34;: {&#xA;      &#34;id&#34;: &#34;khiBNMMi17UID6UagXI8LA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36086&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36086&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0466&#34;,&#xA;      &#34;description&#34;: &#34;The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification.  As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function.  Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument.  Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0466&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;kwonOUycdcBenNhjZ1b//Q==&#34;: {&#xA;      &#34;id&#34;: &#34;kwonOUycdcBenNhjZ1b//Q==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-68rp-wp8r-4726&#34;,&#xA;      &#34;description&#34;: &#34;Flask session does not add `Vary: Cookie` header when accessed in some ways&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-19T20:45:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pallets/flask/security/advisories/GHSA-68rp-wp8r-4726 https://nvd.nist.gov/vuln/detail/CVE-2026-27205 https://github.com/pallets/flask/commit/089cb86dd22bff589a4eafb7ab8e42dc357623b4 https://github.com/pallets/flask https://github.com/pallets/flask/releases/tag/3.1.3&#34;,&#xA;      &#34;severity&#34;: &#34;LOW&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;flask&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=3.1.3&#34;&#xA;    },&#xA;    &#34;l6iyFrb04z9eZxh35gAtVA==&#34;: {&#xA;      &#34;id&#34;: &#34;l6iyFrb04z9eZxh35gAtVA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-0395&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u12&#34;&#xA;    },&#xA;    &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2011-3374&#34;,&#xA;      &#34;description&#34;: &#34;It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2011-3374&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;apt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31437&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \&#34;a reply denying that any of the finding was a security vulnerability.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31437&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;: {&#xA;      &#34;id&#34;: &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2650&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow.  Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service.  An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit.  OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods.  When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time.  The time complexity is O(n^2) with &#39;n&#39; being the size of the sub-identifiers in bytes (*).  With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced.  This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms.  Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data.  Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL.  If the use is for the mere purpose of display, the severity is considered low.  In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS.  It also impacts anything that processes X.509 certificates, including simple things like verifying its signature.  The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer&#39;s certificate chain.  Additionally, this only impacts clients, or servers that have explicitly enabled client authentication.  In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates.  This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-2650&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;lnMcIzRPoETIbrbgdDGINA==&#34;: {&#xA;      &#34;id&#34;: &#34;lnMcIzRPoETIbrbgdDGINA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-46848&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-46848&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;4.16.0-2+deb11u1&#34;&#xA;    },&#xA;    &#34;lpW8N25dDGtdRer0SxEc1A==&#34;: {&#xA;      &#34;id&#34;: &#34;lpW8N25dDGtdRer0SxEc1A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42009&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42009&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;: {&#xA;      &#34;id&#34;: &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7008&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-7008&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u6&#34;&#xA;    },&#xA;    &#34;m8d/cgBRVljmHKGy6mUUXw==&#34;: {&#xA;      &#34;id&#34;: &#34;m8d/cgBRVljmHKGy6mUUXw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;Perl threads have a working directory race condition where file operations may target unintended paths.  If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running.   This may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit.  The bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-40909&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u5&#34;&#xA;    },&#xA;    &#34;mJA9Uto8Hh0tElNp2qoYaA==&#34;: {&#xA;      &#34;id&#34;: &#34;mJA9Uto8Hh0tElNp2qoYaA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-7245&#34;,&#xA;      &#34;description&#34;: &#34;Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-7245&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;meQYB1JR+XE3En/RrDfPvA==&#34;: {&#xA;      &#34;id&#34;: &#34;meQYB1JR+XE3En/RrDfPvA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4415&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4415&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u2&#34;&#xA;    },&#xA;    &#34;mj6UKCnVoHnC6YBWJGf/Ug==&#34;: {&#xA;      &#34;id&#34;: &#34;mj6UKCnVoHnC6YBWJGf/Ug==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-mq26-g339-26xf&#34;,&#xA;      &#34;description&#34;: &#34;Command Injection in pip when used with Mercurial&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-25T18:32:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2023-5752 https://github.com/pypa/pip/pull/12306 https://github.com/pypa/pip/commit/389cb799d0da9a840749fcd14878928467ed49b4 https://github.com/pypa/advisory-database/tree/main/vulns/pip/PYSEC-2023-228.yaml https://github.com/pypa/pip https://lists.debian.org/debian-lts-announce/2025/10/msg00028.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/622OZXWG72ISQPLM5Y57YCVIMWHD4C3U https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65UKKF5LBHEFDCUSPBHUN4IHYX7SRMHH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXUVMJM25PUAZRQZBF54OFVKTY3MINPW https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFC2SPFG5FLCZBYY2K3T5MFW2D22NG6E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YBSB3SUPQ3VIFYUMHPO3MEQI4BJAXKCZ https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=23.3&#34;&#xA;    },&#xA;    &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;: {&#xA;      &#34;id&#34;: &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-0563&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \&#34;INPUTRC\&#34; environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-0563&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;: {&#xA;      &#34;id&#34;: &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50868&#34;,&#xA;      &#34;description&#34;: &#34;The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the \&#34;NSEC3\&#34; issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-50868&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u6&#34;&#xA;    },&#xA;    &#34;nApP7wP3SU/Fk79xF589WA==&#34;: {&#xA;      &#34;id&#34;: &#34;nApP7wP3SU/Fk79xF589WA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40226&#34;,&#xA;      &#34;description&#34;: &#34;In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40226&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;o75dmeL6883s7llfbkU+PA==&#34;: {&#xA;      &#34;id&#34;: &#34;o75dmeL6883s7llfbkU+PA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45490&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-45490&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;oeIf5WAd0bERBmJCeLsqIg==&#34;: {&#xA;      &#34;id&#34;: &#34;oeIf5WAd0bERBmJCeLsqIg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-7246&#34;,&#xA;      &#34;description&#34;: &#34;Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-7246&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pVmDd54NDrNeiY7vPLSO2A==&#34;: {&#xA;      &#34;id&#34;: &#34;pVmDd54NDrNeiY7vPLSO2A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-42014&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-42014&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pa+2016jZIT5xycgFHsAsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pa+2016jZIT5xycgFHsAsQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-20796&#34;,&#xA;      &#34;description&#34;: &#34;In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by &#39;(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+&#39; in grep.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2018-20796&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pmcR65l6CQ+6Qdh99gUtFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pmcR65l6CQ+6Qdh99gUtFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52425&#34;,&#xA;      &#34;description&#34;: &#34;libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-52425&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;: {&#xA;      &#34;id&#34;: &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5678&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow.  Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays.  Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.  While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn&#39;t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters.  Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn&#39;t check for an excessively large Q.  An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.  DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions.  An application calling any of those other functions may similarly be affected.  The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().  Also vulnerable are the OpenSSL pkey command line application when using the \&#34;-pubcheck\&#34; option, as well as the OpenSSL genpkey command line application.  The OpenSSL SSL/TLS implementation is not affected by this issue.  The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-5678&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;pvJrwAdasLbb4sLGcD48Jg==&#34;: {&#xA;      &#34;id&#34;: &#34;pvJrwAdasLbb4sLGcD48Jg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5450&#34;,&#xA;      &#34;description&#34;: &#34;Calling the scanf family of functions with a %mc (malloc&#39;d character match) in the GNU C Library version 2.7 to version 2.43 with a format width specifier with an explicit width greater than 1024 could result in a one byte heap buffer overflow.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5450&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qDLWFSo6NpfxWPhSeAS8zQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qDLWFSo6NpfxWPhSeAS8zQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28834&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28834&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u6&#34;&#xA;    },&#xA;    &#34;qGfgK6gESZLmw0X26VnrJw==&#34;: {&#xA;      &#34;id&#34;: &#34;qGfgK6gESZLmw0X26VnrJw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5958&#34;,&#xA;      &#34;description&#34;: &#34;When sed is invoked with both -i (in-place edit) and --follow-symlinks, the function open_next_file() performs two separate, non-atomic filesystem operations on the same path:  1. resolves symlink to its target and stores the resolved path for determining when output is written, 2. opens the original symlink path (not the resolved one) to read the file.  Between these two calls there is a race window. If an attacker atomically replaces the symlink with a different target during that window, sed will: read content from the new (attacker-chosen) symlink target and write the processed result to the path recorded in step 1. This can lead to arbitrary file overwrite with attacker-controlled content in the context of the sed process.   This issue was fixed in version 4.10.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5958&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sed&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;: {&#xA;      &#34;id&#34;: &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-14104&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;: {&#xA;      &#34;id&#34;: &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4641&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4641&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:4.8.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;: {&#xA;      &#34;id&#34;: &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69720&#34;,&#xA;      &#34;description&#34;: &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69720&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;r5SCr3Z1Q4buRwe6QvoIRg==&#34;: {&#xA;      &#34;id&#34;: &#34;r5SCr3Z1Q4buRwe6QvoIRg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41080&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-41080&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;s55QOTlka9E4jTdGv0d/FA==&#34;: {&#xA;      &#34;id&#34;: &#34;s55QOTlka9E4jTdGv0d/FA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-4802&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u13&#34;&#xA;    },&#xA;    &#34;srcIw8ffB6famHHqmqImEw==&#34;: {&#xA;      &#34;id&#34;: &#34;srcIw8ffB6famHHqmqImEw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3817&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Checking excessively long DH keys or parameters may be very slow.  Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.  The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p.  An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.  The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().  Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \&#34;-check\&#34; option.  The OpenSSL SSL/TLS implementation is not affected by this issue.  The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-3817&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1v-0~deb11u1&#34;&#xA;    },&#xA;    &#34;svo9ZP0wOZ7IXZp//n2f7g==&#34;: {&#xA;      &#34;id&#34;: &#34;svo9ZP0wOZ7IXZp//n2f7g==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-m2qf-hxjv-5gpq&#34;,&#xA;      &#34;description&#34;: &#34;Flask vulnerable to possible disclosure of permanent session cookie due to missing Vary: Cookie header&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-01T19:22:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pallets/flask/security/advisories/GHSA-m2qf-hxjv-5gpq https://nvd.nist.gov/vuln/detail/CVE-2023-30861 https://github.com/pallets/flask/commit/70f906c51ce49c485f1d355703e9cc3386b1cc2b https://github.com/pallets/flask/commit/afd63b16170b7c047f5758eb910c416511e9c965 https://github.com/pallets/flask https://github.com/pallets/flask/releases/tag/2.2.5 https://github.com/pallets/flask/releases/tag/2.3.2 https://github.com/pypa/advisory-database/tree/main/vulns/flask/PYSEC-2023-62.yaml https://lists.debian.org/debian-lts-announce/2023/08/msg00024.html https://security.netapp.com/advisory/ntap-20230818-0006 https://www.debian.org/security/2023/dsa-5442&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;flask&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=2.2.5&#34;&#xA;    },&#xA;    &#34;swQXHeTg1VEUQHser/6eEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;swQXHeTg1VEUQHser/6eEQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50387&#34;,&#xA;      &#34;description&#34;: &#34;Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the \&#34;KeyTrap\&#34; issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-50387&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u6&#34;&#xA;    },&#xA;    &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;: {&#xA;      &#34;id&#34;: &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0286&#34;,&#xA;      &#34;description&#34;: &#34;There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING.  When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0286&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;tBbOIOCaKVlwik7hH/baMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tBbOIOCaKVlwik7hH/baMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-45346&#34;,&#xA;      &#34;description&#34;: &#34;A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-45346&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tjx9raP+v/Zzj6SBJct3WA==&#34;: {&#xA;      &#34;id&#34;: &#34;tjx9raP+v/Zzj6SBJct3WA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7104&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-7104&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.34.1-3+deb11u1&#34;&#xA;    },&#xA;    &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;: {&#xA;      &#34;id&#34;: &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;nscd: Null pointer crashes after notfound response  If the Name Service Cache Daemon&#39;s (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference.  This flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33600&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;u+ya+p/mAtLPAYAgbSPTTw==&#34;: {&#xA;      &#34;id&#34;: &#34;u+ya+p/mAtLPAYAgbSPTTw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41409&#34;,&#xA;      &#34;description&#34;: &#34;Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-41409&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u4BvRhFacDxQuC7pVeExQg==&#34;: {&#xA;      &#34;id&#34;: &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27456&#34;,&#xA;      &#34;description&#34;: &#34;util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-27456&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uEg5UAxE9NNjF71OxdO7uQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uEg5UAxE9NNjF71OxdO7uQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-16231&#34;,&#xA;      &#34;description&#34;: &#34;In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-16231&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uTSYWROavw8Bf2n+4djlMg==&#34;: {&#xA;      &#34;id&#34;: &#34;uTSYWROavw8Bf2n+4djlMg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.  A SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-4598&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u7&#34;&#xA;    },&#xA;    &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;: {&#xA;      &#34;id&#34;: &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5535&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer.  Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application.  The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists).  This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \&#34;no overlap\&#34; response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem.  In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur.  This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely.  The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.  Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-5535&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;uspznaGFEzt4cX0xZ36sYw==&#34;: {&#xA;      &#34;id&#34;: &#34;uspznaGFEzt4cX0xZ36sYw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28390&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: During processing of a crafted CMS EnvelopedData message with KeyTransportRecipientInfo a NULL pointer dereference can happen.  Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service.  When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with RSA-OAEP encryption is processed, the optional parameters field of RSA-OAEP SourceFunc algorithm identifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing.  Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28390&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40228&#34;,&#xA;      &#34;description&#34;: &#34;In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a \&#34;logger -p emerg\&#34; command is executed, if ForwardToWall=yes is set.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40228&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vcYYj1nbYwczzoLG255iZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vcYYj1nbYwczzoLG255iZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4039&#34;,&#xA;      &#34;description&#34;: &#34;**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains  that target AArch64 allows an attacker to exploit an existing buffer  overflow in dynamically-sized local variables in your application  without this being detected. This stack-protector failure only applies  to C99-style dynamically-sized local variables or those created using  alloca(). The stack-protector operates as intended for statically-sized  local variables.  The default behavior when the stack-protector  detects an overflow is to terminate your application, resulting in  controlled loss of availability. An attacker who can exploit a buffer  overflow without triggering the stack-protector might be able to change  program flow control to cause an uncontrolled loss of availability or to  go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4039&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vmet9boOEsf+RUsh5rJnEw==&#34;: {&#xA;      &#34;id&#34;: &#34;vmet9boOEsf+RUsh5rJnEw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4741&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations  Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications.  The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use.  The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arrived. In this case calling SSL_free_buffers will succeed even though a record has only been partially processed and the buffer is still in use.  The second scenario occurs where a full record containing application data has been received and processed by OpenSSL but the application has only read part of this data. Again a call to SSL_free_buffers will succeed even though the buffer is still in use.  While these scenarios could occur accidentally during normal operation a malicious attacker could attempt to engineer a stituation where this occurs. We are not aware of this issue being actively exploited.  The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-4741&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2010-4756&#34;,&#xA;      &#34;description&#34;: &#34;The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2010-4756&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;: {&#xA;      &#34;id&#34;: &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4911&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u7&#34;&#xA;    },&#xA;    &#34;wzv81XuYHOFtlrLHaamjZg==&#34;: {&#xA;      &#34;id&#34;: &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-37371&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-37371&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u5&#34;&#xA;    },&#xA;    &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;: {&#xA;      &#34;id&#34;: &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27587&#34;,&#xA;      &#34;description&#34;: &#34;OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) from the signatures. Next, based on the bit size of the extracted nonce, one can compare the signing time of full-sized nonces to signatures that used smaller nonces, via statistical tests. There is a side-channel in the P-364 curve that allows private key extraction (also, there is a dependency between the bit size of K and the size of the side channel). NOTE: This CVE is disputed because the OpenSSL security policy explicitly notes that any side channels which require same physical system to be detected are outside of the threat model for the software. The timing signal is so small that it is infeasible to be detected without having the attacking process running on the same physical system.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-27587&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;: {&#xA;      &#34;id&#34;: &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-56433&#34;,&#xA;      &#34;description&#34;: &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-56433&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;y2mOh8WlJTCvA6wlULAyvA==&#34;: {&#xA;      &#34;id&#34;: &#34;y2mOh8WlJTCvA6wlULAyvA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;      &#34;description&#34;: &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-68973&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.27-2+deb11u3&#34;&#xA;    },&#xA;    &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;: {&#xA;      &#34;id&#34;: &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9143&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes.  Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we&#39;re aware of, either only \&#34;named curves\&#34; are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2^m)) curves that can&#39;t represent problematic input values. Thus the likelihood of existence of a vulnerable application is low.  In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates.  Any problematic use-cases would have to be using an \&#34;exotic\&#34; curve encoding.  The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions.  Applications working with \&#34;exotic\&#34; explicit binary (GF(2^m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds.  Remote code execution cannot easily be ruled out.  The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-9143&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;yyExMMKc3SPW2jNE01wTug==&#34;: {&#xA;      &#34;id&#34;: &#34;yyExMMKc3SPW2jNE01wTug==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file.  Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denial of Service.  A type confusion vulnerability exists in PKCS#12 parsing code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid pointer read.  The location is constrained to a 1-byte address space, meaning any attempted pointer manipulation can only target addresses between 0x00 and 0xFF. This range corresponds to the zero page, which is unmapped on most modern operating systems and will reliably result in a crash, leading only to a Denial of Service. Exploiting this issue also requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For these reasons, the issue was assessed as Low severity.  The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS12 implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.  OpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-22795&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;: {&#xA;      &#34;id&#34;: &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2097&#34;,&#xA;      &#34;description&#34;: &#34;AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn&#39;t written. In the special case of \&#34;in place\&#34; encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-2097&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29458&#34;,&#xA;      &#34;description&#34;: &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-29458&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;6.2+20201114-2+deb11u1&#34;&#xA;    },&#xA;    &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function.  Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files.  The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct parameter is NULL before dereferencing it. When called from PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can be NULL, causing a crash. The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure.  Exploiting this issue requires an attacker to provide a malformed PKCS#12 file to an application that processes it. For that reason the issue was assessed as Low severity according to our Security Policy.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69421&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    }&#xA;  },&#xA;  &#34;package_vulnerabilities&#34;: {&#xA;    &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;: [&#xA;      &#34;KwgIGMm765S+zvIBAwM9+g==&#34;&#xA;    ],&#xA;    &#34;2MObxiEVNllmUEzdVZM5qw==&#34;: [&#xA;      &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;&#xA;    ],&#xA;    &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;: [&#xA;      &#34;U3JbUhrT2SqWNuYU5d13cQ==&#34;,&#xA;      &#34;+aR35vFmeRYa8dLzBaCMmQ==&#34;,&#xA;      &#34;DfxJWBpJUY1aHu0ZUSilDg==&#34;,&#xA;      &#34;jS/WQ+ua63nFUvjSzoQw1g==&#34;&#xA;    ],&#xA;    &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;&#xA;    ],&#xA;    &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;: [&#xA;      &#34;pmcR65l6CQ+6Qdh99gUtFQ==&#34;,&#xA;      &#34;Ud6njM/DPIrfSPiFct82Lw==&#34;,&#xA;      &#34;UdV1OleGh/0MAkug0ZAlcQ==&#34;,&#xA;      &#34;5Cmp5KJXv+nVwwcs5/Kz7w==&#34;,&#xA;      &#34;DS2nhayHHtinLlFzZheSwg==&#34;,&#xA;      &#34;6jg3v7lJ92IZCQpZydR2sA==&#34;,&#xA;      &#34;9ThuL3zLKpmduvKpiDZ60w==&#34;,&#xA;      &#34;5+uzHCKkmvMK8jl2uJkFqQ==&#34;,&#xA;      &#34;/7UJLAHsMPxTtTxvuPgrzA==&#34;,&#xA;      &#34;KZ3Jt7zkiM272dGLstI4XA==&#34;,&#xA;      &#34;o75dmeL6883s7llfbkU+PA==&#34;,&#xA;      &#34;IJPGr43VMeLym6tW3EWgdg==&#34;,&#xA;      &#34;hb+m0qlWxENYdrb1R811qA==&#34;,&#xA;      &#34;BtqRPc7F47wJWygPNOxw1w==&#34;,&#xA;      &#34;MdrEi+/OrLlW3zDrheID2Q==&#34;,&#xA;      &#34;r5SCr3Z1Q4buRwe6QvoIRg==&#34;,&#xA;      &#34;IvA5abshk33BAuuBar/pVQ==&#34;&#xA;    ],&#xA;    &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;: [&#xA;      &#34;meQYB1JR+XE3En/RrDfPvA==&#34;,&#xA;      &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;,&#xA;      &#34;GRlufCZFwHNK64OQNCFIcg==&#34;,&#xA;      &#34;uTSYWROavw8Bf2n+4djlMg==&#34;,&#xA;      &#34;U5598afGvRaltva6Rjqnug==&#34;,&#xA;      &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;,&#xA;      &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;,&#xA;      &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;,&#xA;      &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;,&#xA;      &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;,&#xA;      &#34;nApP7wP3SU/Fk79xF589WA==&#34;,&#xA;      &#34;1dwwvWkARnFe67yAAGVglQ==&#34;,&#xA;      &#34;swQXHeTg1VEUQHser/6eEQ==&#34;,&#xA;      &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;,&#xA;      &#34;0q/btA3zBEGWWmFxU7cNig==&#34;,&#xA;      &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;&#xA;    ],&#xA;    &#34;Akbft1KN+9FKNhh1tM25eA==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;CBzoMmlXBcyP54HOnauO0g==&#34;: [&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;&#xA;    ],&#xA;    &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;: [&#xA;      &#34;l6iyFrb04z9eZxh35gAtVA==&#34;,&#xA;      &#34;MYYkxlB4Ank1zsdIh41apg==&#34;,&#xA;      &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;,&#xA;      &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;,&#xA;      &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;,&#xA;      &#34;IwuADin5bagOGQErETBgWw==&#34;,&#xA;      &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;,&#xA;      &#34;s55QOTlka9E4jTdGv0d/FA==&#34;,&#xA;      &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;,&#xA;      &#34;OTqcMsspao5I6JZMETZ06w==&#34;,&#xA;      &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;,&#xA;      &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;,&#xA;      &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;,&#xA;      &#34;XQ5gIRaXVhDd6S954jtG2g==&#34;,&#xA;      &#34;pvJrwAdasLbb4sLGcD48Jg==&#34;,&#xA;      &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;,&#xA;      &#34;pa+2016jZIT5xycgFHsAsQ==&#34;,&#xA;      &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;,&#xA;      &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;,&#xA;      &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;,&#xA;      &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;,&#xA;      &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;,&#xA;      &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;,&#xA;      &#34;dDtfYPtAiWG7x5kc85ma8w==&#34;,&#xA;      &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;,&#xA;      &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;,&#xA;      &#34;/cV7Fn8Va+poBGxbPjGjrQ==&#34;,&#xA;      &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;&#xA;    ],&#xA;    &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;: [&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;RxgProNqXCgPRgAzu8keFA==&#34;,&#xA;      &#34;WRwV7Adc7Zuy6O98PPaFDw==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;&#xA;    ],&#xA;    &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;: [&#xA;      &#34;CtYegggqGbMfg16G/qfITQ==&#34;,&#xA;      &#34;WCGqond4znYKCRcm4xyPrg==&#34;,&#xA;      &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;,&#xA;      &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;,&#xA;      &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;,&#xA;      &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;&#xA;    ],&#xA;    &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;: [&#xA;      &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;,&#xA;      &#34;uspznaGFEzt4cX0xZ36sYw==&#34;,&#xA;      &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;,&#xA;      &#34;epkSU4TSX3BVrueh1mbRzg==&#34;,&#xA;      &#34;eietxU2AL+GdeSQwh6n6XA==&#34;,&#xA;      &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;,&#xA;      &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;,&#xA;      &#34;cZD87tDO2q60EFy3BAZ33g==&#34;,&#xA;      &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;,&#xA;      &#34;+N61/5529gFt7RkD8ooeKQ==&#34;,&#xA;      &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;,&#xA;      &#34;EajCJi704nU1+LqESNMC1w==&#34;,&#xA;      &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;,&#xA;      &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;,&#xA;      &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;,&#xA;      &#34;yyExMMKc3SPW2jNE01wTug==&#34;,&#xA;      &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;,&#xA;      &#34;afNm575eldgXY3DOGUNdqQ==&#34;,&#xA;      &#34;vmet9boOEsf+RUsh5rJnEw==&#34;,&#xA;      &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;,&#xA;      &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;,&#xA;      &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;,&#xA;      &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;,&#xA;      &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;,&#xA;      &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;,&#xA;      &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;,&#xA;      &#34;srcIw8ffB6famHHqmqImEw==&#34;,&#xA;      &#34;P4mYk7npVU6t91mlbAb8QA==&#34;,&#xA;      &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;,&#xA;      &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;,&#xA;      &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;&#xA;    ],&#xA;    &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;: [&#xA;      &#34;u+ya+p/mAtLPAYAgbSPTTw==&#34;&#xA;    ],&#xA;    &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;: [&#xA;      &#34;Mxv06g47iCk7QIqi7Xbojw==&#34;,&#xA;      &#34;5OqCQlhu6kV+tAsgGEGuwQ==&#34;&#xA;    ],&#xA;    &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;: [&#xA;      &#34;CtYegggqGbMfg16G/qfITQ==&#34;,&#xA;      &#34;WCGqond4znYKCRcm4xyPrg==&#34;,&#xA;      &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;,&#xA;      &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;,&#xA;      &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;,&#xA;      &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;&#xA;    ],&#xA;    &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;: [&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;RxgProNqXCgPRgAzu8keFA==&#34;,&#xA;      &#34;WRwV7Adc7Zuy6O98PPaFDw==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;&#xA;    ],&#xA;    &#34;PgPY5hWnihXRN45byvzY0g==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;&#xA;    ],&#xA;    &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;: [&#xA;      &#34;CaLsKNvkpKlxKVBlUnje9Q==&#34;,&#xA;      &#34;1U/zi3CEao+52y8LKU0uvw==&#34;,&#xA;      &#34;bZ2m6J3EIvmTdjYJprlOKA==&#34;,&#xA;      &#34;khiBNMMi17UID6UagXI8LA==&#34;&#xA;    ],&#xA;    &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;: [&#xA;      &#34;bNvH54V1y9cXsGaCXVwFVw==&#34;,&#xA;      &#34;QGq5D5QwQKPerzYOBVoSsg==&#34;,&#xA;      &#34;Jl0PQIP9L3ufSvQ2j71iww==&#34;,&#xA;      &#34;Qd2XnJZ3qaQ3AbyDXUaR2A==&#34;,&#xA;      &#34;Pj9V3uC2c9o+P6lTpzzGeA==&#34;&#xA;    ],&#xA;    &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;: [&#xA;      &#34;aWm6E1ULjtuw0ydmFnsI4A==&#34;&#xA;    ],&#xA;    &#34;RgdwX+VC70nXZ2E527PXaA==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;: [&#xA;      &#34;vcYYj1nbYwczzoLG255iZQ==&#34;&#xA;    ],&#xA;    &#34;Wi4oa03apqVdR6okNeZiNA==&#34;: [&#xA;      &#34;XtT5+z5+yMbpdsyfkLItzA==&#34;,&#xA;      &#34;HuTBrVHKx7uaMtQjiqifKQ==&#34;,&#xA;      &#34;9sNDKQtqg7Z3gJr//JQlvg==&#34;,&#xA;      &#34;Ul/kdhde9MT/cThQqWyUBA==&#34;,&#xA;      &#34;djiF0yOmYUIiWIfmt75aDA==&#34;,&#xA;      &#34;bBymk1eoEM+tVYB+/Crz+g==&#34;,&#xA;      &#34;kgqUyyy6Fd5CUNREC3t1jg==&#34;,&#xA;      &#34;LAgKryCll+DIcYhTR/xbzg==&#34;,&#xA;      &#34;RsDeaOU1gcwrKfmGECEolg==&#34;,&#xA;      &#34;qDLWFSo6NpfxWPhSeAS8zQ==&#34;,&#xA;      &#34;SNR1VT02i1HBHxqGRTeBAQ==&#34;,&#xA;      &#34;2TcHkpRhAP0iTCSGAQKUOg==&#34;,&#xA;      &#34;icG6omirC8ih0OmJHLIkrQ==&#34;,&#xA;      &#34;20nlQwJu4gG0Ex/vty+hig==&#34;,&#xA;      &#34;KaoEuixR8E5nnpGZ1pG25w==&#34;,&#xA;      &#34;Y++3+aMTeU3vX7BI4/zG6w==&#34;,&#xA;      &#34;7N1fkfhDIULrLId2wh2Pqw==&#34;,&#xA;      &#34;pVmDd54NDrNeiY7vPLSO2A==&#34;,&#xA;      &#34;ZbWtFXr0WyByV4kCb3M6FA==&#34;,&#xA;      &#34;3cBlPR7Tm4BIC/+wflldAg==&#34;,&#xA;      &#34;DTII3LzSaQL1baKsoSwsqg==&#34;,&#xA;      &#34;fUdim7gaWpwZtynNz5GiKg==&#34;,&#xA;      &#34;lpW8N25dDGtdRer0SxEc1A==&#34;,&#xA;      &#34;ErraMUPFwrdWYaj+aBxTMw==&#34;,&#xA;      &#34;h+ZYYwp9nAKs/v08piJa2A==&#34;,&#xA;      &#34;g44foSnimIkShQZtpEhjbQ==&#34;&#xA;    ],&#xA;    &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;: [&#xA;      &#34;08pa4udz9bnA9IOsE208DA==&#34;&#xA;    ],&#xA;    &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;: [&#xA;      &#34;Xce4H7xsVfrtYV2aXED7xA==&#34;,&#xA;      &#34;QopvyNp/5Ata9NdAUhFygw==&#34;,&#xA;      &#34;k6fjQGJuJ+9NXMFLa5+CgA==&#34;&#xA;    ],&#xA;    &#34;bTSLWiizipO2axtmvXFuVg==&#34;: [&#xA;      &#34;YXTNVVKQsWY/LFuomB715g==&#34;,&#xA;      &#34;lnMcIzRPoETIbrbgdDGINA==&#34;,&#xA;      &#34;6j23t/n6B77cQMxfCeLKzA==&#34;&#xA;    ],&#xA;    &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;: [&#xA;      &#34;l6iyFrb04z9eZxh35gAtVA==&#34;,&#xA;      &#34;MYYkxlB4Ank1zsdIh41apg==&#34;,&#xA;      &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;,&#xA;      &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;,&#xA;      &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;,&#xA;      &#34;IwuADin5bagOGQErETBgWw==&#34;,&#xA;      &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;,&#xA;      &#34;s55QOTlka9E4jTdGv0d/FA==&#34;,&#xA;      &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;,&#xA;      &#34;OTqcMsspao5I6JZMETZ06w==&#34;,&#xA;      &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;,&#xA;      &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;,&#xA;      &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;,&#xA;      &#34;XQ5gIRaXVhDd6S954jtG2g==&#34;,&#xA;      &#34;pvJrwAdasLbb4sLGcD48Jg==&#34;,&#xA;      &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;,&#xA;      &#34;pa+2016jZIT5xycgFHsAsQ==&#34;,&#xA;      &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;,&#xA;      &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;,&#xA;      &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;,&#xA;      &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;,&#xA;      &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;,&#xA;      &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;,&#xA;      &#34;dDtfYPtAiWG7x5kc85ma8w==&#34;,&#xA;      &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;,&#xA;      &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;,&#xA;      &#34;/cV7Fn8Va+poBGxbPjGjrQ==&#34;,&#xA;      &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;&#xA;    ],&#xA;    &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;: [&#xA;      &#34;NYWveHKKsIYIKl+vE8UEhw==&#34;&#xA;    ],&#xA;    &#34;dXglURzzdbLnOf14mab1Hg==&#34;: [&#xA;      &#34;VzolVkOS5HseGzVTLzDMfA==&#34;,&#xA;      &#34;WWnQMI7f7f75SgC9Dcl+QQ==&#34;,&#xA;      &#34;EYo03ICovWfCjw2cKpwx4Q==&#34;,&#xA;      &#34;27BVJE6xR0Z84LzifDnFYA==&#34;,&#xA;      &#34;9xk1p07t4ZV999E3HyfhVA==&#34;&#xA;    ],&#xA;    &#34;dobmrwm7aq9puvFHwNgXxw==&#34;: [&#xA;      &#34;08pa4udz9bnA9IOsE208DA==&#34;&#xA;    ],&#xA;    &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;: [&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;&#xA;    ],&#xA;    &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;: [&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;&#xA;    ],&#xA;    &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;: [&#xA;      &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;,&#xA;      &#34;uspznaGFEzt4cX0xZ36sYw==&#34;,&#xA;      &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;,&#xA;      &#34;epkSU4TSX3BVrueh1mbRzg==&#34;,&#xA;      &#34;eietxU2AL+GdeSQwh6n6XA==&#34;,&#xA;      &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;,&#xA;      &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;,&#xA;      &#34;cZD87tDO2q60EFy3BAZ33g==&#34;,&#xA;      &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;,&#xA;      &#34;+N61/5529gFt7RkD8ooeKQ==&#34;,&#xA;      &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;,&#xA;      &#34;EajCJi704nU1+LqESNMC1w==&#34;,&#xA;      &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;,&#xA;      &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;,&#xA;      &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;,&#xA;      &#34;yyExMMKc3SPW2jNE01wTug==&#34;,&#xA;      &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;,&#xA;      &#34;afNm575eldgXY3DOGUNdqQ==&#34;,&#xA;      &#34;vmet9boOEsf+RUsh5rJnEw==&#34;,&#xA;      &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;,&#xA;      &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;,&#xA;      &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;,&#xA;      &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;,&#xA;      &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;,&#xA;      &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;,&#xA;      &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;,&#xA;      &#34;srcIw8ffB6famHHqmqImEw==&#34;,&#xA;      &#34;P4mYk7npVU6t91mlbAb8QA==&#34;,&#xA;      &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;,&#xA;      &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;,&#xA;      &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;&#xA;    ],&#xA;    &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;: [&#xA;      &#34;MDmWztEMrTY+VyVp5c+Fvw==&#34;,&#xA;      &#34;MXRm//dBCnWFem5zffvqmA==&#34;&#xA;    ],&#xA;    &#34;hdNUjYIlrdEAtBWAggakAw==&#34;: [&#xA;      &#34;7DtFnnE8FjIpCQKunutpeg==&#34;,&#xA;      &#34;AvPdNumiwGnBie+lo1du3A==&#34;,&#xA;      &#34;brAAPyN4siIQT5bxa9xu4g==&#34;,&#xA;      &#34;k82HOcJqNkts86KJ0glvow==&#34;,&#xA;      &#34;ce9B0jxjyNiCfG4VtZhnVw==&#34;,&#xA;      &#34;m8d/cgBRVljmHKGy6mUUXw==&#34;&#xA;    ],&#xA;    &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;: [&#xA;      &#34;ZrZi02myDWWW0L5oPQj/cg==&#34;,&#xA;      &#34;oeIf5WAd0bERBmJCeLsqIg==&#34;,&#xA;      &#34;uEg5UAxE9NNjF71OxdO7uQ==&#34;,&#xA;      &#34;G45dR+E8Wb+bEhCdwuqUDg==&#34;,&#xA;      &#34;mJA9Uto8Hh0tElNp2qoYaA==&#34;&#xA;    ],&#xA;    &#34;jErhz6PtXvAy/EPWJ425rA==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;: [&#xA;      &#34;kwonOUycdcBenNhjZ1b//Q==&#34;,&#xA;      &#34;svo9ZP0wOZ7IXZp//n2f7g==&#34;,&#xA;      &#34;h7Lhy275V3QLvnBLGAulbw==&#34;&#xA;    ],&#xA;    &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;&#xA;    ],&#xA;    &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;: [&#xA;      &#34;ANq7+l7+5U6IDt9eU02u5w==&#34;,&#xA;      &#34;y2mOh8WlJTCvA6wlULAyvA==&#34;,&#xA;      &#34;F0zkrLGlbsix59P9mqoAOg==&#34;,&#xA;      &#34;WxlxRC1KqAo8Mejv03fZGA==&#34;&#xA;    ],&#xA;    &#34;lCjIskl1HulEHShaXtgmwQ==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;&#xA;    ],&#xA;    &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;: [&#xA;      &#34;dZ/H1sYv9QSX9VO93tlGLw==&#34;,&#xA;      &#34;PFkN8K2aK2XnSQjmAIry9A==&#34;,&#xA;      &#34;PUY4fn57nsAU2qBLtgRtdw==&#34;,&#xA;      &#34;8uv2vKf0QrdM+zJP4ufG+Q==&#34;,&#xA;      &#34;mj6UKCnVoHnC6YBWJGf/Ug==&#34;,&#xA;      &#34;WcYPrwv9PSVoVoof5MRsxQ==&#34;&#xA;    ],&#xA;    &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;: [&#xA;      &#34;tBbOIOCaKVlwik7hH/baMQ==&#34;,&#xA;      &#34;DRKFIYYNzLumACBV1CW/rw==&#34;,&#xA;      &#34;1VnWeA5AZgybyD8+PiXyiw==&#34;,&#xA;      &#34;tjx9raP+v/Zzj6SBJct3WA==&#34;,&#xA;      &#34;fharKhY7OXyx+gXJAwiegw==&#34;,&#xA;      &#34;dUTZP+bcDNUqytJV02E1dQ==&#34;,&#xA;      &#34;BxMnseA9J6OW2RWxSrlbyQ==&#34;&#xA;    ],&#xA;    &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;: [&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;RxgProNqXCgPRgAzu8keFA==&#34;,&#xA;      &#34;WRwV7Adc7Zuy6O98PPaFDw==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;&#xA;    ],&#xA;    &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;: [&#xA;      &#34;meQYB1JR+XE3En/RrDfPvA==&#34;,&#xA;      &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;,&#xA;      &#34;GRlufCZFwHNK64OQNCFIcg==&#34;,&#xA;      &#34;uTSYWROavw8Bf2n+4djlMg==&#34;,&#xA;      &#34;U5598afGvRaltva6Rjqnug==&#34;,&#xA;      &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;,&#xA;      &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;,&#xA;      &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;,&#xA;      &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;,&#xA;      &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;,&#xA;      &#34;nApP7wP3SU/Fk79xF589WA==&#34;,&#xA;      &#34;1dwwvWkARnFe67yAAGVglQ==&#34;,&#xA;      &#34;swQXHeTg1VEUQHser/6eEQ==&#34;,&#xA;      &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;,&#xA;      &#34;0q/btA3zBEGWWmFxU7cNig==&#34;,&#xA;      &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;&#xA;    ],&#xA;    &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;: [&#xA;      &#34;B78vSIll2muNDyY3F7urzw==&#34;&#xA;    ],&#xA;    &#34;tYADP/V07/lE8Qno1R/hhg==&#34;: [&#xA;      &#34;08pa4udz9bnA9IOsE208DA==&#34;&#xA;    ],&#xA;    &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;: [&#xA;      &#34;fXJD4KsFmfzjgWJPYHqTrQ==&#34;&#xA;    ],&#xA;    &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;: [&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;&#xA;    ],&#xA;    &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;: [&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;RxgProNqXCgPRgAzu8keFA==&#34;,&#xA;      &#34;WRwV7Adc7Zuy6O98PPaFDw==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;&#xA;    ],&#xA;    &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;: [&#xA;      &#34;qGfgK6gESZLmw0X26VnrJw==&#34;&#xA;    ],&#xA;    &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;: [&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;&#xA;    ],&#xA;    &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;: [&#xA;      &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;&#xA;    ]&#xA;  },&#xA;  &#34;enrichments&#34;: {}&#xA;}&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-clair-scan-pod | container step-oci-attach-report: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin&#xA;Attaching clair-report-amd64.json to quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#xA;Executing: oras attach --no-tty --format go-template={{.digest}} --registry-config /home/oras/auth.json --artifact-type application/vnd.redhat.clair-report+json quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3 clair-report-amd64.json:application/vnd.redhat.clair-report+json&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-clair-scan-pod | container step-conftest-vulnerabilities: &#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/clair-result-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 7,&#xA;&#x9;&#x9;&#34;warnings&#34;: [&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched medium vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: coreutils-8.32-4+b1 (CVE-2016-2781)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 1&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libsqlite3-0-3.34.1-3 (CVE-2021-45346, CVE-2022-35737, CVE-2025-29088, CVE-2025-70873), libmount1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libc-bin-2.31-13+deb11u5 (CVE-2010-4756, CVE-2018-20796, CVE-2019-1010022, CVE-2019-1010023, CVE-2019-1010024, CVE-2019-1010025, CVE-2019-9192), bsdutils-1:2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libsystemd0-247.3-7+deb11u1 (CVE-2013-4392, CVE-2020-13529, CVE-2023-31437, CVE-2023-31438, CVE-2023-31439), libapt-pkg6.0-2.2.4 (CVE-2011-3374), passwd-1:4.8.1-1 (CVE-2007-5686, CVE-2013-4235, TEMP-0628843-DBAD28), tar-1.34+dfsg-1 (CVE-2005-2541, TEMP-0290435-0B57B5), libuuid1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libsmartcols1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), coreutils-8.32-4+b1 (CVE-2017-18018, CVE-2025-5278), perl-base-5.32.1-4+deb11u2 (CVE-2011-4116, CVE-2023-31486), libgssapi-krb5-2-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), mount-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libgcc-s1-10.2.1-6 (CVE-2023-4039), apt-2.2.4 (CVE-2011-3374), sysvinit-utils-2.96-7+deb11u1 (TEMP-0517018-A83CE6), login-1:4.8.1-1 (CVE-2007-5686, CVE-2013-4235, TEMP-0628843-DBAD28), gcc-9-base-9.3.0-22 (CVE-2023-4039), libpcre3-2:8.39-13 (CVE-2017-11164, CVE-2017-16231, CVE-2017-7245, CVE-2017-7246, CVE-2019-20838), libstdc++6-10.2.1-6 (CVE-2023-4039), gpgv-2.2.27-2+deb11u2 (CVE-2022-3219), gcc-10-base-10.2.1-6 (CVE-2023-4039), libexpat1-2.2.10-2+deb11u5 (CVE-2013-0340, CVE-2023-52426, CVE-2024-28757), libgnutls30-3.7.1-5+deb11u2 (CVE-2011-3389), util-linux-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libblkid1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libc6-2.31-13+deb11u5 (CVE-2010-4756, CVE-2018-20796, CVE-2019-1010022, CVE-2019-1010023, CVE-2019-1010024, CVE-2019-1010025, CVE-2019-9192), libssl1.1-1.1.1n-0+deb11u3 (CVE-2025-27587), libk5crypto3-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), bash-5.1-2+deb11u1 (TEMP-0841856-B18BAF), openssl-1.1.1n-0+deb11u3 (CVE-2025-27587), libkrb5-3-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), libpcre2-8-0-10.36-2+deb11u1 (CVE-2022-41409), libudev1-247.3-7+deb11u1 (CVE-2013-4392, CVE-2020-13529, CVE-2023-31437, CVE-2023-31438, CVE-2023-31439), libkrb5support0-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), libgcrypt20-1.8.7-6 (CVE-2018-6829, CVE-2024-2236)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_low_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 89&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched unknown vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libsqlite3-0-3.34.1-3 (CVE-2025-6965), libdb5.3-5.3.28+dfsg1-0.8 (CVE-2019-8457), ncurses-base-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libmount1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libc-bin-2.31-13+deb11u5 (CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-8058, CVE-2026-0861, CVE-2026-0915, CVE-2026-4046, CVE-2026-4437, CVE-2026-4438, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928, CVE-2026-6238), bsdutils-1:2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libpam-runtime-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), libzstd1-1.4.8+dfsg-2.1 (CVE-2022-4899), libsystemd0-247.3-7+deb11u1 (CVE-2026-40228), passwd-1:4.8.1-1 (CVE-2024-56433), tar-1.34+dfsg-1 (CVE-2026-5704), zlib1g-1:1.2.11.dfsg-2+deb11u2 (CVE-2023-45853, CVE-2026-27171), libuuid1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libsmartcols1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libtinfo6-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), sed-4.7-1 (CVE-2026-5958), libgssapi-krb5-2-1.18.3-6+deb11u3 (CVE-2026-40355, CVE-2026-40356), mount-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libncursesw6-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), login-1:4.8.1-1 (CVE-2024-56433), liblzma5-5.2.5-2.1~deb11u1 (CVE-2026-34743), gpgv-2.2.27-2+deb11u2 (CVE-2025-30258, CVE-2025-68972), dpkg-1.20.12 (CVE-2025-6297), libexpat1-2.2.10-2+deb11u5 (CVE-2024-8176, CVE-2025-59375, CVE-2025-66382, CVE-2026-24515, CVE-2026-25210, CVE-2026-32776, CVE-2026-32777, CVE-2026-32778, CVE-2026-41080), libgnutls30-3.7.1-5+deb11u2 (CVE-2026-33845, CVE-2026-33846, CVE-2026-3832, CVE-2026-3833, CVE-2026-42009, CVE-2026-42010, CVE-2026-42011, CVE-2026-42012, CVE-2026-42013, CVE-2026-42014, CVE-2026-42015, CVE-2026-5260, CVE-2026-5419), util-linux-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libblkid1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libc6-2.31-13+deb11u5 (CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-8058, CVE-2026-0861, CVE-2026-0915, CVE-2026-4046, CVE-2026-4437, CVE-2026-4438, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928, CVE-2026-6238), libssl1.1-1.1.1n-0+deb11u3 (CVE-2026-28387, CVE-2026-28388, CVE-2026-28389, CVE-2026-28390), libpam-modules-bin-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), libk5crypto3-1.18.3-6+deb11u3 (CVE-2026-40355, CVE-2026-40356), bash-5.1-2+deb11u1 (CVE-2022-3715), libpam0g-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), libpam-modules-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), openssl-1.1.1n-0+deb11u3 (CVE-2026-28387, CVE-2026-28388, CVE-2026-28389, CVE-2026-28390), libkrb5-3-1.18.3-6+deb11u3 (CVE-2026-40355, CVE-2026-40356), ncurses-bin-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libudev1-247.3-7+deb11u1 (CVE-2026-40228), libkrb5support0-1.18.3-6+deb11u3 (CVE-2026-40355, CVE-2026-40356), libgcrypt20-1.8.7-6 (CVE-2021-33560, CVE-2026-41989), libtasn1-6-4.16.0-2 (CVE-2025-13151)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_unknown_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 117&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;]&#xA;&#x9;}&#xA;]&#xA;{&#34;vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:0,&#34;medium&#34;:0,&#34;low&#34;:0,&#34;unknown&#34;:0},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:0,&#34;medium&#34;:1,&#34;low&#34;:89,&#34;unknown&#34;:117}}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#34;, &#34;digests&#34;: [&#34;sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#34;]}}&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:10:38+00:00&#34;,&#34;note&#34;:&#34;Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-clamav-scan-pod | init container: prepare&#xA;2026/05/06 07:06:34 Entrypoint initialization&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-clamav-scan-pod | init container: place-scripts&#xA;2026/05/06 07:06:41 Decoded script /tekton/scripts/script-0-fwnmq&#xA;2026/05/06 07:06:41 Decoded script /tekton/scripts/script-1-gnf7b&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-clamav-scan-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 34.924 sec (0 m 34 s)&#xA;Start Date: 2026:05:06 07:07:13&#xA;End Date:   2026:05:06 07:07:47&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27992/Tue May  5 06:26:41 2026 Database version: 27992&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1778051268&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778051268&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778051268&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#34;, &#34;digests&#34;: [&#34;sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#34;]}}&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-clamav-scan-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc@sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading ec0475dde633 clamscan-ec-test-amd64.json&#xA;Uploading 3c65243005d3 clamscan-result-amd64.log&#xA;Uploaded  ec0475dde633 clamscan-ec-test-amd64.json&#xA;Uploaded  3c65243005d3 clamscan-result-amd64.log&#xA;Uploading 6e790af6c0d5 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  6e790af6c0d5 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc@sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#xA;Digest: sha256:6e790af6c0d57613b4a884b1bd57530acc3fcb91bb8558241e8f5bf44435ea01&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-clone-repository-pod | init container: prepare&#xA;2026/05/06 07:04:04 Entrypoint initialization&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-clone-repository-pod | init container: place-scripts&#xA;2026/05/06 07:04:04 Decoded script /tekton/scripts/script-0-v5ktm&#xA;2026/05/06 07:04:04 Decoded script /tekton/scripts/script-1-qdpvf&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051054.59503,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051054.820704,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-python-basic @ 7ef594af8804f542e0ce08ca6eb1b4cc840deffc (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051054.8207495,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051054.847787,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision 7ef594af8804f542e0ce08ca6eb1b4cc840deffc directly.&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-clone-repository-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:6a47c6bf7dc3eabf4e15441f8a3fdec1e0c421c5ed5ef9b3976fc7df590545ee)&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin&#xA;Executing: oras push --annotation=quay.expires-after=6h --registry-config /tmp/create-oci.sh.Ch3W9x/auth-4QrWpd.json quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc.git SOURCE_ARTIFACT&#xA;Uploading 6a47c6bf7dc3 SOURCE_ARTIFACT&#xA;Uploaded  6a47c6bf7dc3 SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:952980d000df9cfa43498fb62940a45f5b49ad65512bc65fc83b06b8331c77ca&#xA;Artifacts created&#xA;&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-init-pod | init container: prepare&#xA;2026/05/06 07:03:55 Entrypoint initialization&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-init-pod | container step-init: &#xA;time=&#34;2026-05-06T07:03:58Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-06T07:03:58Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-06T07:03:58Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-06T07:03:58Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-06T07:03:58Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-06T07:03:58Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:03:58Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-06T07:03:58Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-06T07:03:58Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-prefetch-dependencies-pod | init container: prepare&#xA;2026/05/06 07:04:22 Entrypoint initialization&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-prefetch-dependencies-pod | init container: place-scripts&#xA;2026/05/06 07:04:23 Decoded script /tekton/scripts/script-0-8jvlc&#xA;2026/05/06 07:04:23 Decoded script /tekton/scripts/script-2-77q76&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-prefetch-dependencies-pod | container step-skip-ta: &#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-prefetch-dependencies-pod | container step-use-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-prefetch-dependencies-pod | container step-prefetch-dependencies: &#xA;Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using mounted service CA bundle: /mnt/service-ca/ca-bundle.crt&#xA;&#39;/mnt/service-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/service-ca.crt&#39;&#xA;time=&#34;2026-05-06T07:04:29Z&#34; level=debug msg=&#34;Starting prefetch-dependencies&#34;&#xA;time=&#34;2026-05-06T07:04:29Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:04:29Z&#34; level=info msg=&#34;Not using package registry proxy because allow-package-registry-proxy is not set to `true` on the cluster level&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-06T07:04:29Z&#34; level=info msg=&#34;[param] source-dir: /var/workdir/source&#34;&#xA;time=&#34;2026-05-06T07:04:29Z&#34; level=info msg=&#34;[param] output-dir: /var/workdir/cachi2/output&#34;&#xA;time=&#34;2026-05-06T07:04:29Z&#34; level=info msg=&#34;[param] sbom-format: spdx&#34;&#xA;time=&#34;2026-05-06T07:04:29Z&#34; level=info msg=&#34;[param] mode: strict&#34;&#xA;time=&#34;2026-05-06T07:04:29Z&#34; level=info msg=&#34;[param] output-dir-mount-point: /cachi2/output&#34;&#xA;time=&#34;2026-05-06T07:04:29Z&#34; level=info msg=&#34;[param] env-files: [/var/workdir/cachi2/cachi2.env /var/workdir/cachi2/prefetch.env /var/workdir/cachi2/prefetch-env.json]&#34;&#xA;time=&#34;2026-05-06T07:04:29Z&#34; level=info msg=&#34;[param] git-auth-directory: /workspace/git-basic-auth&#34;&#xA;time=&#34;2026-05-06T07:04:30Z&#34; level=info msg=&#34;hermeto [stdout] hermeto 0.51.0&#34; logger=CliExecutor&#xA;time=&#34;2026-05-06T07:04:30Z&#34; level=warning msg=&#34;No input provided; skipping prefetch-dependencies&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-06T07:04:30Z&#34; level=debug msg=&#34;Finished prefetch-dependencies&#34;&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-prefetch-dependencies-pod | container step-create-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;WARN: found skip file in /var/workdir/cachi2&#xA;&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-push-dockerfile-pod | init container: prepare&#xA;2026/05/06 07:07:17 Entrypoint initialization&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-push-dockerfile-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.2AP7GK/auth-ZvztdO.json quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:6a47c6bf7dc3eabf4e15441f8a3fdec1e0c421c5ed5ef9b3976fc7df590545ee --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:6a47c6bf7dc3eabf4e15441f8a3fdec1e0c421c5ed5ef9b3976fc7df590545ee to /var/workdir/source&#xA;&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-push-dockerfile-pod | container step-push: &#xA;time=&#34;2026-05-06T07:07:20Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin:on-pr-7ef594af8804f542e0ce08ca6eb1b4cc840deffc&#34;&#xA;time=&#34;2026-05-06T07:07:20Z&#34; level=info msg=&#34;[param] image-digest: sha256:11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3&#34;&#xA;time=&#34;2026-05-06T07:07:20Z&#34; level=info msg=&#34;[param] containerfile: docker/Dockerfile&#34;&#xA;time=&#34;2026-05-06T07:07:20Z&#34; level=info msg=&#34;[param] context: .&#34;&#xA;time=&#34;2026-05-06T07:07:20Z&#34; level=info msg=&#34;[param] tag-suffix: .dockerfile&#34;&#xA;time=&#34;2026-05-06T07:07:20Z&#34; level=info msg=&#34;[param] artifact-type: application/vnd.konflux.dockerfile&#34;&#xA;time=&#34;2026-05-06T07:07:20Z&#34; level=info msg=&#34;[param] source: source&#34;&#xA;time=&#34;2026-05-06T07:07:20Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-06T07:07:20Z&#34; level=info msg=&#34;[param] alternative-filename: Dockerfile&#34;&#xA;time=&#34;2026-05-06T07:07:22Z&#34; level=info msg=&#34;oras [stdout] quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:10fda0f366ec6effa28a72544be4f9a9a5d2382e559bf56c98d282bbfe4f19ef&#34; logger=CliExecutor&#xA;time=&#34;2026-05-06T07:07:22Z&#34; level=info msg=&#34;Containerfile &#39;/var/workdir/source/docker/Dockerfile&#39; is pushed to registry with tag: sha256-11aa3b04d4b45a49211382ab7cffe5a39c2e687ff85eeb32884e8d28471ce1d3.dockerfile&#34;&#xA;{&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:10fda0f366ec6effa28a72544be4f9a9a5d2382e559bf56c98d282bbfe4f19ef&#34;}&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-sast-snyk-check-pod | init container: prepare&#xA;2026/05/06 07:07:17 Entrypoint initialization&#xA;&#xA; pod: test-comp-ewin-on-pull-request-gs2jz-sast-snyk-check-pod | init container: place-scripts&#xA;2026/05/06 07:07:17 Decoded script /tekton/scripts/script-1-4jhrp&#xA;2026/05/06 07:07:17 Decoded script /tekton/scripts/script-2-hwxdd&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-sast-snyk-check-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.nmPxYd/auth-F76NrR.json quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:6a47c6bf7dc3eabf4e15441f8a3fdec1e0c421c5ed5ef9b3976fc7df590545ee --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-fnei/test-comp-ewin@sha256:6a47c6bf7dc3eabf4e15441f8a3fdec1e0c421c5ed5ef9b3976fc7df590545ee to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-sast-snyk-check-pod | container step-sast-snyk-check: &#xA;INFO: The PROJECT_NAME used is: test-comp-ewin&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;{&#34;result&#34;:&#34;SKIPPED&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:08:54+00:00&#34;,&#34;note&#34;:&#34;Task sast-snyk-check-oci-ta skipped: If you wish to use the Snyk code SAST task, please create a secret name snyk-secret with the key &#39;snyk_token&#39; containing the Snyk token by following the steps given [here](https://konflux-ci.dev/docs/testing/build/snyk/)&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA;pod: test-comp-ewin-on-pull-request-gs2jz-sast-snyk-check-pod | container step-upload: &#xA;No sast_snyk_check_out.sarif exists. Skipping upload.&#xA;No excluded-findings.json exists. Skipping upload.&#xA;New PipelineRun test-comp-ewin-on-pull-request-ndkct found after retrigger for component build-e2e-fnei/test-comp-ewin&#xA;PipelineRun test-comp-ewin-on-pull-request-ndkct found for Component build-e2e-fnei/test-comp-ewin&#xA;PipelineRun test-comp-ewin-on-pull-request-ndkct reason: ResolvingTaskRef&#xA;PipelineRun test-comp-ewin-on-pull-request-ndkct reason: Running&#xA;PipelineRun test-comp-ewin-on-pull-request-ndkct reason: Running&#xA;PipelineRun test-comp-ewin-on-pull-request-ndkct reason: Running&#xA;PipelineRun test-comp-ewin-on-pull-request-ndkct reason: Running&#xA;PipelineRun test-comp-ewin-on-pull-request-ndkct reason: Running&#xA;PipelineRun test-comp-ewin-on-pull-request-ndkct reason: Running&#xA;PipelineRun test-comp-ewin-on-pull-request-ndkct reason: Running&#xA;PipelineRun test-comp-ewin-on-pull-request-ndkct reason: Completed&#xA;&lt; Exit [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:356 @ 05/06/26 07:19:04.309 (2m55.013s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:04.309&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:04.31 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="4.36091094">
              <system-err>&gt; Enter [It] should push Dockerfile to registry - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:366 @ 05/06/26 07:19:04.312&#xA;&lt; Exit [It] should push Dockerfile to registry - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:366 @ 05/06/26 07:19:08.672 (4.36s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:08.672&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:08.672 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.00036012">
              <skipped message="skipped - floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic"></skipped>
              <system-err>&gt; Enter [It] floating tags are created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:378 @ 05/06/26 07:19:08.673&#xA;[SKIPPED] floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:380 @ 05/06/26 07:19:08.673&#xA;&lt; Exit [It] floating tags are created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:378 @ 05/06/26 07:19:08.673 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:08.673&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:08.673 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.324901179">
              <system-err>&gt; Enter [It] image manifest mediaType is correct - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:395 @ 05/06/26 07:19:08.673&#xA;&lt; Exit [It] image manifest mediaType is correct - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:395 @ 05/06/26 07:19:08.998 (325ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:08.998&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:08.998 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.015474741">
              <skipped message="skipped - Skipping source image check since it is not enabled in the pipeline"></skipped>
              <system-err>&gt; Enter [It] check for source images if enabled in pipeline - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:420 @ 05/06/26 07:19:08.999&#xA;Source build is enabled: false&#xA;[SKIPPED] Skipping source image check since it is not enabled in the pipeline&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:440 @ 05/06/26 07:19:09.014&#xA;&lt; Exit [It] check for source images if enabled in pipeline - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:420 @ 05/06/26 07:19:09.014 (15ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.014&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.014 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="0.107298592">
              <system-err>&gt; Enter [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:477 @ 05/06/26 07:19:09.014&#xA;&lt; Exit [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:477 @ 05/06/26 07:19:09.044 (29ms)&#xA;&gt; Enter [It] should have Pipeline Records - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:498 @ 05/06/26 07:19:09.044&#xA;records for PipelineRun test-comp-ewin-on-pull-request-ndkct:&#xA;&amp;{[{build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/b38f81b4-3245-42b8-947a-6bd4f0b9acd7 07be85cd-055d-43b7-b664-99d1f9ec04fb 07be85cd-055d-43b7-b664-99d1f9ec04fb} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/9a1789e1-5927-4603-b36f-2c1961ebbf4c 0a904020-4dcf-439d-beca-b671a0723896 0a904020-4dcf-439d-beca-b671a0723896} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/01c2471d-8adc-482c-a2f1-49ac7018fe4a 0e1ec7cd-b5d6-4589-9c5d-81f786dc7436 0e1ec7cd-b5d6-4589-9c5d-81f786dc7436} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/7cbef2ae-9dc6-45d1-9320-b2a06a332bc4 1839a49d-0ea5-4643-839d-a691dc6e5741 1839a49d-0ea5-4643-839d-a691dc6e5741} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/4086b863-81a0-42e4-9d47-092037925a45 2b2ddbbf-9dc9-4d7a-9ceb-e915c9eb957a 2b2ddbbf-9dc9-4d7a-9ceb-e915c9eb957a} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/eed26229-bcb3-4fda-b2d1-49f684f4892a 2ce645e8-d723-468f-aba2-e76099a625ba 2ce645e8-d723-468f-aba2-e76099a625ba} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/ed3a8201-1a73-44bb-8e16-eac218b5d220 3e3e1a20-f552-4561-af23-c81c936a7707 3e3e1a20-f552-4561-af23-c81c936a7707} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/7446c5e5-6f68-4ae4-92bf-1221717a4448 634b5484-a145-4a5a-868a-ba9a8d59bd5a 634b5484-a145-4a5a-868a-ba9a8d59bd5a} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/5138425b-19c3-489d-8f8f-228d01a518e6 6db4250f-412d-469b-87e4-c5b9005c4a36 6db4250f-412d-469b-87e4-c5b9005c4a36} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/10c547e9-f031-4a99-ad2a-187c776b5d53 7775078d-e1bf-4762-8892-2196eba89af7 7775078d-e1bf-4762-8892-2196eba89af7} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/670e320c-18ef-434d-8306-0bbcd87807ff b7de5f74-ed03-43a0-92a5-8fbd7866054f b7de5f74-ed03-43a0-92a5-8fbd7866054f} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/99accef2-3fc7-4c2c-8dd2-add460b601da bdba5f8e-37f2-4b94-9083-e2822a3a49e5 bdba5f8e-37f2-4b94-9083-e2822a3a49e5} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/ae7e1874-ede0-48e2-b8f0-1891240cc9a6 c9549043-480a-4a6a-ba51-d38dd4ceedbc c9549043-480a-4a6a-ba51-d38dd4ceedbc} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/c48342c6-ebc5-4281-a602-b9b74d262a73 da33affe-58c4-4a05-9069-8258fd53e915 da33affe-58c4-4a05-9069-8258fd53e915} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/113faff3-40d5-4662-a659-de6ba344fc72 e2f04c01-4a30-47d6-a78f-92d8a46aec59 e2f04c01-4a30-47d6-a78f-92d8a46aec59} {build-e2e-fnei/results/c48342c6-ebc5-4281-a602-b9b74d262a73/records/78871122-d881-4b3e-9c86-d30b0c942538 f25010a6-df51-4036-b2ce-34a06ed7cc0d f25010a6-df51-4036-b2ce-34a06ed7cc0d}]}&#xA;&lt; Exit [It] should have Pipeline Records - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:498 @ 05/06/26 07:19:09.121 (78ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.122&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.122 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.225489567">
              <system-err>&gt; Enter [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:540 @ 05/06/26 07:19:09.122&#xA;&lt; Exit [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:540 @ 05/06/26 07:19:09.347 (225ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.348&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.348 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.012799907">
              <skipped message="skipped - Hermetic build is not enabled, skipping the test"></skipped>
              <system-err>&gt; Enter [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:550 @ 05/06/26 07:19:09.348&#xA;&lt; Exit [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:550 @ 05/06/26 07:19:09.361 (12ms)&#xA;&gt; Enter [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:661 @ 05/06/26 07:19:09.361&#xA;[SKIPPED] Hermetic build is not enabled, skipping the test&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:663 @ 05/06/26 07:19:09.361&#xA;&lt; Exit [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:661 @ 05/06/26 07:19:09.361 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.361&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.361 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.028422873">
              <system-err>&gt; Enter [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:356 @ 05/06/26 07:19:09.362&#xA;PipelineRun test-comp-jwrp-on-pull-request-8qgsm found for Component build-e2e-fnei/test-comp-jwrp&#xA;PipelineRun test-comp-jwrp-on-pull-request-8qgsm reason: Succeeded&#xA;&lt; Exit [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:356 @ 05/06/26 07:19:09.39 (28ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.39&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.39 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.000322929">
              <skipped message="skipped - Skipping DockerBuildOciTAMin build, which does not push Dockerfile to registry"></skipped>
              <system-err>&gt; Enter [It] should push Dockerfile to registry - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:366 @ 05/06/26 07:19:09.39&#xA;[SKIPPED] Skipping DockerBuildOciTAMin build, which does not push Dockerfile to registry&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:369 @ 05/06/26 07:19:09.39&#xA;&lt; Exit [It] should push Dockerfile to registry - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:366 @ 05/06/26 07:19:09.39 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.39&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.39 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.000277558">
              <skipped message="skipped - floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic"></skipped>
              <system-err>&gt; Enter [It] floating tags are created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:378 @ 05/06/26 07:19:09.391&#xA;[SKIPPED] floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:380 @ 05/06/26 07:19:09.391&#xA;&lt; Exit [It] floating tags are created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:378 @ 05/06/26 07:19:09.391 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.391&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.391 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.319501418">
              <system-err>&gt; Enter [It] image manifest mediaType is correct - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:395 @ 05/06/26 07:19:09.391&#xA;&lt; Exit [It] image manifest mediaType is correct - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:395 @ 05/06/26 07:19:09.711 (319ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.711&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.711 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.010902354">
              <skipped message="skipped - Skiping DockerBuildOciTAMin build test-comp-jwrp-on-pull-request-8qgsm"></skipped>
              <system-err>&gt; Enter [It] check for source images if enabled in pipeline - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:420 @ 05/06/26 07:19:09.711&#xA;This is DockerBuildOciTAMin build, which does not require source container build.&#xA;[SKIPPED] Skiping DockerBuildOciTAMin build test-comp-jwrp-on-pull-request-8qgsm&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:433 @ 05/06/26 07:19:09.722&#xA;&lt; Exit [It] check for source images if enabled in pipeline - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:420 @ 05/06/26 07:19:09.722 (11ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.722&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.722 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="0.160540026">
              <system-err>&gt; Enter [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:477 @ 05/06/26 07:19:09.722&#xA;&lt; Exit [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:477 @ 05/06/26 07:19:09.827 (104ms)&#xA;&gt; Enter [It] should have Pipeline Records - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:498 @ 05/06/26 07:19:09.827&#xA;records for PipelineRun test-comp-jwrp-on-pull-request-8qgsm:&#xA;&amp;{[{build-e2e-fnei/results/4ae06390-ed72-4f81-b64c-945c48341efd/records/828eeefc-00c3-4787-996d-089f179ccca5 29c3cf18-cde2-44d5-8953-bbd9d55b391b 29c3cf18-cde2-44d5-8953-bbd9d55b391b} {build-e2e-fnei/results/4ae06390-ed72-4f81-b64c-945c48341efd/records/b73b56d3-375d-4504-a619-e69137575eab 2bec4975-ebb1-4d30-9766-2560c43f830b 2bec4975-ebb1-4d30-9766-2560c43f830b} {build-e2e-fnei/results/4ae06390-ed72-4f81-b64c-945c48341efd/records/b7bfd118-fdcd-4140-a5b3-616886da7c9f 314c5370-17a5-4c0c-bcfe-768f9f84f347 314c5370-17a5-4c0c-bcfe-768f9f84f347} {build-e2e-fnei/results/4ae06390-ed72-4f81-b64c-945c48341efd/records/4ae06390-ed72-4f81-b64c-945c48341efd 41232e66-58e5-4b79-8b43-708edbba739e 41232e66-58e5-4b79-8b43-708edbba739e} {build-e2e-fnei/results/4ae06390-ed72-4f81-b64c-945c48341efd/records/7ac98121-8c3e-4030-8ac1-33198dbf7ed0 467869f1-29b7-4fd2-8dbc-d7784ea6af58 467869f1-29b7-4fd2-8dbc-d7784ea6af58} {build-e2e-fnei/results/4ae06390-ed72-4f81-b64c-945c48341efd/records/866be670-8083-4965-bd39-497828659102 63fb2235-4c80-479c-adca-57d462f81a14 63fb2235-4c80-479c-adca-57d462f81a14} {build-e2e-fnei/results/4ae06390-ed72-4f81-b64c-945c48341efd/records/cb52fcf8-ac1f-479e-9d00-d1403837f683 6480f0da-525c-453e-8552-ef5d295bc2ef 6480f0da-525c-453e-8552-ef5d295bc2ef} {build-e2e-fnei/results/4ae06390-ed72-4f81-b64c-945c48341efd/records/c1339f17-3060-4b18-9a2a-ea3c9647ab2a a77c1f65-2fe7-4329-98fa-fe8649ebcf71 a77c1f65-2fe7-4329-98fa-fe8649ebcf71} {build-e2e-fnei/results/4ae06390-ed72-4f81-b64c-945c48341efd/records/b85a4dfa-0b87-4ad3-b569-39022bc57061 b63d12c6-8ee5-4b2d-b74f-6dfd7f66d8e8 b63d12c6-8ee5-4b2d-b74f-6dfd7f66d8e8} {build-e2e-fnei/results/4ae06390-ed72-4f81-b64c-945c48341efd/records/d029eb59-7fc6-48a1-b03b-009f96cd8a65 c4808d79-619c-4904-88aa-d5dcab26ab11 c4808d79-619c-4904-88aa-d5dcab26ab11} {build-e2e-fnei/results/4ae06390-ed72-4f81-b64c-945c48341efd/records/9fc3599d-3cd8-4690-924e-9c8582296579 e90a44fd-5b4a-4022-b318-ca94a40764d3 e90a44fd-5b4a-4022-b318-ca94a40764d3} {build-e2e-fnei/results/4ae06390-ed72-4f81-b64c-945c48341efd/records/e5e30e5a-bfb6-449e-bbb0-de912520aca1 eb9f9c38-c2c9-4087-b5c0-e00305b7be46 eb9f9c38-c2c9-4087-b5c0-e00305b7be46}]}&#xA;&lt; Exit [It] should have Pipeline Records - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:498 @ 05/06/26 07:19:09.883 (56ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.883&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.883 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.024624887">
              <system-err>&gt; Enter [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:540 @ 05/06/26 07:19:09.883&#xA;&lt; Exit [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:540 @ 05/06/26 07:19:09.908 (24ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.908&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.908 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.007620292">
              <skipped message="skipped - Hermetic build is not enabled, skipping the test"></skipped>
              <system-err>&gt; Enter [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:550 @ 05/06/26 07:19:09.909&#xA;&lt; Exit [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:550 @ 05/06/26 07:19:09.916 (7ms)&#xA;&gt; Enter [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:661 @ 05/06/26 07:19:09.916&#xA;[SKIPPED] Hermetic build is not enabled, skipping the test&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:663 @ 05/06/26 07:19:09.916&#xA;&lt; Exit [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:661 @ 05/06/26 07:19:09.916 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.916&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:09.916 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines pipelineRun should fail for symlink component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-zxqf [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="13.484027778">
              <system-err>&gt; Enter [It] pipelineRun should fail for symlink component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-zxqf - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:816 @ 05/06/26 07:19:09.917&#xA;PipelineRun test-symlink-comp-zxqf-on-pull-request-fv2qz found for Component build-e2e-fnei/test-symlink-comp-zxqf&#xA;PipelineRun test-symlink-comp-zxqf-on-pull-request-fv2qz reason: Failed&#xA;attempt 1/1: PipelineRun &#34;test-symlink-comp-zxqf-on-pull-request-fv2qz&#34; failed: &#xA; pod: test-symlink-comp-zxqf-on-p860606fe82edc37555f68bfc42821aa4-pod | init container: prepare&#xA;2026/05/06 07:04:57 Entrypoint initialization&#xA;&#xA; pod: test-symlink-comp-zxqf-on-p860606fe82edc37555f68bfc42821aa4-pod | init container: place-scripts&#xA;2026/05/06 07:04:58 Decoded script /tekton/scripts/script-0-hjcb2&#xA;2026/05/06 07:04:58 Decoded script /tekton/scripts/script-1-zbmqp&#xA;&#xA;pod: test-symlink-comp-zxqf-on-p860606fe82edc37555f68bfc42821aa4-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051107.5197802,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051107.7577493,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-python-basic @ 345ce2e175457dab78d7e761ed7afb813c73b914 (grafted, HEAD) in path /workspace/output/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051107.7577946,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051107.7826765,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /workspace/output/source&#34;}&#xA;Merge option disabled. Using checked-out revision 345ce2e175457dab78d7e761ed7afb813c73b914 directly.&#xA;&#xA;pod: test-symlink-comp-zxqf-on-p860606fe82edc37555f68bfc42821aa4-pod | container step-symlink-check: &#xA;Running symlink check&#xA;The cloned repository contains symlink pointing outside of the cloned repository: /workspace/output/source/os-release-symlink&#xA;&#xA; pod: test-symlink-comp-zxqf-on-pull-request-fv2qz-init-pod | init container: prepare&#xA;2026/05/06 07:04:44 Entrypoint initialization&#xA;&#xA;pod: test-symlink-comp-zxqf-on-pull-request-fv2qz-init-pod | container step-init: &#xA;time=&#34;2026-05-06T07:04:48Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-06T07:04:48Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-06T07:04:48Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-06T07:04:48Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-06T07:04:48Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-06T07:04:48Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:04:48Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-06T07:04:48Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-06T07:04:48Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&lt; Exit [It] pipelineRun should fail for symlink component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-zxqf - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:816 @ 05/06/26 07:19:10.54 (623ms)&#xA;&gt; Enter [AfterAll] HACBS pipelines - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:271 @ 05/06/26 07:19:10.54&#xA;&lt; Exit [AfterAll] HACBS pipelines - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:271 @ 05/06/26 07:19:23.4 (12.86s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:23.401&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.x1MqQ7KQDy/tests/build/build_templates.go:207 @ 05/06/26 07:19:23.401 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates an application [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="59.421931">
              <system-err>&gt; Enter [BeforeAll] Maven project - Default build - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:84 @ 05/06/26 07:02:05.762&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: initializing framework for appappMaven project - Default build&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: namespacesuserNamespacekonflux-nqmnmanagedNamespacekonflux-nqmn-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: component configcomponentNamekonflux-demo-component-mihhpacBranchNamekonflux-konflux-demo-component-mihhcomponentRepositoryNamehacbs-test-project-konflux-demo&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: creating release configmanagedNamespacekonflux-nqmn-manageduserNamespacekonflux-nqmn&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo createReleaseConfig: creating managed namespacemanagedNamespacekonflux-nqmn-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo createReleaseConfig: creating release-service-accountmanagedNamespacekonflux-nqmn-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo createReleaseConfig: finishedmanagedNamespacekonflux-nqmn-manageduserNamespacekonflux-nqmn&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: created and linked release-catalog-trusted-artifacts-quay-secretmanagedNamespacekonflux-nqmn-managed&#34;&#xA;created and linked release-catalog-trusted-artifacts-quay-secret in namespace &#34;konflux-nqmn-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: setup completeappMaven project - Default buildcomponentNamekonflux-demo-component-mihh&#34;&#xA;&lt; Exit [BeforeAll] Maven project - Default build - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:84 @ 05/06/26 07:03:05.081 (59.319s)&#xA;&gt; Enter [It] creates an application - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:189 @ 05/06/26 07:03:05.081&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: creating applicationapplicationNamekonflux-demo-appnamespacekonflux-nqmn&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: application createdapplicationNamekonflux-demo-app&#34;&#xA;&lt; Exit [It] creates an application - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:189 @ 05/06/26 07:03:05.184 (103ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates an IntegrationTestScenario for the app [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.07512255">
              <system-err>&gt; Enter [It] creates an IntegrationTestScenario for the app - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:202 @ 05/06/26 07:03:05.185&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: creating IntegrationTestScenarioapplicationNamekonflux-demo-appnamespacekonflux-nqmn&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: IntegrationTestScenario createdscenariomy-integration-test-xmfc&#34;&#xA;&lt; Exit [It] creates an IntegrationTestScenario for the app - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:202 @ 05/06/26 07:03:05.26 (75ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates new branch for the build [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.694351068">
              <system-err>&gt; Enter [It] creates new branch for the build - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:218 @ 05/06/26 07:03:05.26&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: creating branch for buildrepohacbs-test-project-konflux-demobranchbase-whzujhfrommain&#34;&#xA;&lt; Exit [It] creates new branch for the build - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:218 @ 05/06/26 07:03:05.954 (694ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates component konflux-demo-component (private: false) from git source https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="40.157950744">
              <system-err>&gt; Enter [It] creates component konflux-demo-component (private: false) from git source https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:233 @ 05/06/26 07:03:05.955&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: creating componentcomponentNamekonflux-demo-component-mihhapplicationNamekonflux-demo-appnamespacekonflux-nqmnrevisionbase-whzujh&#34;&#xA;Image repository for component konflux-demo-component-mihh in namespace konflux-nqmn do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component konflux-demo-component-mihh in namespace konflux-nqmn do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component konflux-demo-component-mihh in namespace konflux-nqmn do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component konflux-demo-component-mihh in namespace konflux-nqmn do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: component createdcomponentNamekonflux-demo-component-mihh&#34;&#xA;&lt; Exit [It] creates component konflux-demo-component (private: false) from git source https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:233 @ 05/06/26 07:03:46.113 (40.158s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created triggers creation of a PR in the sample repo [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="45.310958269">
              <system-err>&gt; Enter [It] triggers creation of a PR in the sample repo - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:259 @ 05/06/26 07:03:46.114&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for PaC PRrepohacbs-test-project-konflux-demopacBranchNamekonflux-konflux-demo-component-mihh&#34;&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-mihh (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-mihh (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-mihh (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-mihh (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-mihh (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-mihh (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-mihh (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-mihh (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-mihh (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-mihh (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-mihh (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: PaC PR createdprNumber29601prSHA2583ac1fdce95f04171007afe59a4b1b82b09503&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for pull-request PipelineRun to appear (will delete it)componentkonflux-demo-component-mihhprSHA2583ac1fdce95f04171007afe59a4b1b82b09503&#34;&#xA;PipelineRun not found yet for component konflux-nqmn/konflux-demo-component-mihh prSHA 2583ac1fdce95f04171007afe59a4b1b82b09503: no pipelinerun found for component konflux-demo-component-mihh&#xA;&lt; Exit [It] triggers creation of a PR in the sample repo - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:259 @ 05/06/26 07:04:31.425 (45.311s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created verifies component build status [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.038878234">
              <system-err>&gt; Enter [It] verifies component build status - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:297 @ 05/06/26 07:04:31.425&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: verifying component build status (PaC enabled)componentkonflux-demo-component-mihhnamespacekonflux-nqmn&#34;&#xA;state: enabled&#xA;mergeUrl: https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo/pull/29601&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Wed, 06 May 2026 07:04:10 UTC&#xA;&lt; Exit [It] verifies component build status - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:297 @ 05/06/26 07:04:31.464 (39ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created should eventually lead to triggering a &#39;push&#39; event type PipelineRun after merging the PaC init branch  [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="22.095794255">
              <system-err>&gt; Enter [It] should eventually lead to triggering a &#39;push&#39; event type PipelineRun after merging the PaC init branch  - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:335 @ 05/06/26 07:04:31.464&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: merging PaC PRrepohacbs-test-project-konflux-demoprNumber29601&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: PaC PR mergedheadSHA00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for push PipelineRun to startcomponentkonflux-demo-component-mihhheadSHA00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;&#xA;PipelineRun has not been created yet for component konflux-nqmn/konflux-demo-component-mihh&#xA;&#34;msg&#34;=&#34;Konflux demo: GetComponentPipelineRun failed: no pipelinerun found for component konflux-demo-component-mihh&#34; &#34;error&#34;=null&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: push PipelineRun startedpipelineRunkonflux-demo-component-mihh-on-push-h5kr7&#34;&#xA;&lt; Exit [It] should eventually lead to triggering a &#39;push&#39; event type PipelineRun after merging the PaC init branch  - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:335 @ 05/06/26 07:04:53.56 (22.096s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun is created does not contain an annotation with a Snapshot Name [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000256767">
              <system-err>&gt; Enter [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:369 @ 05/06/26 07:04:53.561&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: checking build PipelineRun has no snapshot annotationpipelineRunkonflux-demo-component-mihh-on-push-h5kr7&#34;&#xA;&lt; Exit [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:369 @ 05/06/26 07:04:53.561 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun is created should eventually complete successfully [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="655.797878096">
              <system-err>&gt; Enter [It] should eventually complete successfully - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:373 @ 05/06/26 07:04:53.561&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for build PipelineRun to finishpipelineRunkonflux-demo-component-mihh-on-push-h5kr7componentkonflux-demo-component-mihhheadSHA00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 found for Component konflux-nqmn/konflux-demo-component-mihh&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: ResolvingTaskRef&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-mihh-on-push-h5kr7 reason: Failed&#xA;attempt 1/6: PipelineRun &#34;konflux-demo-component-mihh-on-push-h5kr7&#34; failed: &#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-apply-tags-pod | init container: prepare&#xA;2026/05/06 07:09:35 Entrypoint initialization&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-apply-tags-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-05-06T07:09:38Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;&#xA;time=&#34;2026-05-06T07:09:38Z&#34; level=info msg=&#34;[param] digest: sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#34;&#xA;time=&#34;2026-05-06T07:09:38Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-05-06T07:09:39Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-build-container-pod | init container: prepare&#xA;2026/05/06 07:06:03 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-build-container-pod | init container: place-scripts&#xA;2026/05/06 07:06:04 Decoded script /tekton/scripts/script-1-gck44&#xA;2026/05/06 07:06:04 Decoded script /tekton/scripts/script-2-djc7n&#xA;2026/05/06 07:06:04 Decoded script /tekton/scripts/script-3-k6xz8&#xA;2026/05/06 07:06:04 Decoded script /tekton/scripts/script-4-np9ht&#xA;2026/05/06 07:06:04 Decoded script /tekton/scripts/script-5-qssz2&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-build-container-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.vDKink/auth-zXHlDD.json quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:d00067650ac6c5dc7b74ea544d566868d34e69d3841c5e8c02d1c8059c59e73b --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:d00067650ac6c5dc7b74ea544d566868d34e69d3841c5e8c02d1c8059c59e73b to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-build-container-pod | container step-build: &#xA;[2026-05-06T07:06:09,235422449+00:00] Validate context path&#xA;[2026-05-06T07:06:09,238629386+00:00] Update CA trust&#xA;[2026-05-06T07:06:09,239741667+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-06T07:06:11,952501514+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-06T07:06:11,958011957+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-06T07:06:11,969764085+00:00] Setup prefetched&#xA;Trying to pull registry.access.redhat.com/ubi8/openjdk-17-runtime:1.23...&#xA;Getting image source signatures&#xA;Checking if image destination supports signatures&#xA;Copying blob sha256:8dbc54dd3ba8deb60962e0faf1bcd1d23c09867cffbce92e091a1094578f09fc&#xA;Copying blob sha256:c942205fe656068a84bcea3282a340025bcb04ccf5ac11554c341b816c9e156e&#xA;Copying config sha256:8979a2d87e9502962b699677c4df3cb444e670d02cddf2f83fd6da795feab96e&#xA;Writing manifest to image destination&#xA;Storing signatures&#xA;[2026-05-06T07:06:17,852559274+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-06T07:06:11Z&#34;,&#xA;  &#34;com.redhat.component&#34;: &#34;openjdk-17-runtime-ubi8-container&#34;,&#xA;  &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;  &#34;cpe&#34;: &#34;cpe:/a:redhat:enterprise_linux:8::appstream&#34;,&#xA;  &#34;description&#34;: &#34;Image for Red Hat OpenShift providing OpenJDK 17 runtime&#34;,&#xA;  &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;  &#34;io.cekit.version&#34;: &#34;4.13.0.dev0&#34;,&#xA;  &#34;io.k8s.description&#34;: &#34;Platform for running plain Java applications (fat-jar and flat classpath)&#34;,&#xA;  &#34;io.k8s.display-name&#34;: &#34;Java Applications&#34;,&#xA;  &#34;io.openshift.expose-services&#34;: &#34;&#34;,&#xA;  &#34;io.openshift.tags&#34;: &#34;java&#34;,&#xA;  &#34;maintainer&#34;: &#34;Red Hat OpenJDK &lt;openjdk@redhat.com&gt;&#34;,&#xA;  &#34;name&#34;: &#34;ubi8/openjdk-17-runtime&#34;,&#xA;  &#34;org.jboss.product&#34;: &#34;openjdk&#34;,&#xA;  &#34;org.jboss.product.openjdk.version&#34;: &#34;17&#34;,&#xA;  &#34;org.jboss.product.version&#34;: &#34;17&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-06T07:06:11Z&#34;,&#xA;  &#34;org.opencontainers.image.documentation&#34;: &#34;https://rh-openjdk.github.io/redhat-openjdk-containers/&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;,&#xA;  &#34;release&#34;: &#34;4.1777859697&#34;,&#xA;  &#34;summary&#34;: &#34;Image for Red Hat OpenShift providing OpenJDK 17 runtime&#34;,&#xA;  &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/ubi8/openjdk-17-runtime/images/1.23-4.1777859697&#34;,&#xA;  &#34;usage&#34;: &#34;https://rh-openjdk.github.io/redhat-openjdk-containers/&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;version&#34;: &#34;1.23&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo&#34;&#xA;}&#xA;[2026-05-06T07:06:17,897007540+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-06T07:06:17,900221125+00:00] Add secrets&#xA;[2026-05-06T07:06:17,907353737+00:00] Run buildah build&#xA;[2026-05-06T07:06:17,908407336+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=00775aff393ad7f166602cdc0ae09d8b098fdac5 --label org.opencontainers.image.revision=00775aff393ad7f166602cdc0ae09d8b098fdac5 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo --label build-date=2026-05-06T07:06:11Z --label org.opencontainers.image.created=2026-05-06T07:06:11Z --annotation org.opencontainers.image.revision=00775aff393ad7f166602cdc0ae09d8b098fdac5 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo --annotation org.opencontainers.image.created=2026-05-06T07:06:11Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.2KzMaO -t quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5 . &#xA;[1/2] STEP 1/5: FROM registry.access.redhat.com/ubi8/openjdk-17:1.23 AS builder&#xA;Trying to pull registry.access.redhat.com/ubi8/openjdk-17:1.23...&#xA;Getting image source signatures&#xA;Checking if image destination supports signatures&#xA;Copying blob sha256:a12a82751b6fcca1bc1b9cde9e1848176a23a409694729a4a814f963fc33fb81&#xA;Copying blob sha256:c942205fe656068a84bcea3282a340025bcb04ccf5ac11554c341b816c9e156e&#xA;Copying config sha256:575ea09fb2e3a7e2587a6187fc17be1a0a5da89bcb3f41e3dd33087a2ffc3bcb&#xA;Writing manifest to image destination&#xA;Storing signatures&#xA;[1/2] STEP 2/5: WORKDIR /work&#xA;[1/2] STEP 3/5: COPY . .&#xA;[1/2] STEP 4/5: USER 0&#xA;[1/2] STEP 5/5: RUN mvn clean package -DskipTests -DskipDocsGen&#xA;[INFO] Scanning for projects...&#xA;[INFO] &#xA;[INFO] ------------------&lt; org.example:simple-java-project &gt;-------------------&#xA;[INFO] Building simple-java-project 1.0-SNAPSHOT&#xA;[INFO] --------------------------------[ jar ]---------------------------------&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-shade-plugin/3.2.4/maven-shade-plugin-3.2.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-shade-plugin/3.2.4/maven-shade-plugin-3.2.4.pom (11 kB at 55 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/34/maven-plugins-34.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/34/maven-plugins-34.pom (11 kB at 281 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/34/maven-parent-34.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 43 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/34/maven-parent-34.pom (43 kB at 1.1 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/23/apache-23.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 18 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/23/apache-23.pom (18 kB at 485 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-shade-plugin/3.2.4/maven-shade-plugin-3.2.4.jar&#xA;Progress (1): 2.3/134 kB&#xD;Progress (1): 5.0/134 kB&#xD;Progress (1): 7.7/134 kB&#xD;Progress (1): 10/134 kB &#xD;Progress (1): 13/134 kB&#xD;Progress (1): 16/134 kB&#xD;Progress (1): 19/134 kB&#xD;Progress (1): 21/134 kB&#xD;Progress (1): 26/134 kB&#xD;Progress (1): 30/134 kB&#xD;Progress (1): 32/134 kB&#xD;Progress (1): 36/134 kB&#xD;Progress (1): 40/134 kB&#xD;Progress (1): 44/134 kB&#xD;Progress (1): 48/134 kB&#xD;Progress (1): 52/134 kB&#xD;Progress (1): 56/134 kB&#xD;Progress (1): 61/134 kB&#xD;Progress (1): 65/134 kB&#xD;Progress (1): 69/134 kB&#xD;Progress (1): 73/134 kB&#xD;Progress (1): 77/134 kB&#xD;Progress (1): 81/134 kB&#xD;Progress (1): 85/134 kB&#xD;Progress (1): 89/134 kB&#xD;Progress (1): 93/134 kB&#xD;Progress (1): 97/134 kB&#xD;Progress (1): 100/134 kB&#xD;Progress (1): 104/134 kB&#xD;Progress (1): 108/134 kB&#xD;Progress (1): 112/134 kB&#xD;Progress (1): 116/134 kB&#xD;Progress (1): 120/134 kB&#xD;Progress (1): 124/134 kB&#xD;Progress (1): 128/134 kB&#xD;Progress (1): 132/134 kB&#xD;Progress (1): 134 kB    &#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-shade-plugin/3.2.4/maven-shade-plugin-3.2.4.jar (134 kB at 2.6 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-clean-plugin/2.5/maven-clean-plugin-2.5.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-clean-plugin/2.5/maven-clean-plugin-2.5.pom (3.9 kB at 69 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/22/maven-plugins-22.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 13 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/22/maven-plugins-22.pom (13 kB at 362 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/21/maven-parent-21.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 26 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/21/maven-parent-21.pom (26 kB at 694 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/10/apache-10.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/10/apache-10.pom (15 kB at 423 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-clean-plugin/2.5/maven-clean-plugin-2.5.jar&#xA;Progress (1): 4.1/25 kB&#xD;Progress (1): 7.3/25 kB&#xD;Progress (1): 11/25 kB &#xD;Progress (1): 15/25 kB&#xD;Progress (1): 20/25 kB&#xD;Progress (1): 24/25 kB&#xD;Progress (1): 25 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-clean-plugin/2.5/maven-clean-plugin-2.5.jar (25 kB at 849 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-resources-plugin/2.6/maven-resources-plugin-2.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-resources-plugin/2.6/maven-resources-plugin-2.6.pom (8.1 kB at 189 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/23/maven-plugins-23.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/23/maven-plugins-23.pom (9.2 kB at 242 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/22/maven-parent-22.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 30 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/22/maven-parent-22.pom (30 kB at 875 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/11/apache-11.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/11/apache-11.pom (15 kB at 197 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-resources-plugin/2.6/maven-resources-plugin-2.6.jar&#xA;Progress (1): 4.1/30 kB&#xD;Progress (1): 7.7/30 kB&#xD;Progress (1): 11/30 kB &#xD;Progress (1): 15/30 kB&#xD;Progress (1): 20/30 kB&#xD;Progress (1): 24/30 kB&#xD;Progress (1): 28/30 kB&#xD;Progress (1): 30 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-resources-plugin/2.6/maven-resources-plugin-2.6.jar (30 kB at 922 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-compiler-plugin/3.1/maven-compiler-plugin-3.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 10 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-compiler-plugin/3.1/maven-compiler-plugin-3.1.pom (10 kB at 319 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/24/maven-plugins-24.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/24/maven-plugins-24.pom (11 kB at 360 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/23/maven-parent-23.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/23/maven-parent-23.pom (33 kB at 905 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/13/apache-13.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/13/apache-13.pom (14 kB at 368 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-compiler-plugin/3.1/maven-compiler-plugin-3.1.jar&#xA;Progress (1): 4.1/43 kB&#xD;Progress (1): 7.7/43 kB&#xD;Progress (1): 12/43 kB &#xD;Progress (1): 16/43 kB&#xD;Progress (1): 20/43 kB&#xD;Progress (1): 24/43 kB&#xD;Progress (1): 28/43 kB&#xD;Progress (1): 32/43 kB&#xD;Progress (1): 36/43 kB&#xD;Progress (1): 40/43 kB&#xD;Progress (1): 43 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-compiler-plugin/3.1/maven-compiler-plugin-3.1.jar (43 kB at 1.4 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-surefire-plugin/2.12.4/maven-surefire-plugin-2.12.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 10 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-surefire-plugin/2.12.4/maven-surefire-plugin-2.12.4.pom (10 kB at 269 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire/2.12.4/surefire-2.12.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire/2.12.4/surefire-2.12.4.pom (14 kB at 354 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-surefire-plugin/2.12.4/maven-surefire-plugin-2.12.4.jar&#xA;Progress (1): 4.1/30 kB&#xD;Progress (1): 7.7/30 kB&#xD;Progress (1): 12/30 kB &#xD;Progress (1): 16/30 kB&#xD;Progress (1): 20/30 kB&#xD;Progress (1): 24/30 kB&#xD;Progress (1): 28/30 kB&#xD;Progress (1): 30 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-surefire-plugin/2.12.4/maven-surefire-plugin-2.12.4.jar (30 kB at 896 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-jar-plugin/3.3.0/maven-jar-plugin-3.3.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-jar-plugin/3.3.0/maven-jar-plugin-3.3.0.pom (6.8 kB at 183 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/37/maven-plugins-37.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/37/maven-plugins-37.pom (9.9 kB at 291 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/37/maven-parent-37.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 46 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/37/maven-parent-37.pom (46 kB at 1.3 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/27/apache-27.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/27/apache-27.pom (20 kB at 636 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-jar-plugin/3.3.0/maven-jar-plugin-3.3.0.jar&#xA;Progress (1): 4.1/27 kB&#xD;Progress (1): 7.7/27 kB&#xD;Progress (1): 12/27 kB &#xD;Progress (1): 15/27 kB&#xD;Progress (1): 20/27 kB&#xD;Progress (1): 24/27 kB&#xD;Progress (1): 27 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-jar-plugin/3.3.0/maven-jar-plugin-3.3.0.jar (27 kB at 719 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk17/0.1.2/simple-jdk17-0.1.2.pom&#xA;Progress (1): 3.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk17/0.1.2/simple-jdk17-0.1.2.pom (3.6 kB at 81 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/shaded/shaded-jdk11/1.9/shaded-jdk11-1.9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/shaded/shaded-jdk11/1.9/shaded-jdk11-1.9.pom (5.0 kB at 152 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk8/1.2.4/simple-jdk8-1.2.4.pom&#xA;Progress (1): 3.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk8/1.2.4/simple-jdk8-1.2.4.pom (3.6 kB at 98 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/gradle/hacbs-test-simple-gradle-jdk8/1.1/hacbs-test-simple-gradle-jdk8-1.1.pom&#xA;Progress (1): 1.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/gradle/hacbs-test-simple-gradle-jdk8/1.1/hacbs-test-simple-gradle-jdk8-1.1.pom (1.8 kB at 42 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk17/0.1.2/simple-jdk17-0.1.2.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/shaded/shaded-jdk11/1.9/shaded-jdk11-1.9.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk8/1.2.4/simple-jdk8-1.2.4.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/gradle/hacbs-test-simple-gradle-jdk8/1.1/hacbs-test-simple-gradle-jdk8-1.1.jar&#xA;Progress (1): 4.1/7.1 kB&#xD;Progress (1): 7.1 kB    &#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/shaded/shaded-jdk11/1.9/shaded-jdk11-1.9.jar (7.1 kB at 168 kB/s)&#xA;Progress (1): 2.3/3.6 kB&#xD;Progress (2): 2.3/3.6 kB | 2.0 kB&#xD;Progress (2): 3.6 kB | 2.0 kB    &#xD;Progress (3): 3.6 kB | 2.0 kB | 2.3/3.6 kB&#xD;Progress (3): 3.6 kB | 2.0 kB | 3.6 kB    &#xD;                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk8/1.2.4/simple-jdk8-1.2.4.jar (3.6 kB at 58 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/gradle/hacbs-test-simple-gradle-jdk8/1.1/hacbs-test-simple-gradle-jdk8-1.1.jar (2.0 kB at 32 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk17/0.1.2/simple-jdk17-0.1.2.jar (3.6 kB at 42 kB/s)&#xA;[INFO] &#xA;[INFO] --- maven-clean-plugin:2.5:clean (default-clean) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.6/maven-plugin-api-2.0.6.pom&#xA;Progress (1): 1.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.6/maven-plugin-api-2.0.6.pom (1.5 kB at 29 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.0.6/maven-2.0.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.0.6/maven-2.0.6.pom (9.0 kB at 192 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/5/maven-parent-5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/5/maven-parent-5.pom (15 kB at 331 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/3/apache-3.pom&#xA;Progress (1): 3.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/3/apache-3.pom (3.4 kB at 84 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.pom&#xA;Progress (1): 4.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.pom (4.1 kB at 102 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/16/spice-parent-16.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/16/spice-parent-16.pom (8.4 kB at 167 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/5/forge-parent-5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/5/forge-parent-5.pom (8.4 kB at 190 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.6/maven-plugin-api-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.jar&#xA;Progress (1): 2.3/226 kB&#xD;Progress (1): 5.0/226 kB&#xD;Progress (1): 7.7/226 kB&#xD;Progress (1): 10/226 kB &#xD;Progress (1): 13/226 kB&#xD;Progress (1): 16/226 kB&#xD;Progress (1): 19/226 kB&#xD;Progress (1): 21/226 kB&#xD;Progress (1): 24/226 kB&#xD;Progress (1): 27/226 kB&#xD;Progress (1): 30/226 kB&#xD;Progress (1): 32/226 kB&#xD;Progress (1): 35/226 kB&#xD;Progress (1): 37/226 kB&#xD;Progress (1): 40/226 kB&#xD;Progress (1): 43/226 kB&#xD;Progress (1): 46/226 kB&#xD;Progress (1): 48/226 kB&#xD;Progress (1): 52/226 kB&#xD;Progress (1): 56/226 kB&#xD;Progress (1): 61/226 kB&#xD;Progress (1): 65/226 kB&#xD;Progress (1): 69/226 kB&#xD;Progress (1): 73/226 kB&#xD;Progress (2): 73/226 kB | 2.3/13 kB&#xD;Progress (2): 75/226 kB | 2.3/13 kB&#xD;Progress (2): 75/226 kB | 5.0/13 kB&#xD;Progress (2): 79/226 kB | 5.0/13 kB&#xD;Progress (2): 79/226 kB | 7.7/13 kB&#xD;Progress (2): 83/226 kB | 7.7/13 kB&#xD;Progress (2): 83/226 kB | 10/13 kB &#xD;Progress (2): 87/226 kB | 10/13 kB&#xD;Progress (2): 87/226 kB | 13 kB   &#xD;Progress (2): 91/226 kB | 13 kB&#xD;Progress (2): 96/226 kB | 13 kB&#xD;Progress (2): 100/226 kB | 13 kB&#xD;Progress (2): 104/226 kB | 13 kB&#xD;Progress (2): 108/226 kB | 13 kB&#xD;Progress (2): 112/226 kB | 13 kB&#xD;Progress (2): 116/226 kB | 13 kB&#xD;Progress (2): 120/226 kB | 13 kB&#xD;Progress (2): 124/226 kB | 13 kB&#xD;Progress (2): 128/226 kB | 13 kB&#xD;Progress (2): 132/226 kB | 13 kB&#xD;Progress (2): 136/226 kB | 13 kB&#xD;Progress (2): 141/226 kB | 13 kB&#xD;Progress (2): 143/226 kB | 13 kB&#xD;Progress (2): 147/226 kB | 13 kB&#xD;Progress (2): 151/226 kB | 13 kB&#xD;Progress (2): 155/226 kB | 13 kB&#xD;Progress (2): 159/226 kB | 13 kB&#xD;Progress (2): 163/226 kB | 13 kB&#xD;Progress (2): 167/226 kB | 13 kB&#xD;Progress (2): 171/226 kB | 13 kB&#xD;Progress (2): 175/226 kB | 13 kB&#xD;Progress (2): 179/226 kB | 13 kB&#xD;Progress (2): 183/226 kB | 13 kB&#xD;Progress (2): 188/226 kB | 13 kB&#xD;Progress (2): 192/226 kB | 13 kB&#xD;Progress (2): 196/226 kB | 13 kB&#xD;Progress (2): 200/226 kB | 13 kB&#xD;Progress (2): 204/226 kB | 13 kB&#xD;Progress (2): 208/226 kB | 13 kB&#xD;Progress (2): 212/226 kB | 13 kB&#xD;Progress (2): 216/226 kB | 13 kB&#xD;Progress (2): 220/226 kB | 13 kB&#xD;Progress (2): 224/226 kB | 13 kB&#xD;Progress (2): 226 kB | 13 kB    &#xD;                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.6/maven-plugin-api-2.0.6.jar (13 kB at 314 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.jar (226 kB at 5.0 MB/s)&#xA;[INFO] &#xA;[INFO] --- maven-resources-plugin:2.6:resources (default-resources) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.6/maven-project-2.0.6.pom&#xA;Progress (1): 2.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.6/maven-project-2.0.6.pom (2.6 kB at 78 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.6/maven-settings-2.0.6.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.6/maven-settings-2.0.6.pom (2.0 kB at 59 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.6/maven-model-2.0.6.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.6/maven-model-2.0.6.pom (3.0 kB at 66 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.4.1/plexus-utils-1.4.1.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.4.1/plexus-utils-1.4.1.pom (1.9 kB at 49 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/1.0.11/plexus-1.0.11.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/1.0.11/plexus-1.0.11.pom (9.0 kB at 176 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9-stable-1/plexus-container-default-1.0-alpha-9-stable-1.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9-stable-1/plexus-container-default-1.0-alpha-9-stable-1.pom (3.9 kB at 132 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/1.0.3/plexus-containers-1.0.3.pom&#xA;Progress (1): 492 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/1.0.3/plexus-containers-1.0.3.pom (492 B at 16 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/1.0.4/plexus-1.0.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/1.0.4/plexus-1.0.4.pom (5.7 kB at 155 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.1/junit-3.8.1.pom&#xA;Progress (1): 998 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.1/junit-3.8.1.pom (998 B at 34 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.0.4/plexus-utils-1.0.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.0.4/plexus-utils-1.0.4.pom (6.9 kB at 236 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1-alpha-2/classworlds-1.1-alpha-2.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1-alpha-2/classworlds-1.1-alpha-2.pom (3.1 kB at 104 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.6/maven-profile-2.0.6.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.6/maven-profile-2.0.6.pom (2.0 kB at 66 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.6/maven-artifact-manager-2.0.6.pom&#xA;Progress (1): 2.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.6/maven-artifact-manager-2.0.6.pom (2.6 kB at 85 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.6/maven-repository-metadata-2.0.6.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.6/maven-repository-metadata-2.0.6.pom (1.9 kB at 62 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.6/maven-artifact-2.0.6.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.6/maven-artifact-2.0.6.pom (1.6 kB at 66 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.6/maven-plugin-registry-2.0.6.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.6/maven-plugin-registry-2.0.6.pom (1.9 kB at 65 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.6/maven-core-2.0.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.6/maven-core-2.0.6.pom (6.7 kB at 231 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.6/maven-plugin-parameter-documenter-2.0.6.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.6/maven-plugin-parameter-documenter-2.0.6.pom (1.9 kB at 58 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.6/maven-reporting-api-2.0.6.pom&#xA;Progress (1): 1.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.6/maven-reporting-api-2.0.6.pom (1.8 kB at 53 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting/2.0.6/maven-reporting-2.0.6.pom&#xA;Progress (1): 1.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting/2.0.6/maven-reporting-2.0.6.pom (1.4 kB at 48 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia-sink-api/1.0-alpha-7/doxia-sink-api-1.0-alpha-7.pom&#xA;Progress (1): 424 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia-sink-api/1.0-alpha-7/doxia-sink-api-1.0-alpha-7.pom (424 B at 14 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia/1.0-alpha-7/doxia-1.0-alpha-7.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia/1.0-alpha-7/doxia-1.0-alpha-7.pom (3.9 kB at 140 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.6/maven-error-diagnostics-2.0.6.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.6/maven-error-diagnostics-2.0.6.pom (1.7 kB at 61 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-cli/commons-cli/1.0/commons-cli-1.0.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-cli/commons-cli/1.0/commons-cli-1.0.pom (2.1 kB at 73 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.6/maven-plugin-descriptor-2.0.6.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.6/maven-plugin-descriptor-2.0.6.pom (2.0 kB at 78 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interactivity-api/1.0-alpha-4/plexus-interactivity-api-1.0-alpha-4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interactivity-api/1.0-alpha-4/plexus-interactivity-api-1.0-alpha-4.pom (7.1 kB at 236 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.6/maven-monitor-2.0.6.pom&#xA;Progress (1): 1.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.6/maven-monitor-2.0.6.pom (1.3 kB at 46 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1/classworlds-1.1.pom&#xA;Progress (1): 3.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1/classworlds-1.1.pom (3.3 kB at 104 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.5/plexus-utils-2.0.5.pom&#xA;Progress (1): 3.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.5/plexus-utils-2.0.5.pom (3.3 kB at 123 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.6/plexus-2.0.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 17 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.6/plexus-2.0.6.pom (17 kB at 559 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-filtering/1.1/maven-filtering-1.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-filtering/1.1/maven-filtering-1.1.pom (5.8 kB at 175 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/17/maven-shared-components-17.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/17/maven-shared-components-17.pom (8.7 kB at 311 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.15/plexus-utils-1.5.15.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.15/plexus-utils-1.5.15.pom (6.8 kB at 214 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.2/plexus-2.0.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.2/plexus-2.0.2.pom (12 kB at 363 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.12/plexus-interpolation-1.12.pom&#xA;Progress (1): 889 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.12/plexus-interpolation-1.12.pom (889 B at 32 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.14/plexus-components-1.1.14.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.14/plexus-components-1.1.14.pom (5.8 kB at 209 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-build-api/0.0.4/plexus-build-api-0.0.4.pom&#xA;Progress (1): 2.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-build-api/0.0.4/plexus-build-api-0.0.4.pom (2.9 kB at 87 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/10/spice-parent-10.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/10/spice-parent-10.pom (3.0 kB at 104 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/3/forge-parent-3.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/3/forge-parent-3.pom (5.0 kB at 168 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.8/plexus-utils-1.5.8.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.8/plexus-utils-1.5.8.pom (8.1 kB at 323 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.13/plexus-interpolation-1.13.pom&#xA;Progress (1): 890 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.13/plexus-interpolation-1.13.pom (890 B at 39 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.15/plexus-components-1.1.15.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.15/plexus-components-1.1.15.pom (2.8 kB at 119 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.3/plexus-2.0.3.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.3/plexus-2.0.3.pom (15 kB at 533 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.6/maven-project-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.6/maven-profile-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.6/maven-artifact-manager-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.6/maven-plugin-registry-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.6/maven-core-2.0.6.jar&#xA;Progress (1): 4.1/116 kB&#xD;Progress (1): 7.7/116 kB&#xD;Progress (1): 12/116 kB &#xD;Progress (1): 16/116 kB&#xD;Progress (1): 20/116 kB&#xD;Progress (1): 24/116 kB&#xD;Progress (1): 28/116 kB&#xD;Progress (1): 32/116 kB&#xD;Progress (1): 36/116 kB&#xD;Progress (1): 40/116 kB&#xD;Progress (1): 45/116 kB&#xD;Progress (1): 49/116 kB&#xD;Progress (1): 53/116 kB&#xD;Progress (1): 57/116 kB&#xD;Progress (1): 61/116 kB&#xD;Progress (2): 61/116 kB | 2.3/57 kB&#xD;Progress (2): 61/116 kB | 5.0/57 kB&#xD;Progress (2): 61/116 kB | 7.7/57 kB&#xD;Progress (3): 61/116 kB | 7.7/57 kB | 4.1/29 kB&#xD;Progress (3): 61/116 kB | 10/57 kB | 4.1/29 kB &#xD;Progress (3): 61/116 kB | 10/57 kB | 7.7/29 kB&#xD;Progress (3): 61/116 kB | 10/57 kB | 12/29 kB &#xD;Progress (3): 61/116 kB | 13/57 kB | 12/29 kB&#xD;Progress (3): 65/116 kB | 13/57 kB | 12/29 kB&#xD;Progress (3): 65/116 kB | 13/57 kB | 16/29 kB&#xD;Progress (3): 65/116 kB | 16/57 kB | 16/29 kB&#xD;Progress (3): 69/116 kB | 16/57 kB | 16/29 kB&#xD;Progress (3): 73/116 kB | 16/57 kB | 16/29 kB&#xD;Progress (3): 77/116 kB | 16/57 kB | 16/29 kB&#xD;Progress (3): 77/116 kB | 19/57 kB | 16/29 kB&#xD;Progress (3): 77/116 kB | 19/57 kB | 20/29 kB&#xD;Progress (3): 77/116 kB | 19/57 kB | 24/29 kB&#xD;Progress (3): 77/116 kB | 21/57 kB | 24/29 kB&#xD;Progress (3): 77/116 kB | 21/57 kB | 28/29 kB&#xD;Progress (3): 77/116 kB | 24/57 kB | 28/29 kB&#xD;Progress (3): 81/116 kB | 24/57 kB | 28/29 kB&#xD;Progress (3): 81/116 kB | 24/57 kB | 29 kB   &#xD;Progress (3): 81/116 kB | 27/57 kB | 29 kB&#xD;Progress (3): 86/116 kB | 27/57 kB | 29 kB&#xD;Progress (3): 90/116 kB | 27/57 kB | 29 kB&#xD;Progress (3): 90/116 kB | 30/57 kB | 29 kB&#xD;Progress (3): 94/116 kB | 30/57 kB | 29 kB&#xD;Progress (3): 94/116 kB | 32/57 kB | 29 kB&#xD;Progress (3): 94/116 kB | 35/57 kB | 29 kB&#xD;Progress (3): 94/116 kB | 38/57 kB | 29 kB&#xD;Progress (3): 94/116 kB | 41/57 kB | 29 kB&#xD;Progress (3): 94/116 kB | 43/57 kB | 29 kB&#xD;Progress (3): 94/116 kB | 46/57 kB | 29 kB&#xD;Progress (3): 94/116 kB | 49/57 kB | 29 kB&#xD;Progress (3): 98/116 kB | 49/57 kB | 29 kB&#xD;Progress (3): 102/116 kB | 49/57 kB | 29 kB&#xD;Progress (3): 102/116 kB | 51/57 kB | 29 kB&#xD;Progress (3): 106/116 kB | 51/57 kB | 29 kB&#xD;Progress (3): 110/116 kB | 51/57 kB | 29 kB&#xD;Progress (3): 110/116 kB | 56/57 kB | 29 kB&#xD;Progress (3): 110/116 kB | 57 kB | 29 kB   &#xD;Progress (3): 114/116 kB | 57 kB | 29 kB&#xD;Progress (3): 116 kB | 57 kB | 29 kB    &#xD;Progress (4): 116 kB | 57 kB | 29 kB | 3.8/35 kB&#xD;Progress (4): 116 kB | 57 kB | 29 kB | 7.8/35 kB&#xD;Progress (4): 116 kB | 57 kB | 29 kB | 11/35 kB &#xD;Progress (4): 116 kB | 57 kB | 29 kB | 15/35 kB&#xD;Progress (4): 116 kB | 57 kB | 29 kB | 20/35 kB&#xD;Progress (4): 116 kB | 57 kB | 29 kB | 24/35 kB&#xD;Progress (4): 116 kB | 57 kB | 29 kB | 28/35 kB&#xD;Progress (4): 116 kB | 57 kB | 29 kB | 32/35 kB&#xD;Progress (4): 116 kB | 57 kB | 29 kB | 35 kB   &#xD;                                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.6/maven-plugin-registry-2.0.6.jar (29 kB at 904 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.6/maven-plugin-parameter-documenter-2.0.6.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.6/maven-project-2.0.6.jar (116 kB at 3.4 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.6/maven-reporting-api-2.0.6.jar&#xA;Progress (3): 57 kB | 35 kB | 2.3/152 kB&#xD;Progress (3): 57 kB | 35 kB | 5.0/152 kB&#xD;Progress (3): 57 kB | 35 kB | 7.7/152 kB&#xD;Progress (3): 57 kB | 35 kB | 10/152 kB &#xD;Progress (3): 57 kB | 35 kB | 13/152 kB&#xD;Progress (3): 57 kB | 35 kB | 16/152 kB&#xD;Progress (3): 57 kB | 35 kB | 19/152 kB&#xD;Progress (3): 57 kB | 35 kB | 21/152 kB&#xD;Progress (3): 57 kB | 35 kB | 24/152 kB&#xD;Progress (3): 57 kB | 35 kB | 27/152 kB&#xD;Progress (3): 57 kB | 35 kB | 30/152 kB&#xD;Progress (3): 57 kB | 35 kB | 33/152 kB&#xD;Progress (3): 57 kB | 35 kB | 36/152 kB&#xD;Progress (3): 57 kB | 35 kB | 38/152 kB&#xD;Progress (3): 57 kB | 35 kB | 41/152 kB&#xD;Progress (3): 57 kB | 35 kB | 44/152 kB&#xD;Progress (3): 57 kB | 35 kB | 46/152 kB&#xD;Progress (3): 57 kB | 35 kB | 49/152 kB&#xD;Progress (3): 57 kB | 35 kB | 52/152 kB&#xD;Progress (3): 57 kB | 35 kB | 55/152 kB&#xD;Progress (4): 57 kB | 35 kB | 55/152 kB | 4.1/21 kB&#xD;Progress (4): 57 kB | 35 kB | 59/152 kB | 4.1/21 kB&#xD;Progress (4): 57 kB | 35 kB | 59/152 kB | 7.7/21 kB&#xD;Progress (4): 57 kB | 35 kB | 59/152 kB | 12/21 kB &#xD;Progress (4): 57 kB | 35 kB | 63/152 kB | 12/21 kB&#xD;Progress (4): 57 kB | 35 kB | 63/152 kB | 15/21 kB&#xD;Progress (5): 57 kB | 35 kB | 63/152 kB | 15/21 kB | 4.1/9.9 kB&#xD;Progress (5): 57 kB | 35 kB | 63/152 kB | 15/21 kB | 7.7/9.9 kB&#xD;Progress (5): 57 kB | 35 kB | 63/152 kB | 20/21 kB | 7.7/9.9 kB&#xD;Progress (5): 57 kB | 35 kB | 63/152 kB | 20/21 kB | 9.9 kB    &#xD;Progress (5): 57 kB | 35 kB | 63/152 kB | 21 kB | 9.9 kB   &#xD;                                                        &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.6/maven-profile-2.0.6.jar (35 kB at 734 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia-sink-api/1.0-alpha-7/doxia-sink-api-1.0-alpha-7.jar&#xA;Progress (4): 57 kB | 67/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 71/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 75/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 79/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 83/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 87/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 92/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 96/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 100/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 104/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 108/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 112/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 116/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 120/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 122/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 126/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 131/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 135/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 139/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 143/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 147/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 151/152 kB | 21 kB | 9.9 kB&#xD;Progress (4): 57 kB | 152 kB | 21 kB | 9.9 kB    &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.6/maven-plugin-parameter-documenter-2.0.6.jar (21 kB at 352 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.6/maven-repository-metadata-2.0.6.jar&#xA;Progress (4): 57 kB | 152 kB | 9.9 kB | 4.1/5.9 kB&#xD;Progress (4): 57 kB | 152 kB | 9.9 kB | 5.9 kB    &#xD;                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.6/maven-core-2.0.6.jar (152 kB at 2.1 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.6/maven-error-diagnostics-2.0.6.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.6/maven-reporting-api-2.0.6.jar (9.9 kB at 138 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-cli/commons-cli/1.0/commons-cli-1.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia-sink-api/1.0-alpha-7/doxia-sink-api-1.0-alpha-7.jar (5.9 kB at 73 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.6/maven-plugin-descriptor-2.0.6.jar&#xA;Progress (2): 57 kB | 3.8/30 kB&#xD;Progress (2): 57 kB | 7.8/30 kB&#xD;Progress (2): 57 kB | 12/30 kB &#xD;Progress (2): 57 kB | 16/30 kB&#xD;Progress (2): 57 kB | 20/30 kB&#xD;Progress (2): 57 kB | 24/30 kB&#xD;Progress (2): 57 kB | 28/30 kB&#xD;Progress (2): 57 kB | 30 kB   &#xD;Progress (3): 57 kB | 30 kB | 4.1/37 kB&#xD;Progress (3): 57 kB | 30 kB | 7.7/37 kB&#xD;Progress (3): 57 kB | 30 kB | 12/37 kB &#xD;Progress (3): 57 kB | 30 kB | 16/37 kB&#xD;Progress (3): 57 kB | 30 kB | 20/37 kB&#xD;Progress (3): 57 kB | 30 kB | 24/37 kB&#xD;Progress (3): 57 kB | 30 kB | 28/37 kB&#xD;Progress (3): 57 kB | 30 kB | 32/37 kB&#xD;Progress (3): 57 kB | 30 kB | 36/37 kB&#xD;Progress (3): 57 kB | 30 kB | 37 kB   &#xD;                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.6/maven-plugin-descriptor-2.0.6.jar (37 kB at 329 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interactivity-api/1.0-alpha-4/plexus-interactivity-api-1.0-alpha-4.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/commons-cli/commons-cli/1.0/commons-cli-1.0.jar (30 kB at 267 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1/classworlds-1.1.jar&#xA;Progress (2): 57 kB | 4.1/24 kB&#xD;Progress (2): 57 kB | 7.7/24 kB&#xD;Progress (2): 57 kB | 12/24 kB &#xD;Progress (2): 57 kB | 15/24 kB&#xD;Progress (2): 57 kB | 20/24 kB&#xD;Progress (2): 57 kB | 24/24 kB&#xD;Progress (2): 57 kB | 24 kB   &#xD;Progress (3): 57 kB | 24 kB | 3.8/14 kB&#xD;Progress (3): 57 kB | 24 kB | 7.8/14 kB&#xD;Progress (3): 57 kB | 24 kB | 12/14 kB &#xD;Progress (3): 57 kB | 24 kB | 14 kB   &#xD;                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.6/maven-artifact-manager-2.0.6.jar (57 kB at 463 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.6/maven-artifact-2.0.6.jar&#xA;Progress (3): 24 kB | 14 kB | 4.1/13 kB&#xD;Progress (3): 24 kB | 14 kB | 7.7/13 kB&#xD;Progress (3): 24 kB | 14 kB | 11/13 kB &#xD;Progress (3): 24 kB | 14 kB | 13 kB   &#xD;                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.6/maven-error-diagnostics-2.0.6.jar (14 kB at 107 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.6/maven-settings-2.0.6.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.6/maven-repository-metadata-2.0.6.jar (24 kB at 190 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.6/maven-model-2.0.6.jar&#xA;Progress (2): 13 kB | 3.8/38 kB&#xD;Progress (2): 13 kB | 7.8/38 kB&#xD;Progress (2): 13 kB | 12/38 kB &#xD;Progress (2): 13 kB | 16/38 kB&#xD;Progress (2): 13 kB | 20/38 kB&#xD;Progress (2): 13 kB | 24/38 kB&#xD;Progress (2): 13 kB | 28/38 kB&#xD;Progress (2): 13 kB | 32/38 kB&#xD;Progress (2): 13 kB | 37/38 kB&#xD;Progress (2): 13 kB | 38 kB   &#xD;Progress (3): 13 kB | 38 kB | 3.8/49 kB&#xD;Progress (3): 13 kB | 38 kB | 7.8/49 kB&#xD;Progress (3): 13 kB | 38 kB | 12/49 kB &#xD;Progress (3): 13 kB | 38 kB | 16/49 kB&#xD;Progress (4): 13 kB | 38 kB | 16/49 kB | 3.8/87 kB&#xD;Progress (4): 13 kB | 38 kB | 20/49 kB | 3.8/87 kB&#xD;Progress (4): 13 kB | 38 kB | 20/49 kB | 7.8/87 kB&#xD;Progress (4): 13 kB | 38 kB | 24/49 kB | 7.8/87 kB&#xD;Progress (4): 13 kB | 38 kB | 24/49 kB | 12/87 kB &#xD;                                                 &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interactivity-api/1.0-alpha-4/plexus-interactivity-api-1.0-alpha-4.jar (13 kB at 95 kB/s)&#xA;Progress (4): 38 kB | 24/49 kB | 12/87 kB | 4.1/86 kB&#xD;Progress (4): 38 kB | 28/49 kB | 12/87 kB | 4.1/86 kB&#xD;Progress (4): 38 kB | 28/49 kB | 16/87 kB | 4.1/86 kB&#xD;                                                     &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.6/maven-monitor-2.0.6.jar&#xA;Progress (4): 38 kB | 32/49 kB | 16/87 kB | 4.1/86 kB&#xD;Progress (4): 38 kB | 32/49 kB | 20/87 kB | 4.1/86 kB&#xD;Progress (4): 38 kB | 32/49 kB | 20/87 kB | 7.7/86 kB&#xD;Progress (4): 38 kB | 32/49 kB | 20/87 kB | 12/86 kB &#xD;Progress (4): 38 kB | 32/49 kB | 24/87 kB | 12/86 kB&#xD;Progress (4): 38 kB | 36/49 kB | 24/87 kB | 12/86 kB&#xD;Progress (4): 38 kB | 36/49 kB | 24/87 kB | 16/86 kB&#xD;Progress (4): 38 kB | 36/49 kB | 28/87 kB | 16/86 kB&#xD;Progress (4): 38 kB | 40/49 kB | 28/87 kB | 16/86 kB&#xD;Progress (4): 38 kB | 40/49 kB | 32/87 kB | 16/86 kB&#xD;Progress (4): 38 kB | 44/49 kB | 32/87 kB | 16/86 kB&#xD;Progress (4): 38 kB | 44/49 kB | 32/87 kB | 20/86 kB&#xD;Progress (4): 38 kB | 44/49 kB | 36/87 kB | 20/86 kB&#xD;Progress (4): 38 kB | 44/49 kB | 36/87 kB | 24/86 kB&#xD;Progress (4): 38 kB | 44/49 kB | 36/87 kB | 28/86 kB&#xD;Progress (4): 38 kB | 48/49 kB | 36/87 kB | 28/86 kB&#xD;Progress (4): 38 kB | 48/49 kB | 40/87 kB | 28/86 kB&#xD;Progress (4): 38 kB | 49 kB | 40/87 kB | 28/86 kB   &#xD;Progress (4): 38 kB | 49 kB | 44/87 kB | 28/86 kB&#xD;Progress (4): 38 kB | 49 kB | 44/87 kB | 32/86 kB&#xD;Progress (4): 38 kB | 49 kB | 48/87 kB | 32/86 kB&#xD;Progress (4): 38 kB | 49 kB | 48/87 kB | 36/86 kB&#xD;Progress (4): 38 kB | 49 kB | 48/87 kB | 40/86 kB&#xD;Progress (4): 38 kB | 49 kB | 52/87 kB | 40/86 kB&#xD;Progress (4): 38 kB | 49 kB | 52/87 kB | 45/86 kB&#xD;Progress (4): 38 kB | 49 kB | 56/87 kB | 45/86 kB&#xD;Progress (4): 38 kB | 49 kB | 61/87 kB | 45/86 kB&#xD;Progress (4): 38 kB | 49 kB | 61/87 kB | 49/86 kB&#xD;Progress (4): 38 kB | 49 kB | 61/87 kB | 53/86 kB&#xD;Progress (4): 38 kB | 49 kB | 61/87 kB | 57/86 kB&#xD;Progress (4): 38 kB | 49 kB | 61/87 kB | 61/86 kB&#xD;Progress (4): 38 kB | 49 kB | 65/87 kB | 61/86 kB&#xD;Progress (4): 38 kB | 49 kB | 69/87 kB | 61/86 kB&#xD;Progress (4): 38 kB | 49 kB | 73/87 kB | 61/86 kB&#xD;Progress (4): 38 kB | 49 kB | 77/87 kB | 61/86 kB&#xD;Progress (4): 38 kB | 49 kB | 81/87 kB | 61/86 kB&#xD;Progress (4): 38 kB | 49 kB | 85/87 kB | 61/86 kB&#xD;Progress (4): 38 kB | 49 kB | 85/87 kB | 65/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 65/86 kB   &#xD;Progress (4): 38 kB | 49 kB | 87 kB | 69/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 73/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 77/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 81/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 86/86 kB&#xD;Progress (4): 38 kB | 49 kB | 87 kB | 86 kB   &#xD;                                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1/classworlds-1.1.jar (38 kB at 251 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9-stable-1/plexus-container-default-1.0-alpha-9-stable-1.jar&#xA;Progress (4): 49 kB | 87 kB | 86 kB | 4.1/10 kB&#xD;Progress (4): 49 kB | 87 kB | 86 kB | 7.7/10 kB&#xD;Progress (4): 49 kB | 87 kB | 86 kB | 10 kB    &#xD;                                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.6/maven-model-2.0.6.jar (86 kB at 557 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.1/junit-3.8.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.6/maven-settings-2.0.6.jar (49 kB at 317 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.5/plexus-utils-2.0.5.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.6/maven-artifact-2.0.6.jar (87 kB at 543 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-filtering/1.1/maven-filtering-1.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.6/maven-monitor-2.0.6.jar (10 kB at 62 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-build-api/0.0.4/plexus-build-api-0.0.4.jar&#xA;Progress (1): 4.1/223 kB&#xD;Progress (1): 7.7/223 kB&#xD;Progress (1): 12/223 kB &#xD;Progress (1): 16/223 kB&#xD;Progress (1): 20/223 kB&#xD;Progress (1): 24/223 kB&#xD;Progress (1): 28/223 kB&#xD;Progress (1): 32/223 kB&#xD;Progress (1): 36/223 kB&#xD;Progress (1): 40/223 kB&#xD;Progress (2): 40/223 kB | 3.8/121 kB&#xD;Progress (2): 40/223 kB | 7.8/121 kB&#xD;Progress (2): 45/223 kB | 7.8/121 kB&#xD;Progress (2): 45/223 kB | 12/121 kB &#xD;Progress (2): 49/223 kB | 12/121 kB&#xD;Progress (2): 53/223 kB | 12/121 kB&#xD;Progress (2): 57/223 kB | 12/121 kB&#xD;Progress (2): 57/223 kB | 16/121 kB&#xD;Progress (2): 57/223 kB | 20/121 kB&#xD;Progress (2): 61/223 kB | 20/121 kB&#xD;Progress (2): 65/223 kB | 20/121 kB&#xD;Progress (2): 69/223 kB | 20/121 kB&#xD;Progress (2): 69/223 kB | 24/121 kB&#xD;Progress (2): 73/223 kB | 24/121 kB&#xD;Progress (2): 73/223 kB | 28/121 kB&#xD;Progress (2): 73/223 kB | 32/121 kB&#xD;Progress (2): 73/223 kB | 36/121 kB&#xD;Progress (2): 77/223 kB | 36/121 kB&#xD;Progress (2): 81/223 kB | 36/121 kB&#xD;Progress (2): 81/223 kB | 40/121 kB&#xD;Progress (2): 86/223 kB | 40/121 kB&#xD;Progress (2): 90/223 kB | 40/121 kB&#xD;Progress (2): 90/223 kB | 45/121 kB&#xD;Progress (2): 90/223 kB | 49/121 kB&#xD;Progress (2): 90/223 kB | 53/121 kB&#xD;Progress (2): 90/223 kB | 57/121 kB&#xD;Progress (2): 94/223 kB | 57/121 kB&#xD;Progress (2): 98/223 kB | 57/121 kB&#xD;Progress (2): 98/223 kB | 61/121 kB&#xD;Progress (2): 102/223 kB | 61/121 kB&#xD;Progress (2): 106/223 kB | 61/121 kB&#xD;Progress (2): 106/223 kB | 65/121 kB&#xD;Progress (2): 106/223 kB | 69/121 kB&#xD;Progress (2): 106/223 kB | 73/121 kB&#xD;Progress (2): 106/223 kB | 77/121 kB&#xD;Progress (2): 110/223 kB | 77/121 kB&#xD;Progress (2): 114/223 kB | 77/121 kB&#xD;Progress (3): 114/223 kB | 77/121 kB | 3.8/194 kB&#xD;Progress (3): 118/223 kB | 77/121 kB | 3.8/194 kB&#xD;Progress (3): 122/223 kB | 77/121 kB | 3.8/194 kB&#xD;Progress (3): 122/223 kB | 81/121 kB | 3.8/194 kB&#xD;Progress (3): 122/223 kB | 81/121 kB | 7.8/194 kB&#xD;Progress (3): 122/223 kB | 86/121 kB | 7.8/194 kB&#xD;Progress (3): 122/223 kB | 90/121 kB | 7.8/194 kB&#xD;Progress (3): 126/223 kB | 90/121 kB | 7.8/194 kB&#xD;Progress (3): 126/223 kB | 90/121 kB | 12/194 kB &#xD;Progress (3): 126/223 kB | 94/121 kB | 12/194 kB&#xD;Progress (3): 131/223 kB | 94/121 kB | 12/194 kB&#xD;Progress (3): 131/223 kB | 94/121 kB | 16/194 kB&#xD;Progress (3): 131/223 kB | 94/121 kB | 20/194 kB&#xD;Progress (3): 131/223 kB | 94/121 kB | 24/194 kB&#xD;Progress (3): 135/223 kB | 94/121 kB | 24/194 kB&#xD;Progress (3): 139/223 kB | 94/121 kB | 24/194 kB&#xD;Progress (3): 143/223 kB | 94/121 kB | 24/194 kB&#xD;Progress (3): 147/223 kB | 94/121 kB | 24/194 kB&#xD;Progress (3): 147/223 kB | 98/121 kB | 24/194 kB&#xD;Progress (3): 147/223 kB | 98/121 kB | 28/194 kB&#xD;Progress (3): 147/223 kB | 102/121 kB | 28/194 kB&#xD;Progress (3): 147/223 kB | 102/121 kB | 32/194 kB&#xD;Progress (3): 147/223 kB | 106/121 kB | 32/194 kB&#xD;Progress (3): 147/223 kB | 106/121 kB | 37/194 kB&#xD;Progress (3): 147/223 kB | 110/121 kB | 37/194 kB&#xD;Progress (3): 147/223 kB | 110/121 kB | 41/194 kB&#xD;Progress (3): 151/223 kB | 110/121 kB | 41/194 kB&#xD;Progress (3): 155/223 kB | 110/121 kB | 41/194 kB&#xD;Progress (3): 159/223 kB | 110/121 kB | 41/194 kB&#xD;Progress (3): 163/223 kB | 110/121 kB | 41/194 kB&#xD;Progress (3): 163/223 kB | 114/121 kB | 41/194 kB&#xD;Progress (3): 163/223 kB | 114/121 kB | 45/194 kB&#xD;Progress (3): 163/223 kB | 118/121 kB | 45/194 kB&#xD;Progress (3): 163/223 kB | 118/121 kB | 49/194 kB&#xD;Progress (3): 163/223 kB | 121 kB | 49/194 kB    &#xD;Progress (3): 167/223 kB | 121 kB | 49/194 kB&#xD;Progress (3): 167/223 kB | 121 kB | 53/194 kB&#xD;Progress (3): 172/223 kB | 121 kB | 53/194 kB&#xD;Progress (3): 172/223 kB | 121 kB | 57/194 kB&#xD;Progress (3): 176/223 kB | 121 kB | 57/194 kB&#xD;Progress (3): 180/223 kB | 121 kB | 57/194 kB&#xD;Progress (3): 180/223 kB | 121 kB | 61/194 kB&#xD;Progress (3): 180/223 kB | 121 kB | 65/194 kB&#xD;Progress (3): 180/223 kB | 121 kB | 69/194 kB&#xD;Progress (3): 184/223 kB | 121 kB | 69/194 kB&#xD;Progress (3): 184/223 kB | 121 kB | 73/194 kB&#xD;Progress (3): 188/223 kB | 121 kB | 73/194 kB&#xD;Progress (3): 192/223 kB | 121 kB | 73/194 kB&#xD;Progress (3): 196/223 kB | 121 kB | 73/194 kB&#xD;Progress (3): 200/223 kB | 121 kB | 73/194 kB&#xD;Progress (3): 204/223 kB | 121 kB | 73/194 kB&#xD;Progress (3): 204/223 kB | 121 kB | 77/194 kB&#xD;Progress (3): 208/223 kB | 121 kB | 77/194 kB&#xD;Progress (3): 208/223 kB | 121 kB | 82/194 kB&#xD;Progress (3): 213/223 kB | 121 kB | 82/194 kB&#xD;Progress (3): 213/223 kB | 121 kB | 86/194 kB&#xD;Progress (3): 213/223 kB | 121 kB | 90/194 kB&#xD;Progress (3): 217/223 kB | 121 kB | 90/194 kB&#xD;Progress (3): 221/223 kB | 121 kB | 90/194 kB&#xD;Progress (3): 223 kB | 121 kB | 90/194 kB    &#xD;Progress (3): 223 kB | 121 kB | 94/194 kB&#xD;Progress (3): 223 kB | 121 kB | 98/194 kB&#xD;Progress (3): 223 kB | 121 kB | 102/194 kB&#xD;Progress (3): 223 kB | 121 kB | 106/194 kB&#xD;Progress (3): 223 kB | 121 kB | 110/194 kB&#xD;Progress (3): 223 kB | 121 kB | 114/194 kB&#xD;Progress (3): 223 kB | 121 kB | 118/194 kB&#xD;Progress (3): 223 kB | 121 kB | 123/194 kB&#xD;Progress (3): 223 kB | 121 kB | 127/194 kB&#xD;Progress (3): 223 kB | 121 kB | 131/194 kB&#xD;Progress (3): 223 kB | 121 kB | 135/194 kB&#xD;Progress (3): 223 kB | 121 kB | 139/194 kB&#xD;Progress (3): 223 kB | 121 kB | 143/194 kB&#xD;Progress (3): 223 kB | 121 kB | 147/194 kB&#xD;Progress (3): 223 kB | 121 kB | 151/194 kB&#xD;Progress (3): 223 kB | 121 kB | 155/194 kB&#xD;Progress (3): 223 kB | 121 kB | 159/194 kB&#xD;Progress (3): 223 kB | 121 kB | 163/194 kB&#xD;Progress (4): 223 kB | 121 kB | 163/194 kB | 3.2/6.8 kB&#xD;Progress (4): 223 kB | 121 kB | 167/194 kB | 3.2/6.8 kB&#xD;Progress (4): 223 kB | 121 kB | 172/194 kB | 3.2/6.8 kB&#xD;Progress (4): 223 kB | 121 kB | 176/194 kB | 3.2/6.8 kB&#xD;Progress (4): 223 kB | 121 kB | 180/194 kB | 3.2/6.8 kB&#xD;Progress (4): 223 kB | 121 kB | 180/194 kB | 6.8 kB    &#xD;Progress (4): 223 kB | 121 kB | 184/194 kB | 6.8 kB&#xD;Progress (4): 223 kB | 121 kB | 188/194 kB | 6.8 kB&#xD;Progress (4): 223 kB | 121 kB | 192/194 kB | 6.8 kB&#xD;Progress (4): 223 kB | 121 kB | 194 kB | 6.8 kB    &#xD;Progress (5): 223 kB | 121 kB | 194 kB | 6.8 kB | 4.1/43 kB&#xD;Progress (5): 223 kB | 121 kB | 194 kB | 6.8 kB | 7.7/43 kB&#xD;Progress (5): 223 kB | 121 kB | 194 kB | 6.8 kB | 12/43 kB &#xD;Progress (5): 223 kB | 121 kB | 194 kB | 6.8 kB | 15/43 kB&#xD;Progress (5): 223 kB | 121 kB | 194 kB | 6.8 kB | 20/43 kB&#xD;Progress (5): 223 kB | 121 kB | 194 kB | 6.8 kB | 24/43 kB&#xD;Progress (5): 223 kB | 121 kB | 194 kB | 6.8 kB | 28/43 kB&#xD;Progress (5): 223 kB | 121 kB | 194 kB | 6.8 kB | 32/43 kB&#xD;Progress (5): 223 kB | 121 kB | 194 kB | 6.8 kB | 36/43 kB&#xD;Progress (5): 223 kB | 121 kB | 194 kB | 6.8 kB | 40/43 kB&#xD;Progress (5): 223 kB | 121 kB | 194 kB | 6.8 kB | 43 kB   &#xD;                                                       &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.1/junit-3.8.1.jar (121 kB at 637 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.13/plexus-interpolation-1.13.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.5/plexus-utils-2.0.5.jar (223 kB at 1.2 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-build-api/0.0.4/plexus-build-api-0.0.4.jar (6.8 kB at 35 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9-stable-1/plexus-container-default-1.0-alpha-9-stable-1.jar (194 kB at 971 kB/s)&#xA;Progress (2): 43 kB | 4.1/61 kB&#xD;Progress (2): 43 kB | 7.7/61 kB&#xD;Progress (2): 43 kB | 12/61 kB &#xD;Progress (2): 43 kB | 16/61 kB&#xD;Progress (2): 43 kB | 20/61 kB&#xD;Progress (2): 43 kB | 24/61 kB&#xD;Progress (2): 43 kB | 28/61 kB&#xD;Progress (2): 43 kB | 32/61 kB&#xD;Progress (2): 43 kB | 36/61 kB&#xD;Progress (2): 43 kB | 40/61 kB&#xD;Progress (2): 43 kB | 45/61 kB&#xD;Progress (2): 43 kB | 49/61 kB&#xD;Progress (2): 43 kB | 53/61 kB&#xD;Progress (2): 43 kB | 57/61 kB&#xD;                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-filtering/1.1/maven-filtering-1.1.jar (43 kB at 210 kB/s)&#xA;Progress (1): 61/61 kB&#xD;Progress (1): 61 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.13/plexus-interpolation-1.13.jar (61 kB at 281 kB/s)&#xA;[WARNING] Using platform encoding (UTF-8 actually) to copy filtered resources, i.e. build is platform dependent!&#xA;[INFO] skip non existing resourceDirectory /work/src/main/resources&#xA;[INFO] &#xA;[INFO] --- maven-compiler-plugin:3.1:compile (default-compile) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.9/maven-plugin-api-2.0.9.pom&#xA;Progress (1): 1.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.9/maven-plugin-api-2.0.9.pom (1.5 kB at 57 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.0.9/maven-2.0.9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 19 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.0.9/maven-2.0.9.pom (19 kB at 450 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/8/maven-parent-8.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 24 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/8/maven-parent-8.pom (24 kB at 804 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/4/apache-4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/4/apache-4.pom (4.5 kB at 173 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.9/maven-artifact-2.0.9.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.9/maven-artifact-2.0.9.pom (1.6 kB at 60 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.1/plexus-utils-1.5.1.pom&#xA;Progress (1): 2.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.1/plexus-utils-1.5.1.pom (2.3 kB at 88 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.9/maven-core-2.0.9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.9/maven-core-2.0.9.pom (7.8 kB at 311 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.9/maven-settings-2.0.9.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.9/maven-settings-2.0.9.pom (2.1 kB at 74 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.9/maven-model-2.0.9.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.9/maven-model-2.0.9.pom (3.1 kB at 116 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.9/maven-plugin-parameter-documenter-2.0.9.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.9/maven-plugin-parameter-documenter-2.0.9.pom (2.0 kB at 79 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.9/maven-profile-2.0.9.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.9/maven-profile-2.0.9.pom (2.0 kB at 66 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.9/maven-repository-metadata-2.0.9.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.9/maven-repository-metadata-2.0.9.pom (1.9 kB at 68 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.9/maven-error-diagnostics-2.0.9.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.9/maven-error-diagnostics-2.0.9.pom (1.7 kB at 65 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.9/maven-project-2.0.9.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.9/maven-project-2.0.9.pom (2.7 kB at 90 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.9/maven-artifact-manager-2.0.9.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.9/maven-artifact-manager-2.0.9.pom (2.7 kB at 96 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.9/maven-plugin-registry-2.0.9.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.9/maven-plugin-registry-2.0.9.pom (2.0 kB at 68 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.9/maven-plugin-descriptor-2.0.9.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.9/maven-plugin-descriptor-2.0.9.pom (2.1 kB at 74 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.9/maven-monitor-2.0.9.pom&#xA;Progress (1): 1.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.9/maven-monitor-2.0.9.pom (1.3 kB at 48 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/1.0/maven-toolchain-1.0.pom&#xA;Progress (1): 3.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/1.0/maven-toolchain-1.0.pom (3.4 kB at 110 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/0.1/maven-shared-utils-0.1.pom&#xA;Progress (1): 4.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/0.1/maven-shared-utils-0.1.pom (4.0 kB at 150 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/18/maven-shared-components-18.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/18/maven-shared-components-18.pom (4.9 kB at 206 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/2.0.1/jsr305-2.0.1.pom&#xA;Progress (1): 965 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/2.0.1/jsr305-2.0.1.pom (965 B at 36 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-incremental/1.1/maven-shared-incremental-1.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-incremental/1.1/maven-shared-incremental-1.1.pom (4.7 kB at 176 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/19/maven-shared-components-19.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/19/maven-shared-components-19.pom (6.4 kB at 245 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.2.1/maven-plugin-api-2.2.1.pom&#xA;Progress (1): 1.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.2.1/maven-plugin-api-2.2.1.pom (1.5 kB at 54 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.2.1/maven-2.2.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 22 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.2.1/maven-2.2.1.pom (22 kB at 830 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/11/maven-parent-11.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 32 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/11/maven-parent-11.pom (32 kB at 1.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/5/apache-5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/5/apache-5.pom (4.1 kB at 152 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.2.1/maven-core-2.2.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.2.1/maven-core-2.2.1.pom (12 kB at 388 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.2.1/maven-settings-2.2.1.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.2.1/maven-settings-2.2.1.pom (2.2 kB at 81 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.2.1/maven-model-2.2.1.pom&#xA;Progress (1): 3.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.2.1/maven-model-2.2.1.pom (3.2 kB at 120 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.11/plexus-interpolation-1.11.pom&#xA;Progress (1): 889 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.11/plexus-interpolation-1.11.pom (889 B at 36 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.2.1/maven-plugin-parameter-documenter-2.2.1.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.2.1/maven-plugin-parameter-documenter-2.2.1.pom (2.0 kB at 75 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-jdk14/1.5.6/slf4j-jdk14-1.5.6.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-jdk14/1.5.6/slf4j-jdk14-1.5.6.pom (1.9 kB at 63 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.5.6/slf4j-parent-1.5.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.5.6/slf4j-parent-1.5.6.pom (7.9 kB at 203 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.5.6/slf4j-api-1.5.6.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.5.6/slf4j-api-1.5.6.pom (3.0 kB at 107 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/jcl-over-slf4j/1.5.6/jcl-over-slf4j-1.5.6.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/jcl-over-slf4j/1.5.6/jcl-over-slf4j-1.5.6.pom (2.2 kB at 70 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.2.1/maven-profile-2.2.1.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.2.1/maven-profile-2.2.1.pom (2.2 kB at 78 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.2.1/maven-artifact-2.2.1.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.2.1/maven-artifact-2.2.1.pom (1.6 kB at 56 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.2.1/maven-repository-metadata-2.2.1.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.2.1/maven-repository-metadata-2.2.1.pom (1.9 kB at 69 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.2.1/maven-error-diagnostics-2.2.1.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.2.1/maven-error-diagnostics-2.2.1.pom (1.7 kB at 61 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.2.1/maven-project-2.2.1.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.2.1/maven-project-2.2.1.pom (2.8 kB at 92 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.2.1/maven-artifact-manager-2.2.1.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.2.1/maven-artifact-manager-2.2.1.pom (3.1 kB at 111 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/backport-util-concurrent/backport-util-concurrent/3.1/backport-util-concurrent-3.1.pom&#xA;Progress (1): 880 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/backport-util-concurrent/backport-util-concurrent/3.1/backport-util-concurrent-3.1.pom (880 B at 31 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.2.1/maven-plugin-registry-2.2.1.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.2.1/maven-plugin-registry-2.2.1.pom (1.9 kB at 74 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.2.1/maven-plugin-descriptor-2.2.1.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.2.1/maven-plugin-descriptor-2.2.1.pom (2.1 kB at 86 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.2.1/maven-monitor-2.2.1.pom&#xA;Progress (1): 1.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.2.1/maven-monitor-2.2.1.pom (1.3 kB at 43 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-sec-dispatcher/1.3/plexus-sec-dispatcher-1.3.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-sec-dispatcher/1.3/plexus-sec-dispatcher-1.3.pom (3.0 kB at 90 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/12/spice-parent-12.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/12/spice-parent-12.pom (6.8 kB at 283 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/4/forge-parent-4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/4/forge-parent-4.pom (8.4 kB at 323 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.5/plexus-utils-1.5.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.5/plexus-utils-1.5.5.pom (5.1 kB at 214 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-cipher/1.4/plexus-cipher-1.4.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-cipher/1.4/plexus-cipher-1.4.pom (2.1 kB at 86 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/1.5.5/plexus-component-annotations-1.5.5.pom&#xA;Progress (1): 815 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/1.5.5/plexus-component-annotations-1.5.5.pom (815 B at 28 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/1.5.5/plexus-containers-1.5.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/1.5.5/plexus-containers-1.5.5.pom (4.2 kB at 141 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.7/plexus-2.0.7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 17 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.7/plexus-2.0.7.pom (17 kB at 618 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-api/2.2/plexus-compiler-api-2.2.pom&#xA;Progress (1): 865 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-api/2.2/plexus-compiler-api-2.2.pom (865 B at 35 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler/2.2/plexus-compiler-2.2.pom&#xA;Progress (1): 3.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler/2.2/plexus-compiler-2.2.pom (3.6 kB at 117 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.3.1/plexus-components-1.3.1.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.3.1/plexus-components-1.3.1.pom (3.1 kB at 79 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/3.3.1/plexus-3.3.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/3.3.1/plexus-3.3.1.pom (20 kB at 818 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/17/spice-parent-17.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/17/spice-parent-17.pom (6.8 kB at 241 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/10/forge-parent-10.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/10/forge-parent-10.pom (14 kB at 565 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0.8/plexus-utils-3.0.8.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0.8/plexus-utils-3.0.8.pom (3.1 kB at 116 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/3.2/plexus-3.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 19 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/3.2/plexus-3.2.pom (19 kB at 721 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-manager/2.2/plexus-compiler-manager-2.2.pom&#xA;Progress (1): 690 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-manager/2.2/plexus-compiler-manager-2.2.pom (690 B at 24 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-javac/2.2/plexus-compiler-javac-2.2.pom&#xA;Progress (1): 769 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-javac/2.2/plexus-compiler-javac-2.2.pom (769 B at 26 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compilers/2.2/plexus-compilers-2.2.pom&#xA;Progress (1): 1.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compilers/2.2/plexus-compilers-2.2.pom (1.2 kB at 48 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.5.5/plexus-container-default-1.5.5.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.5.5/plexus-container-default-1.5.5.pom (2.8 kB at 102 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.4.5/plexus-utils-1.4.5.pom&#xA;Progress (1): 2.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.4.5/plexus-utils-1.4.5.pom (2.3 kB at 91 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.2/plexus-classworlds-2.2.2.pom&#xA;Progress (1): 4.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.2/plexus-classworlds-2.2.2.pom (4.0 kB at 139 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean-reflect/3.4/xbean-reflect-3.4.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean-reflect/3.4/xbean-reflect-3.4.pom (2.8 kB at 97 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean/3.4/xbean-3.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 19 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean/3.4/xbean-3.4.pom (19 kB at 686 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/log4j/log4j/1.2.12/log4j-1.2.12.pom&#xA;Progress (1): 145 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/log4j/log4j/1.2.12/log4j-1.2.12.pom (145 B at 4.5 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-logging/commons-logging-api/1.1/commons-logging-api-1.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-logging/commons-logging-api/1.1/commons-logging-api-1.1.pom (5.3 kB at 198 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/collections/google-collections/1.0/google-collections-1.0.pom&#xA;Progress (1): 2.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/collections/google-collections/1.0/google-collections-1.0.pom (2.5 kB at 83 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/google/1/google-1.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/google/1/google-1.pom (1.6 kB at 68 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.2/junit-3.8.2.pom&#xA;Progress (1): 747 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.2/junit-3.8.2.pom (747 B at 28 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.9/maven-plugin-api-2.0.9.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.9/maven-artifact-2.0.9.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.1/plexus-utils-1.5.1.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.9/maven-core-2.0.9.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.9/maven-settings-2.0.9.jar&#xA;Progress (1): 4.1/13 kB&#xD;Progress (1): 7.3/13 kB&#xD;Progress (1): 11/13 kB &#xD;Progress (1): 13 kB   &#xD;Progress (2): 13 kB | 4.1/49 kB&#xD;Progress (2): 13 kB | 7.7/49 kB&#xD;Progress (2): 13 kB | 12/49 kB &#xD;Progress (2): 13 kB | 16/49 kB&#xD;Progress (2): 13 kB | 20/49 kB&#xD;Progress (2): 13 kB | 24/49 kB&#xD;Progress (2): 13 kB | 28/49 kB&#xD;Progress (2): 13 kB | 32/49 kB&#xD;Progress (2): 13 kB | 36/49 kB&#xD;Progress (2): 13 kB | 40/49 kB&#xD;Progress (2): 13 kB | 45/49 kB&#xD;Progress (2): 13 kB | 49/49 kB&#xD;Progress (2): 13 kB | 49 kB   &#xD;Progress (3): 13 kB | 49 kB | 4.1/160 kB&#xD;Progress (3): 13 kB | 49 kB | 7.7/160 kB&#xD;Progress (3): 13 kB | 49 kB | 12/160 kB &#xD;Progress (3): 13 kB | 49 kB | 16/160 kB&#xD;Progress (3): 13 kB | 49 kB | 20/160 kB&#xD;Progress (3): 13 kB | 49 kB | 24/160 kB&#xD;Progress (3): 13 kB | 49 kB | 28/160 kB&#xD;Progress (3): 13 kB | 49 kB | 32/160 kB&#xD;Progress (3): 13 kB | 49 kB | 36/160 kB&#xD;Progress (3): 13 kB | 49 kB | 40/160 kB&#xD;Progress (3): 13 kB | 49 kB | 45/160 kB&#xD;Progress (3): 13 kB | 49 kB | 49/160 kB&#xD;Progress (3): 13 kB | 49 kB | 53/160 kB&#xD;Progress (3): 13 kB | 49 kB | 57/160 kB&#xD;Progress (3): 13 kB | 49 kB | 61/160 kB&#xD;Progress (3): 13 kB | 49 kB | 65/160 kB&#xD;Progress (3): 13 kB | 49 kB | 69/160 kB&#xD;Progress (3): 13 kB | 49 kB | 73/160 kB&#xD;Progress (3): 13 kB | 49 kB | 77/160 kB&#xD;Progress (3): 13 kB | 49 kB | 81/160 kB&#xD;Progress (3): 13 kB | 49 kB | 86/160 kB&#xD;Progress (3): 13 kB | 49 kB | 90/160 kB&#xD;Progress (3): 13 kB | 49 kB | 94/160 kB&#xD;Progress (3): 13 kB | 49 kB | 98/160 kB&#xD;Progress (3): 13 kB | 49 kB | 102/160 kB&#xD;Progress (3): 13 kB | 49 kB | 106/160 kB&#xD;Progress (3): 13 kB | 49 kB | 110/160 kB&#xD;Progress (3): 13 kB | 49 kB | 114/160 kB&#xD;Progress (3): 13 kB | 49 kB | 118/160 kB&#xD;Progress (3): 13 kB | 49 kB | 122/160 kB&#xD;Progress (3): 13 kB | 49 kB | 126/160 kB&#xD;Progress (3): 13 kB | 49 kB | 131/160 kB&#xD;Progress (3): 13 kB | 49 kB | 135/160 kB&#xD;Progress (3): 13 kB | 49 kB | 139/160 kB&#xD;Progress (3): 13 kB | 49 kB | 143/160 kB&#xD;Progress (3): 13 kB | 49 kB | 147/160 kB&#xD;Progress (3): 13 kB | 49 kB | 151/160 kB&#xD;Progress (3): 13 kB | 49 kB | 155/160 kB&#xD;Progress (3): 13 kB | 49 kB | 159/160 kB&#xD;Progress (3): 13 kB | 49 kB | 160 kB    &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.9/maven-plugin-api-2.0.9.jar (13 kB at 477 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.9/maven-plugin-parameter-documenter-2.0.9.jar&#xA;Progress (3): 49 kB | 160 kB | 4.1/211 kB&#xD;Progress (3): 49 kB | 160 kB | 7.7/211 kB&#xD;Progress (3): 49 kB | 160 kB | 12/211 kB &#xD;Progress (3): 49 kB | 160 kB | 16/211 kB&#xD;Progress (3): 49 kB | 160 kB | 20/211 kB&#xD;Progress (3): 49 kB | 160 kB | 24/211 kB&#xD;Progress (3): 49 kB | 160 kB | 28/211 kB&#xD;Progress (3): 49 kB | 160 kB | 32/211 kB&#xD;Progress (3): 49 kB | 160 kB | 36/211 kB&#xD;Progress (3): 49 kB | 160 kB | 40/211 kB&#xD;Progress (3): 49 kB | 160 kB | 44/211 kB&#xD;Progress (3): 49 kB | 160 kB | 48/211 kB&#xD;Progress (3): 49 kB | 160 kB | 52/211 kB&#xD;Progress (3): 49 kB | 160 kB | 56/211 kB&#xD;Progress (3): 49 kB | 160 kB | 61/211 kB&#xD;Progress (3): 49 kB | 160 kB | 65/211 kB&#xD;Progress (3): 49 kB | 160 kB | 69/211 kB&#xD;Progress (3): 49 kB | 160 kB | 73/211 kB&#xD;Progress (3): 49 kB | 160 kB | 77/211 kB&#xD;Progress (3): 49 kB | 160 kB | 81/211 kB&#xD;Progress (3): 49 kB | 160 kB | 85/211 kB&#xD;Progress (3): 49 kB | 160 kB | 89/211 kB&#xD;Progress (3): 49 kB | 160 kB | 93/211 kB&#xD;Progress (3): 49 kB | 160 kB | 97/211 kB&#xD;Progress (3): 49 kB | 160 kB | 102/211 kB&#xD;Progress (3): 49 kB | 160 kB | 106/211 kB&#xD;Progress (3): 49 kB | 160 kB | 110/211 kB&#xD;Progress (4): 49 kB | 160 kB | 110/211 kB | 4.1/89 kB&#xD;Progress (4): 49 kB | 160 kB | 114/211 kB | 4.1/89 kB&#xD;Progress (4): 49 kB | 160 kB | 114/211 kB | 7.7/89 kB&#xD;Progress (4): 49 kB | 160 kB | 114/211 kB | 12/89 kB &#xD;Progress (4): 49 kB | 160 kB | 114/211 kB | 16/89 kB&#xD;Progress (4): 49 kB | 160 kB | 118/211 kB | 16/89 kB&#xD;Progress (4): 49 kB | 160 kB | 122/211 kB | 16/89 kB&#xD;Progress (4): 49 kB | 160 kB | 126/211 kB | 16/89 kB&#xD;Progress (4): 49 kB | 160 kB | 126/211 kB | 20/89 kB&#xD;Progress (4): 49 kB | 160 kB | 130/211 kB | 20/89 kB&#xD;Progress (4): 49 kB | 160 kB | 130/211 kB | 24/89 kB&#xD;Progress (4): 49 kB | 160 kB | 134/211 kB | 24/89 kB&#xD;Progress (4): 49 kB | 160 kB | 134/211 kB | 28/89 kB&#xD;Progress (4): 49 kB | 160 kB | 134/211 kB | 32/89 kB&#xD;Progress (4): 49 kB | 160 kB | 134/211 kB | 36/89 kB&#xD;Progress (4): 49 kB | 160 kB | 134/211 kB | 40/89 kB&#xD;Progress (4): 49 kB | 160 kB | 138/211 kB | 40/89 kB&#xD;Progress (4): 49 kB | 160 kB | 138/211 kB | 45/89 kB&#xD;Progress (4): 49 kB | 160 kB | 142/211 kB | 45/89 kB&#xD;Progress (4): 49 kB | 160 kB | 142/211 kB | 49/89 kB&#xD;Progress (4): 49 kB | 160 kB | 147/211 kB | 49/89 kB&#xD;Progress (4): 49 kB | 160 kB | 147/211 kB | 53/89 kB&#xD;Progress (4): 49 kB | 160 kB | 147/211 kB | 57/89 kB&#xD;Progress (4): 49 kB | 160 kB | 151/211 kB | 57/89 kB&#xD;Progress (4): 49 kB | 160 kB | 155/211 kB | 57/89 kB&#xD;Progress (4): 49 kB | 160 kB | 155/211 kB | 61/89 kB&#xD;Progress (4): 49 kB | 160 kB | 159/211 kB | 61/89 kB&#xD;Progress (4): 49 kB | 160 kB | 159/211 kB | 65/89 kB&#xD;Progress (4): 49 kB | 160 kB | 163/211 kB | 65/89 kB&#xD;Progress (4): 49 kB | 160 kB | 163/211 kB | 69/89 kB&#xD;Progress (4): 49 kB | 160 kB | 163/211 kB | 73/89 kB&#xD;Progress (4): 49 kB | 160 kB | 167/211 kB | 73/89 kB&#xD;Progress (4): 49 kB | 160 kB | 171/211 kB | 73/89 kB&#xD;Progress (4): 49 kB | 160 kB | 175/211 kB | 73/89 kB&#xD;Progress (4): 49 kB | 160 kB | 179/211 kB | 73/89 kB&#xD;Progress (4): 49 kB | 160 kB | 179/211 kB | 77/89 kB&#xD;Progress (4): 49 kB | 160 kB | 179/211 kB | 81/89 kB&#xD;Progress (4): 49 kB | 160 kB | 179/211 kB | 86/89 kB&#xD;Progress (4): 49 kB | 160 kB | 183/211 kB | 86/89 kB&#xD;                                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.9/maven-settings-2.0.9.jar (49 kB at 1.6 MB/s)&#xA;Progress (3): 160 kB | 183/211 kB | 89 kB&#xD;                                         &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.9/maven-profile-2.0.9.jar&#xA;Progress (3): 160 kB | 188/211 kB | 89 kB&#xD;Progress (3): 160 kB | 192/211 kB | 89 kB&#xD;Progress (3): 160 kB | 196/211 kB | 89 kB&#xD;Progress (3): 160 kB | 200/211 kB | 89 kB&#xD;Progress (3): 160 kB | 204/211 kB | 89 kB&#xD;Progress (3): 160 kB | 208/211 kB | 89 kB&#xD;Progress (3): 160 kB | 211 kB | 89 kB    &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.9/maven-core-2.0.9.jar (160 kB at 4.3 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.9/maven-model-2.0.9.jar&#xA;Progress (3): 211 kB | 89 kB | 3.2/21 kB&#xD;Progress (3): 211 kB | 89 kB | 7.3/21 kB&#xD;Progress (3): 211 kB | 89 kB | 11/21 kB &#xD;Progress (3): 211 kB | 89 kB | 15/21 kB&#xD;Progress (3): 211 kB | 89 kB | 20/21 kB&#xD;Progress (3): 211 kB | 89 kB | 21 kB   &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.1/plexus-utils-1.5.1.jar (211 kB at 4.3 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.9/maven-repository-metadata-2.0.9.jar&#xA;Progress (3): 89 kB | 21 kB | 4.1/87 kB&#xD;Progress (3): 89 kB | 21 kB | 7.7/87 kB&#xD;Progress (3): 89 kB | 21 kB | 12/87 kB &#xD;Progress (3): 89 kB | 21 kB | 15/87 kB&#xD;Progress (3): 89 kB | 21 kB | 20/87 kB&#xD;Progress (3): 89 kB | 21 kB | 24/87 kB&#xD;Progress (3): 89 kB | 21 kB | 28/87 kB&#xD;Progress (3): 89 kB | 21 kB | 32/87 kB&#xD;Progress (3): 89 kB | 21 kB | 36/87 kB&#xD;                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.9/maven-plugin-parameter-documenter-2.0.9.jar (21 kB at 394 kB/s)&#xA;Progress (2): 89 kB | 40/87 kB&#xD;                              &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.9/maven-error-diagnostics-2.0.9.jar&#xA;Progress (2): 89 kB | 44/87 kB&#xD;Progress (2): 89 kB | 48/87 kB&#xD;Progress (2): 89 kB | 52/87 kB&#xD;Progress (2): 89 kB | 56/87 kB&#xD;Progress (2): 89 kB | 61/87 kB&#xD;Progress (2): 89 kB | 65/87 kB&#xD;Progress (3): 89 kB | 65/87 kB | 4.1/35 kB&#xD;Progress (3): 89 kB | 65/87 kB | 7.7/35 kB&#xD;Progress (3): 89 kB | 65/87 kB | 12/35 kB &#xD;Progress (3): 89 kB | 65/87 kB | 15/35 kB&#xD;Progress (3): 89 kB | 65/87 kB | 20/35 kB&#xD;Progress (3): 89 kB | 65/87 kB | 24/35 kB&#xD;Progress (3): 89 kB | 69/87 kB | 24/35 kB&#xD;Progress (3): 89 kB | 69/87 kB | 28/35 kB&#xD;Progress (3): 89 kB | 73/87 kB | 28/35 kB&#xD;Progress (3): 89 kB | 73/87 kB | 32/35 kB&#xD;Progress (3): 89 kB | 77/87 kB | 32/35 kB&#xD;Progress (3): 89 kB | 81/87 kB | 32/35 kB&#xD;Progress (3): 89 kB | 81/87 kB | 35 kB   &#xD;Progress (3): 89 kB | 85/87 kB | 35 kB&#xD;Progress (3): 89 kB | 87 kB | 35 kB   &#xD;                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.9/maven-artifact-2.0.9.jar (89 kB at 1.6 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.9/maven-project-2.0.9.jar&#xA;Progress (3): 87 kB | 35 kB | 4.1/25 kB&#xD;Progress (3): 87 kB | 35 kB | 7.7/25 kB&#xD;Progress (3): 87 kB | 35 kB | 12/25 kB &#xD;Progress (3): 87 kB | 35 kB | 15/25 kB&#xD;Progress (3): 87 kB | 35 kB | 20/25 kB&#xD;Progress (3): 87 kB | 35 kB | 24/25 kB&#xD;Progress (3): 87 kB | 35 kB | 25 kB   &#xD;Progress (4): 87 kB | 35 kB | 25 kB | 4.1/14 kB&#xD;Progress (4): 87 kB | 35 kB | 25 kB | 7.3/14 kB&#xD;Progress (4): 87 kB | 35 kB | 25 kB | 11/14 kB &#xD;Progress (4): 87 kB | 35 kB | 25 kB | 14 kB   &#xD;                                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.9/maven-profile-2.0.9.jar (35 kB at 512 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.9/maven-plugin-registry-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.9/maven-model-2.0.9.jar (87 kB at 1.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.9/maven-plugin-descriptor-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.9/maven-repository-metadata-2.0.9.jar (25 kB at 311 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.9/maven-artifact-manager-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.9/maven-error-diagnostics-2.0.9.jar (14 kB at 175 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.9/maven-monitor-2.0.9.jar&#xA;Progress (1): 3.2/29 kB&#xD;Progress (1): 7.3/29 kB&#xD;Progress (1): 11/29 kB &#xD;Progress (1): 15/29 kB&#xD;Progress (1): 20/29 kB&#xD;Progress (1): 24/29 kB&#xD;Progress (1): 28/29 kB&#xD;Progress (1): 29 kB   &#xD;Progress (2): 29 kB | 4.1/122 kB&#xD;Progress (2): 29 kB | 7.7/122 kB&#xD;Progress (2): 29 kB | 11/122 kB &#xD;Progress (2): 29 kB | 15/122 kB&#xD;Progress (2): 29 kB | 20/122 kB&#xD;Progress (2): 29 kB | 24/122 kB&#xD;Progress (2): 29 kB | 28/122 kB&#xD;Progress (2): 29 kB | 32/122 kB&#xD;Progress (2): 29 kB | 36/122 kB&#xD;Progress (2): 29 kB | 40/122 kB&#xD;Progress (2): 29 kB | 44/122 kB&#xD;Progress (2): 29 kB | 48/122 kB&#xD;Progress (2): 29 kB | 52/122 kB&#xD;Progress (2): 29 kB | 56/122 kB&#xD;Progress (2): 29 kB | 61/122 kB&#xD;Progress (2): 29 kB | 65/122 kB&#xD;Progress (2): 29 kB | 69/122 kB&#xD;Progress (2): 29 kB | 73/122 kB&#xD;Progress (2): 29 kB | 77/122 kB&#xD;Progress (2): 29 kB | 81/122 kB&#xD;Progress (2): 29 kB | 85/122 kB&#xD;Progress (2): 29 kB | 89/122 kB&#xD;Progress (2): 29 kB | 93/122 kB&#xD;Progress (2): 29 kB | 97/122 kB&#xD;Progress (2): 29 kB | 102/122 kB&#xD;Progress (2): 29 kB | 106/122 kB&#xD;Progress (2): 29 kB | 110/122 kB&#xD;Progress (2): 29 kB | 114/122 kB&#xD;Progress (2): 29 kB | 118/122 kB&#xD;Progress (2): 29 kB | 122 kB    &#xD;Progress (3): 29 kB | 122 kB | 4.1/58 kB&#xD;Progress (3): 29 kB | 122 kB | 7.7/58 kB&#xD;Progress (3): 29 kB | 122 kB | 12/58 kB &#xD;Progress (3): 29 kB | 122 kB | 16/58 kB&#xD;Progress (3): 29 kB | 122 kB | 20/58 kB&#xD;Progress (3): 29 kB | 122 kB | 24/58 kB&#xD;Progress (3): 29 kB | 122 kB | 28/58 kB&#xD;Progress (3): 29 kB | 122 kB | 32/58 kB&#xD;Progress (3): 29 kB | 122 kB | 36/58 kB&#xD;Progress (3): 29 kB | 122 kB | 40/58 kB&#xD;Progress (3): 29 kB | 122 kB | 45/58 kB&#xD;Progress (3): 29 kB | 122 kB | 49/58 kB&#xD;Progress (3): 29 kB | 122 kB | 53/58 kB&#xD;Progress (3): 29 kB | 122 kB | 57/58 kB&#xD;Progress (3): 29 kB | 122 kB | 58 kB   &#xD;Progress (4): 29 kB | 122 kB | 58 kB | 4.1/10 kB&#xD;Progress (4): 29 kB | 122 kB | 58 kB | 7.7/10 kB&#xD;Progress (4): 29 kB | 122 kB | 58 kB | 10 kB    &#xD;Progress (5): 29 kB | 122 kB | 58 kB | 10 kB | 4.1/37 kB&#xD;Progress (5): 29 kB | 122 kB | 58 kB | 10 kB | 7.7/37 kB&#xD;Progress (5): 29 kB | 122 kB | 58 kB | 10 kB | 12/37 kB &#xD;Progress (5): 29 kB | 122 kB | 58 kB | 10 kB | 16/37 kB&#xD;Progress (5): 29 kB | 122 kB | 58 kB | 10 kB | 20/37 kB&#xD;Progress (5): 29 kB | 122 kB | 58 kB | 10 kB | 24/37 kB&#xD;Progress (5): 29 kB | 122 kB | 58 kB | 10 kB | 28/37 kB&#xD;Progress (5): 29 kB | 122 kB | 58 kB | 10 kB | 32/37 kB&#xD;Progress (5): 29 kB | 122 kB | 58 kB | 10 kB | 36/37 kB&#xD;Progress (5): 29 kB | 122 kB | 58 kB | 10 kB | 37 kB   &#xD;                                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.9/maven-artifact-manager-2.0.9.jar (58 kB at 551 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/1.0/maven-toolchain-1.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.9/maven-plugin-registry-2.0.9.jar (29 kB at 274 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/0.1/maven-shared-utils-0.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.9/maven-monitor-2.0.9.jar (10 kB at 96 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/2.0.1/jsr305-2.0.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.9/maven-project-2.0.9.jar (122 kB at 1.1 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-incremental/1.1/maven-shared-incremental-1.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.9/maven-plugin-descriptor-2.0.9.jar (37 kB at 325 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/1.5.5/plexus-component-annotations-1.5.5.jar&#xA;Progress (1): 4.1/155 kB&#xD;Progress (1): 7.7/155 kB&#xD;Progress (1): 12/155 kB &#xD;Progress (1): 16/155 kB&#xD;Progress (1): 20/155 kB&#xD;Progress (1): 24/155 kB&#xD;Progress (1): 28/155 kB&#xD;Progress (1): 32/155 kB&#xD;Progress (1): 36/155 kB&#xD;Progress (1): 40/155 kB&#xD;Progress (1): 45/155 kB&#xD;Progress (1): 49/155 kB&#xD;Progress (1): 53/155 kB&#xD;Progress (1): 57/155 kB&#xD;Progress (1): 61/155 kB&#xD;Progress (1): 65/155 kB&#xD;Progress (1): 69/155 kB&#xD;Progress (1): 73/155 kB&#xD;Progress (1): 77/155 kB&#xD;Progress (2): 77/155 kB | 4.1/32 kB&#xD;Progress (2): 77/155 kB | 7.7/32 kB&#xD;Progress (2): 77/155 kB | 12/32 kB &#xD;Progress (2): 77/155 kB | 16/32 kB&#xD;Progress (2): 77/155 kB | 20/32 kB&#xD;Progress (2): 77/155 kB | 24/32 kB&#xD;Progress (2): 77/155 kB | 28/32 kB&#xD;Progress (2): 77/155 kB | 32 kB   &#xD;Progress (2): 81/155 kB | 32 kB&#xD;Progress (2): 86/155 kB | 32 kB&#xD;Progress (2): 90/155 kB | 32 kB&#xD;Progress (2): 94/155 kB | 32 kB&#xD;Progress (2): 98/155 kB | 32 kB&#xD;Progress (2): 102/155 kB | 32 kB&#xD;Progress (2): 106/155 kB | 32 kB&#xD;Progress (2): 110/155 kB | 32 kB&#xD;Progress (2): 114/155 kB | 32 kB&#xD;Progress (2): 118/155 kB | 32 kB&#xD;Progress (2): 122/155 kB | 32 kB&#xD;Progress (2): 126/155 kB | 32 kB&#xD;Progress (2): 131/155 kB | 32 kB&#xD;Progress (2): 135/155 kB | 32 kB&#xD;Progress (2): 139/155 kB | 32 kB&#xD;Progress (2): 143/155 kB | 32 kB&#xD;Progress (2): 147/155 kB | 32 kB&#xD;Progress (2): 151/155 kB | 32 kB&#xD;Progress (2): 155 kB | 32 kB    &#xD;Progress (3): 155 kB | 32 kB | 4.1/33 kB&#xD;Progress (3): 155 kB | 32 kB | 7.7/33 kB&#xD;Progress (3): 155 kB | 32 kB | 12/33 kB &#xD;Progress (3): 155 kB | 32 kB | 16/33 kB&#xD;Progress (3): 155 kB | 32 kB | 20/33 kB&#xD;Progress (3): 155 kB | 32 kB | 24/33 kB&#xD;Progress (3): 155 kB | 32 kB | 28/33 kB&#xD;Progress (3): 155 kB | 32 kB | 32/33 kB&#xD;Progress (3): 155 kB | 32 kB | 33 kB   &#xD;Progress (4): 155 kB | 32 kB | 33 kB | 4.1/4.2 kB&#xD;Progress (4): 155 kB | 32 kB | 33 kB | 4.2 kB    &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/2.0.1/jsr305-2.0.1.jar (32 kB at 233 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-api/2.2/plexus-compiler-api-2.2.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/0.1/maven-shared-utils-0.1.jar (155 kB at 1.1 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-manager/2.2/plexus-compiler-manager-2.2.jar&#xA;Progress (3): 33 kB | 4.2 kB | 4.1/14 kB&#xD;Progress (3): 33 kB | 4.2 kB | 7.7/14 kB&#xD;Progress (3): 33 kB | 4.2 kB | 12/14 kB &#xD;Progress (3): 33 kB | 4.2 kB | 14 kB   &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/1.0/maven-toolchain-1.0.jar (33 kB at 237 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-javac/2.2/plexus-compiler-javac-2.2.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/1.5.5/plexus-component-annotations-1.5.5.jar (4.2 kB at 28 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.5.5/plexus-container-default-1.5.5.jar&#xA;Progress (2): 14 kB | 4.1/19 kB&#xD;Progress (2): 14 kB | 7.7/19 kB&#xD;Progress (2): 14 kB | 12/19 kB &#xD;Progress (2): 14 kB | 15/19 kB&#xD;Progress (3): 14 kB | 15/19 kB | 4.1/25 kB&#xD;Progress (3): 14 kB | 19 kB | 4.1/25 kB   &#xD;Progress (3): 14 kB | 19 kB | 7.7/25 kB&#xD;Progress (3): 14 kB | 19 kB | 12/25 kB &#xD;Progress (3): 14 kB | 19 kB | 16/25 kB&#xD;Progress (3): 14 kB | 19 kB | 20/25 kB&#xD;Progress (3): 14 kB | 19 kB | 24/25 kB&#xD;Progress (3): 14 kB | 19 kB | 25 kB   &#xD;Progress (4): 14 kB | 19 kB | 25 kB | 3.2/4.6 kB&#xD;Progress (4): 14 kB | 19 kB | 25 kB | 4.6 kB    &#xD;                                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-incremental/1.1/maven-shared-incremental-1.1.jar (14 kB at 84 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.2/plexus-classworlds-2.2.2.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-javac/2.2/plexus-compiler-javac-2.2.jar (19 kB at 116 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean-reflect/3.4/xbean-reflect-3.4.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-manager/2.2/plexus-compiler-manager-2.2.jar (4.6 kB at 27 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/log4j/log4j/1.2.12/log4j-1.2.12.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-api/2.2/plexus-compiler-api-2.2.jar (25 kB at 151 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-logging/commons-logging-api/1.1/commons-logging-api-1.1.jar&#xA;Progress (1): 4.1/217 kB&#xD;Progress (1): 7.7/217 kB&#xD;Progress (1): 12/217 kB &#xD;Progress (1): 16/217 kB&#xD;Progress (1): 20/217 kB&#xD;Progress (1): 24/217 kB&#xD;Progress (1): 28/217 kB&#xD;Progress (1): 32/217 kB&#xD;Progress (1): 36/217 kB&#xD;Progress (1): 40/217 kB&#xD;Progress (1): 44/217 kB&#xD;Progress (1): 48/217 kB&#xD;Progress (1): 52/217 kB&#xD;Progress (1): 56/217 kB&#xD;Progress (1): 61/217 kB&#xD;Progress (1): 65/217 kB&#xD;Progress (1): 69/217 kB&#xD;Progress (1): 73/217 kB&#xD;Progress (1): 77/217 kB&#xD;Progress (1): 81/217 kB&#xD;Progress (1): 85/217 kB&#xD;Progress (1): 89/217 kB&#xD;Progress (1): 93/217 kB&#xD;Progress (1): 97/217 kB&#xD;Progress (1): 101/217 kB&#xD;Progress (1): 106/217 kB&#xD;Progress (1): 110/217 kB&#xD;Progress (1): 114/217 kB&#xD;Progress (1): 118/217 kB&#xD;Progress (1): 122/217 kB&#xD;Progress (1): 126/217 kB&#xD;Progress (1): 130/217 kB&#xD;Progress (1): 134/217 kB&#xD;Progress (1): 138/217 kB&#xD;Progress (1): 142/217 kB&#xD;Progress (1): 147/217 kB&#xD;Progress (1): 151/217 kB&#xD;Progress (1): 155/217 kB&#xD;Progress (1): 159/217 kB&#xD;Progress (1): 163/217 kB&#xD;Progress (1): 167/217 kB&#xD;Progress (1): 171/217 kB&#xD;Progress (1): 175/217 kB&#xD;Progress (1): 179/217 kB&#xD;Progress (1): 183/217 kB&#xD;Progress (1): 187/217 kB&#xD;Progress (1): 192/217 kB&#xD;Progress (1): 196/217 kB&#xD;Progress (1): 200/217 kB&#xD;Progress (1): 204/217 kB&#xD;Progress (1): 208/217 kB&#xD;Progress (1): 212/217 kB&#xD;Progress (1): 216/217 kB&#xD;Progress (1): 217 kB    &#xD;Progress (2): 217 kB | 4.1/134 kB&#xD;Progress (2): 217 kB | 7.7/134 kB&#xD;Progress (2): 217 kB | 12/134 kB &#xD;Progress (2): 217 kB | 16/134 kB&#xD;Progress (2): 217 kB | 20/134 kB&#xD;Progress (2): 217 kB | 24/134 kB&#xD;Progress (2): 217 kB | 28/134 kB&#xD;Progress (2): 217 kB | 32/134 kB&#xD;Progress (2): 217 kB | 36/134 kB&#xD;Progress (2): 217 kB | 40/134 kB&#xD;Progress (2): 217 kB | 45/134 kB&#xD;Progress (2): 217 kB | 49/134 kB&#xD;Progress (2): 217 kB | 53/134 kB&#xD;Progress (2): 217 kB | 57/134 kB&#xD;Progress (2): 217 kB | 61/134 kB&#xD;Progress (2): 217 kB | 65/134 kB&#xD;Progress (2): 217 kB | 69/134 kB&#xD;Progress (2): 217 kB | 73/134 kB&#xD;Progress (2): 217 kB | 77/134 kB&#xD;Progress (2): 217 kB | 81/134 kB&#xD;Progress (2): 217 kB | 86/134 kB&#xD;Progress (2): 217 kB | 90/134 kB&#xD;Progress (2): 217 kB | 94/134 kB&#xD;Progress (2): 217 kB | 98/134 kB&#xD;Progress (2): 217 kB | 102/134 kB&#xD;Progress (2): 217 kB | 106/134 kB&#xD;Progress (2): 217 kB | 110/134 kB&#xD;Progress (2): 217 kB | 114/134 kB&#xD;Progress (2): 217 kB | 118/134 kB&#xD;Progress (2): 217 kB | 122/134 kB&#xD;Progress (2): 217 kB | 126/134 kB&#xD;Progress (2): 217 kB | 131/134 kB&#xD;Progress (2): 217 kB | 134 kB    &#xD;Progress (3): 217 kB | 134 kB | 3.2/358 kB&#xD;Progress (3): 217 kB | 134 kB | 7.3/358 kB&#xD;Progress (3): 217 kB | 134 kB | 11/358 kB &#xD;Progress (3): 217 kB | 134 kB | 15/358 kB&#xD;Progress (3): 217 kB | 134 kB | 20/358 kB&#xD;Progress (3): 217 kB | 134 kB | 24/358 kB&#xD;Progress (3): 217 kB | 134 kB | 28/358 kB&#xD;Progress (3): 217 kB | 134 kB | 32/358 kB&#xD;Progress (3): 217 kB | 134 kB | 36/358 kB&#xD;Progress (3): 217 kB | 134 kB | 40/358 kB&#xD;Progress (3): 217 kB | 134 kB | 44/358 kB&#xD;Progress (3): 217 kB | 134 kB | 48/358 kB&#xD;Progress (3): 217 kB | 134 kB | 52/358 kB&#xD;Progress (3): 217 kB | 134 kB | 56/358 kB&#xD;Progress (3): 217 kB | 134 kB | 61/358 kB&#xD;Progress (3): 217 kB | 134 kB | 65/358 kB&#xD;Progress (3): 217 kB | 134 kB | 69/358 kB&#xD;Progress (3): 217 kB | 134 kB | 73/358 kB&#xD;Progress (3): 217 kB | 134 kB | 77/358 kB&#xD;Progress (3): 217 kB | 134 kB | 81/358 kB&#xD;Progress (3): 217 kB | 134 kB | 85/358 kB&#xD;Progress (3): 217 kB | 134 kB | 89/358 kB&#xD;Progress (3): 217 kB | 134 kB | 93/358 kB&#xD;Progress (3): 217 kB | 134 kB | 97/358 kB&#xD;Progress (3): 217 kB | 134 kB | 102/358 kB&#xD;Progress (3): 217 kB | 134 kB | 106/358 kB&#xD;Progress (3): 217 kB | 134 kB | 110/358 kB&#xD;Progress (3): 217 kB | 134 kB | 114/358 kB&#xD;Progress (3): 217 kB | 134 kB | 118/358 kB&#xD;Progress (3): 217 kB | 134 kB | 122/358 kB&#xD;Progress (3): 217 kB | 134 kB | 126/358 kB&#xD;Progress (3): 217 kB | 134 kB | 130/358 kB&#xD;Progress (3): 217 kB | 134 kB | 134/358 kB&#xD;Progress (3): 217 kB | 134 kB | 138/358 kB&#xD;Progress (3): 217 kB | 134 kB | 142/358 kB&#xD;Progress (3): 217 kB | 134 kB | 147/358 kB&#xD;Progress (3): 217 kB | 134 kB | 151/358 kB&#xD;Progress (3): 217 kB | 134 kB | 155/358 kB&#xD;Progress (4): 217 kB | 134 kB | 155/358 kB | 4.1/45 kB&#xD;Progress (4): 217 kB | 134 kB | 159/358 kB | 4.1/45 kB&#xD;Progress (4): 217 kB | 134 kB | 159/358 kB | 7.7/45 kB&#xD;Progress (4): 217 kB | 134 kB | 159/358 kB | 12/45 kB &#xD;Progress (4): 217 kB | 134 kB | 159/358 kB | 15/45 kB&#xD;Progress (4): 217 kB | 134 kB | 159/358 kB | 20/45 kB&#xD;Progress (4): 217 kB | 134 kB | 159/358 kB | 24/45 kB&#xD;Progress (4): 217 kB | 134 kB | 159/358 kB | 28/45 kB&#xD;Progress (4): 217 kB | 134 kB | 159/358 kB | 32/45 kB&#xD;Progress (4): 217 kB | 134 kB | 159/358 kB | 36/45 kB&#xD;Progress (4): 217 kB | 134 kB | 159/358 kB | 40/45 kB&#xD;Progress (4): 217 kB | 134 kB | 159/358 kB | 44/45 kB&#xD;Progress (4): 217 kB | 134 kB | 159/358 kB | 45 kB   &#xD;Progress (4): 217 kB | 134 kB | 163/358 kB | 45 kB&#xD;Progress (4): 217 kB | 134 kB | 167/358 kB | 45 kB&#xD;Progress (4): 217 kB | 134 kB | 171/358 kB | 45 kB&#xD;Progress (4): 217 kB | 134 kB | 175/358 kB | 45 kB&#xD;Progress (4): 217 kB | 134 kB | 179/358 kB | 45 kB&#xD;Progress (5): 217 kB | 134 kB | 179/358 kB | 45 kB | 4.1/46 kB&#xD;Progress (5): 217 kB | 134 kB | 183/358 kB | 45 kB | 4.1/46 kB&#xD;Progress (5): 217 kB | 134 kB | 183/358 kB | 45 kB | 7.7/46 kB&#xD;Progress (5): 217 kB | 134 kB | 187/358 kB | 45 kB | 7.7/46 kB&#xD;Progress (5): 217 kB | 134 kB | 187/358 kB | 45 kB | 12/46 kB &#xD;Progress (5): 217 kB | 134 kB | 191/358 kB | 45 kB | 12/46 kB&#xD;Progress (5): 217 kB | 134 kB | 191/358 kB | 45 kB | 15/46 kB&#xD;Progress (5): 217 kB | 134 kB | 195/358 kB | 45 kB | 15/46 kB&#xD;Progress (5): 217 kB | 134 kB | 195/358 kB | 45 kB | 20/46 kB&#xD;Progress (5): 217 kB | 134 kB | 195/358 kB | 45 kB | 24/46 kB&#xD;Progress (5): 217 kB | 134 kB | 195/358 kB | 45 kB | 28/46 kB&#xD;Progress (5): 217 kB | 134 kB | 195/358 kB | 45 kB | 32/46 kB&#xD;Progress (5): 217 kB | 134 kB | 195/358 kB | 45 kB | 36/46 kB&#xD;Progress (5): 217 kB | 134 kB | 195/358 kB | 45 kB | 40/46 kB&#xD;Progress (5): 217 kB | 134 kB | 195/358 kB | 45 kB | 44/46 kB&#xD;Progress (5): 217 kB | 134 kB | 195/358 kB | 45 kB | 46 kB   &#xD;Progress (5): 217 kB | 134 kB | 199/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 204/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 208/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 212/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 216/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 220/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 224/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 228/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 232/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 236/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 240/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 245/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 249/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 253/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 257/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 261/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 265/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 269/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 273/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 277/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 281/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 286/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 290/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 294/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 298/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 302/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 306/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 310/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 314/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 318/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 322/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 326/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 331/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 335/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 339/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 343/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 347/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 351/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 355/358 kB | 45 kB | 46 kB&#xD;Progress (5): 217 kB | 134 kB | 358 kB | 45 kB | 46 kB    &#xD;                                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean-reflect/3.4/xbean-reflect-3.4.jar (134 kB at 697 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/collections/google-collections/1.0/google-collections-1.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.5.5/plexus-container-default-1.5.5.jar (217 kB at 1.1 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.2/junit-3.8.2.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/commons-logging/commons-logging-api/1.1/commons-logging-api-1.1.jar (45 kB at 224 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/log4j/log4j/1.2.12/log4j-1.2.12.jar (358 kB at 1.8 MB/s)&#xA;Progress (2): 46 kB | 4.1/640 kB&#xD;Progress (2): 46 kB | 7.7/640 kB&#xD;Progress (2): 46 kB | 12/640 kB &#xD;Progress (2): 46 kB | 16/640 kB&#xD;Progress (2): 46 kB | 20/640 kB&#xD;Progress (2): 46 kB | 24/640 kB&#xD;Progress (2): 46 kB | 28/640 kB&#xD;Progress (2): 46 kB | 32/640 kB&#xD;Progress (2): 46 kB | 36/640 kB&#xD;Progress (2): 46 kB | 40/640 kB&#xD;Progress (2): 46 kB | 45/640 kB&#xD;Progress (2): 46 kB | 49/640 kB&#xD;Progress (2): 46 kB | 53/640 kB&#xD;Progress (2): 46 kB | 57/640 kB&#xD;Progress (2): 46 kB | 61/640 kB&#xD;Progress (2): 46 kB | 65/640 kB&#xD;Progress (2): 46 kB | 69/640 kB&#xD;Progress (2): 46 kB | 73/640 kB&#xD;Progress (2): 46 kB | 77/640 kB&#xD;Progress (2): 46 kB | 81/640 kB&#xD;Progress (2): 46 kB | 86/640 kB&#xD;Progress (2): 46 kB | 90/640 kB&#xD;Progress (2): 46 kB | 94/640 kB&#xD;Progress (2): 46 kB | 98/640 kB&#xD;Progress (2): 46 kB | 102/640 kB&#xD;Progress (2): 46 kB | 106/640 kB&#xD;Progress (2): 46 kB | 110/640 kB&#xD;Progress (2): 46 kB | 114/640 kB&#xD;Progress (2): 46 kB | 118/640 kB&#xD;Progress (2): 46 kB | 122/640 kB&#xD;Progress (2): 46 kB | 126/640 kB&#xD;Progress (2): 46 kB | 131/640 kB&#xD;Progress (2): 46 kB | 135/640 kB&#xD;Progress (2): 46 kB | 139/640 kB&#xD;Progress (2): 46 kB | 143/640 kB&#xD;Progress (2): 46 kB | 147/640 kB&#xD;Progress (2): 46 kB | 151/640 kB&#xD;Progress (2): 46 kB | 155/640 kB&#xD;Progress (2): 46 kB | 159/640 kB&#xD;Progress (2): 46 kB | 163/640 kB&#xD;Progress (2): 46 kB | 167/640 kB&#xD;Progress (2): 46 kB | 172/640 kB&#xD;Progress (2): 46 kB | 176/640 kB&#xD;Progress (2): 46 kB | 180/640 kB&#xD;Progress (2): 46 kB | 184/640 kB&#xD;Progress (2): 46 kB | 188/640 kB&#xD;Progress (2): 46 kB | 192/640 kB&#xD;Progress (2): 46 kB | 196/640 kB&#xD;Progress (2): 46 kB | 200/640 kB&#xD;Progress (2): 46 kB | 204/640 kB&#xD;Progress (2): 46 kB | 208/640 kB&#xD;Progress (2): 46 kB | 213/640 kB&#xD;Progress (2): 46 kB | 217/640 kB&#xD;Progress (2): 46 kB | 221/640 kB&#xD;Progress (2): 46 kB | 225/640 kB&#xD;Progress (2): 46 kB | 229/640 kB&#xD;Progress (2): 46 kB | 233/640 kB&#xD;Progress (2): 46 kB | 237/640 kB&#xD;Progress (2): 46 kB | 241/640 kB&#xD;Progress (2): 46 kB | 245/640 kB&#xD;Progress (2): 46 kB | 249/640 kB&#xD;Progress (2): 46 kB | 253/640 kB&#xD;Progress (2): 46 kB | 258/640 kB&#xD;Progress (2): 46 kB | 262/640 kB&#xD;Progress (2): 46 kB | 266/640 kB&#xD;Progress (2): 46 kB | 270/640 kB&#xD;Progress (2): 46 kB | 274/640 kB&#xD;Progress (2): 46 kB | 278/640 kB&#xD;                                &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.2/plexus-classworlds-2.2.2.jar (46 kB at 218 kB/s)&#xA;Progress (1): 282/640 kB&#xD;Progress (1): 286/640 kB&#xD;Progress (1): 290/640 kB&#xD;Progress (1): 294/640 kB&#xD;Progress (1): 299/640 kB&#xD;Progress (1): 303/640 kB&#xD;Progress (1): 307/640 kB&#xD;Progress (1): 311/640 kB&#xD;Progress (1): 315/640 kB&#xD;Progress (1): 319/640 kB&#xD;Progress (1): 323/640 kB&#xD;Progress (1): 327/640 kB&#xD;Progress (1): 331/640 kB&#xD;Progress (1): 335/640 kB&#xD;Progress (1): 339/640 kB&#xD;Progress (1): 344/640 kB&#xD;Progress (1): 348/640 kB&#xD;Progress (1): 352/640 kB&#xD;Progress (1): 356/640 kB&#xD;Progress (1): 360/640 kB&#xD;Progress (1): 364/640 kB&#xD;Progress (1): 368/640 kB&#xD;Progress (1): 372/640 kB&#xD;Progress (1): 376/640 kB&#xD;Progress (1): 380/640 kB&#xD;Progress (1): 385/640 kB&#xD;Progress (1): 389/640 kB&#xD;Progress (1): 393/640 kB&#xD;Progress (1): 397/640 kB&#xD;Progress (1): 401/640 kB&#xD;Progress (1): 405/640 kB&#xD;Progress (1): 409/640 kB&#xD;Progress (1): 413/640 kB&#xD;Progress (1): 417/640 kB&#xD;Progress (1): 421/640 kB&#xD;Progress (1): 426/640 kB&#xD;Progress (1): 430/640 kB&#xD;Progress (1): 434/640 kB&#xD;Progress (1): 438/640 kB&#xD;Progress (1): 442/640 kB&#xD;Progress (1): 446/640 kB&#xD;Progress (1): 450/640 kB&#xD;Progress (1): 454/640 kB&#xD;Progress (1): 458/640 kB&#xD;Progress (1): 462/640 kB&#xD;Progress (1): 466/640 kB&#xD;Progress (1): 471/640 kB&#xD;Progress (1): 475/640 kB&#xD;Progress (1): 479/640 kB&#xD;Progress (1): 483/640 kB&#xD;Progress (1): 487/640 kB&#xD;Progress (1): 491/640 kB&#xD;Progress (1): 495/640 kB&#xD;Progress (1): 499/640 kB&#xD;Progress (1): 503/640 kB&#xD;Progress (1): 507/640 kB&#xD;Progress (1): 512/640 kB&#xD;Progress (1): 516/640 kB&#xD;Progress (1): 520/640 kB&#xD;Progress (1): 524/640 kB&#xD;Progress (1): 528/640 kB&#xD;Progress (1): 532/640 kB&#xD;Progress (1): 536/640 kB&#xD;Progress (1): 540/640 kB&#xD;Progress (1): 544/640 kB&#xD;Progress (1): 548/640 kB&#xD;Progress (1): 552/640 kB&#xD;Progress (1): 557/640 kB&#xD;Progress (1): 561/640 kB&#xD;Progress (1): 565/640 kB&#xD;Progress (1): 569/640 kB&#xD;Progress (1): 573/640 kB&#xD;Progress (1): 577/640 kB&#xD;Progress (1): 581/640 kB&#xD;Progress (1): 585/640 kB&#xD;Progress (1): 589/640 kB&#xD;Progress (1): 593/640 kB&#xD;Progress (1): 598/640 kB&#xD;Progress (1): 602/640 kB&#xD;Progress (1): 606/640 kB&#xD;Progress (2): 606/640 kB | 4.1/121 kB&#xD;Progress (2): 606/640 kB | 7.7/121 kB&#xD;Progress (2): 610/640 kB | 7.7/121 kB&#xD;Progress (2): 610/640 kB | 12/121 kB &#xD;Progress (2): 614/640 kB | 12/121 kB&#xD;Progress (2): 614/640 kB | 15/121 kB&#xD;Progress (2): 618/640 kB | 15/121 kB&#xD;Progress (2): 622/640 kB | 15/121 kB&#xD;Progress (2): 622/640 kB | 20/121 kB&#xD;Progress (2): 626/640 kB | 20/121 kB&#xD;Progress (2): 626/640 kB | 24/121 kB&#xD;Progress (2): 630/640 kB | 24/121 kB&#xD;Progress (2): 630/640 kB | 28/121 kB&#xD;Progress (2): 634/640 kB | 28/121 kB&#xD;Progress (2): 634/640 kB | 32/121 kB&#xD;Progress (2): 638/640 kB | 32/121 kB&#xD;Progress (2): 640 kB | 32/121 kB    &#xD;Progress (2): 640 kB | 36/121 kB&#xD;Progress (2): 640 kB | 40/121 kB&#xD;Progress (2): 640 kB | 44/121 kB&#xD;Progress (2): 640 kB | 48/121 kB&#xD;Progress (2): 640 kB | 52/121 kB&#xD;Progress (2): 640 kB | 56/121 kB&#xD;Progress (2): 640 kB | 61/121 kB&#xD;Progress (2): 640 kB | 65/121 kB&#xD;Progress (2): 640 kB | 69/121 kB&#xD;Progress (2): 640 kB | 73/121 kB&#xD;Progress (2): 640 kB | 77/121 kB&#xD;Progress (2): 640 kB | 81/121 kB&#xD;Progress (2): 640 kB | 85/121 kB&#xD;Progress (2): 640 kB | 89/121 kB&#xD;Progress (2): 640 kB | 93/121 kB&#xD;Progress (2): 640 kB | 97/121 kB&#xD;Progress (2): 640 kB | 102/121 kB&#xD;Progress (2): 640 kB | 106/121 kB&#xD;Progress (2): 640 kB | 110/121 kB&#xD;Progress (2): 640 kB | 114/121 kB&#xD;Progress (2): 640 kB | 118/121 kB&#xD;Progress (2): 640 kB | 121 kB    &#xD;                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/collections/google-collections/1.0/google-collections-1.0.jar (640 kB at 2.8 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.2/junit-3.8.2.jar (121 kB at 511 kB/s)&#xA;[INFO] Changes detected - recompiling the module!&#xA;[WARNING] File encoding has not been set, using platform encoding UTF-8, i.e. build is platform dependent!&#xA;[INFO] Compiling 1 source file to /work/target/classes&#xA;[INFO] &#xA;[INFO] --- maven-resources-plugin:2.6:testResources (default-testResources) @ simple-java-project ---&#xA;[WARNING] Using platform encoding (UTF-8 actually) to copy filtered resources, i.e. build is platform dependent!&#xA;[INFO] skip non existing resourceDirectory /work/src/test/resources&#xA;[INFO] &#xA;[INFO] --- maven-compiler-plugin:3.1:testCompile (default-testCompile) @ simple-java-project ---&#xA;[INFO] No sources to compile&#xA;[INFO] &#xA;[INFO] --- maven-surefire-plugin:2.12.4:test (default-test) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-booter/2.12.4/surefire-booter-2.12.4.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-booter/2.12.4/surefire-booter-2.12.4.pom (3.0 kB at 72 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-api/2.12.4/surefire-api-2.12.4.pom&#xA;Progress (1): 2.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-api/2.12.4/surefire-api-2.12.4.pom (2.5 kB at 62 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/maven-surefire-common/2.12.4/maven-surefire-common-2.12.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/maven-surefire-common/2.12.4/maven-surefire-common-2.12.4.pom (5.5 kB at 142 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-annotations/3.1/maven-plugin-annotations-3.1.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-annotations/3.1/maven-plugin-annotations-3.1.pom (1.6 kB at 35 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-tools/3.1/maven-plugin-tools-3.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-tools/3.1/maven-plugin-tools-3.1.pom (16 kB at 395 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.9/maven-reporting-api-2.0.9.pom&#xA;Progress (1): 1.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.9/maven-reporting-api-2.0.9.pom (1.8 kB at 43 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting/2.0.9/maven-reporting-2.0.9.pom&#xA;Progress (1): 1.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting/2.0.9/maven-reporting-2.0.9.pom (1.5 kB at 31 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/2.0.9/maven-toolchain-2.0.9.pom&#xA;Progress (1): 3.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/2.0.9/maven-toolchain-2.0.9.pom (3.5 kB at 87 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.1/commons-lang3-3.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 17 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.1/commons-lang3-3.1.pom (17 kB at 440 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/22/commons-parent-22.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 42 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/22/commons-parent-22.pom (42 kB at 953 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/9/apache-9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/9/apache-9.pom (15 kB at 379 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/1.3/maven-common-artifact-filters-1.3.pom&#xA;Progress (1): 3.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/1.3/maven-common-artifact-filters-1.3.pom (3.7 kB at 74 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/12/maven-shared-components-12.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/12/maven-shared-components-12.pom (9.3 kB at 233 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/13/maven-parent-13.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 23 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/13/maven-parent-13.pom (23 kB at 539 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/6/apache-6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 13 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/6/apache-6.pom (13 kB at 291 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9/plexus-container-default-1.0-alpha-9.pom&#xA;Progress (1): 1.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9/plexus-container-default-1.0-alpha-9.pom (1.2 kB at 29 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-booter/2.12.4/surefire-booter-2.12.4.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-api/2.12.4/surefire-api-2.12.4.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/maven-surefire-common/2.12.4/maven-surefire-common-2.12.4.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.1/commons-lang3-3.1.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/1.3/maven-common-artifact-filters-1.3.jar&#xA;Progress (1): 4.1/118 kB&#xD;Progress (2): 4.1/118 kB | 4.1/31 kB&#xD;Progress (2): 7.7/118 kB | 4.1/31 kB&#xD;Progress (2): 7.7/118 kB | 7.7/31 kB&#xD;Progress (2): 12/118 kB | 7.7/31 kB &#xD;Progress (2): 12/118 kB | 12/31 kB &#xD;Progress (2): 16/118 kB | 12/31 kB&#xD;Progress (2): 16/118 kB | 16/31 kB&#xD;Progress (2): 16/118 kB | 20/31 kB&#xD;Progress (2): 20/118 kB | 20/31 kB&#xD;Progress (2): 20/118 kB | 24/31 kB&#xD;Progress (2): 24/118 kB | 24/31 kB&#xD;Progress (2): 24/118 kB | 28/31 kB&#xD;Progress (2): 28/118 kB | 28/31 kB&#xD;Progress (2): 28/118 kB | 31 kB   &#xD;Progress (2): 32/118 kB | 31 kB&#xD;Progress (2): 36/118 kB | 31 kB&#xD;Progress (2): 40/118 kB | 31 kB&#xD;Progress (2): 45/118 kB | 31 kB&#xD;Progress (2): 49/118 kB | 31 kB&#xD;Progress (2): 53/118 kB | 31 kB&#xD;Progress (2): 57/118 kB | 31 kB&#xD;Progress (2): 61/118 kB | 31 kB&#xD;Progress (2): 65/118 kB | 31 kB&#xD;Progress (2): 69/118 kB | 31 kB&#xD;Progress (2): 73/118 kB | 31 kB&#xD;Progress (2): 77/118 kB | 31 kB&#xD;Progress (2): 81/118 kB | 31 kB&#xD;Progress (2): 86/118 kB | 31 kB&#xD;Progress (2): 90/118 kB | 31 kB&#xD;Progress (2): 94/118 kB | 31 kB&#xD;Progress (2): 98/118 kB | 31 kB&#xD;Progress (2): 102/118 kB | 31 kB&#xD;Progress (2): 106/118 kB | 31 kB&#xD;Progress (2): 110/118 kB | 31 kB&#xD;Progress (2): 114/118 kB | 31 kB&#xD;Progress (2): 118 kB | 31 kB    &#xD;Progress (3): 118 kB | 31 kB | 4.1/316 kB&#xD;Progress (3): 118 kB | 31 kB | 7.7/316 kB&#xD;Progress (3): 118 kB | 31 kB | 12/316 kB &#xD;Progress (3): 118 kB | 31 kB | 15/316 kB&#xD;Progress (3): 118 kB | 31 kB | 20/316 kB&#xD;Progress (3): 118 kB | 31 kB | 24/316 kB&#xD;Progress (3): 118 kB | 31 kB | 28/316 kB&#xD;Progress (3): 118 kB | 31 kB | 32/316 kB&#xD;Progress (3): 118 kB | 31 kB | 36/316 kB&#xD;Progress (3): 118 kB | 31 kB | 40/316 kB&#xD;Progress (3): 118 kB | 31 kB | 44/316 kB&#xD;Progress (3): 118 kB | 31 kB | 48/316 kB&#xD;Progress (3): 118 kB | 31 kB | 52/316 kB&#xD;Progress (3): 118 kB | 31 kB | 56/316 kB&#xD;Progress (3): 118 kB | 31 kB | 61/316 kB&#xD;Progress (3): 118 kB | 31 kB | 65/316 kB&#xD;Progress (3): 118 kB | 31 kB | 69/316 kB&#xD;Progress (3): 118 kB | 31 kB | 73/316 kB&#xD;Progress (3): 118 kB | 31 kB | 77/316 kB&#xD;Progress (3): 118 kB | 31 kB | 81/316 kB&#xD;Progress (3): 118 kB | 31 kB | 85/316 kB&#xD;Progress (3): 118 kB | 31 kB | 89/316 kB&#xD;Progress (3): 118 kB | 31 kB | 93/316 kB&#xD;Progress (3): 118 kB | 31 kB | 97/316 kB&#xD;Progress (3): 118 kB | 31 kB | 102/316 kB&#xD;Progress (3): 118 kB | 31 kB | 106/316 kB&#xD;Progress (3): 118 kB | 31 kB | 110/316 kB&#xD;Progress (3): 118 kB | 31 kB | 114/316 kB&#xD;Progress (3): 118 kB | 31 kB | 118/316 kB&#xD;Progress (3): 118 kB | 31 kB | 122/316 kB&#xD;Progress (3): 118 kB | 31 kB | 126/316 kB&#xD;Progress (3): 118 kB | 31 kB | 130/316 kB&#xD;Progress (3): 118 kB | 31 kB | 134/316 kB&#xD;Progress (4): 118 kB | 31 kB | 134/316 kB | 4.1/35 kB&#xD;Progress (4): 118 kB | 31 kB | 138/316 kB | 4.1/35 kB&#xD;Progress (4): 118 kB | 31 kB | 138/316 kB | 7.7/35 kB&#xD;Progress (4): 118 kB | 31 kB | 142/316 kB | 7.7/35 kB&#xD;Progress (4): 118 kB | 31 kB | 142/316 kB | 12/35 kB &#xD;Progress (4): 118 kB | 31 kB | 147/316 kB | 12/35 kB&#xD;Progress (4): 118 kB | 31 kB | 147/316 kB | 16/35 kB&#xD;Progress (4): 118 kB | 31 kB | 151/316 kB | 16/35 kB&#xD;Progress (4): 118 kB | 31 kB | 155/316 kB | 16/35 kB&#xD;Progress (4): 118 kB | 31 kB | 155/316 kB | 20/35 kB&#xD;Progress (4): 118 kB | 31 kB | 159/316 kB | 20/35 kB&#xD;Progress (4): 118 kB | 31 kB | 159/316 kB | 24/35 kB&#xD;Progress (4): 118 kB | 31 kB | 163/316 kB | 24/35 kB&#xD;Progress (4): 118 kB | 31 kB | 163/316 kB | 28/35 kB&#xD;Progress (4): 118 kB | 31 kB | 163/316 kB | 32/35 kB&#xD;Progress (4): 118 kB | 31 kB | 167/316 kB | 32/35 kB&#xD;Progress (4): 118 kB | 31 kB | 167/316 kB | 35 kB   &#xD;Progress (4): 118 kB | 31 kB | 171/316 kB | 35 kB&#xD;Progress (4): 118 kB | 31 kB | 175/316 kB | 35 kB&#xD;Progress (4): 118 kB | 31 kB | 179/316 kB | 35 kB&#xD;Progress (4): 118 kB | 31 kB | 183/316 kB | 35 kB&#xD;Progress (4): 118 kB | 31 kB | 188/316 kB | 35 kB&#xD;Progress (4): 118 kB | 31 kB | 192/316 kB | 35 kB&#xD;Progress (4): 118 kB | 31 kB | 196/316 kB | 35 kB&#xD;Progress (5): 118 kB | 31 kB | 196/316 kB | 35 kB | 4.1/263 kB&#xD;Progress (5): 118 kB | 31 kB | 196/316 kB | 35 kB | 7.7/263 kB&#xD;Progress (5): 118 kB | 31 kB | 200/316 kB | 35 kB | 7.7/263 kB&#xD;Progress (5): 118 kB | 31 kB | 200/316 kB | 35 kB | 12/263 kB &#xD;Progress (5): 118 kB | 31 kB | 200/316 kB | 35 kB | 16/263 kB&#xD;Progress (5): 118 kB | 31 kB | 200/316 kB | 35 kB | 20/263 kB&#xD;Progress (5): 118 kB | 31 kB | 204/316 kB | 35 kB | 20/263 kB&#xD;Progress (5): 118 kB | 31 kB | 204/316 kB | 35 kB | 24/263 kB&#xD;Progress (5): 118 kB | 31 kB | 204/316 kB | 35 kB | 28/263 kB&#xD;Progress (5): 118 kB | 31 kB | 208/316 kB | 35 kB | 28/263 kB&#xD;Progress (5): 118 kB | 31 kB | 208/316 kB | 35 kB | 32/263 kB&#xD;Progress (5): 118 kB | 31 kB | 212/316 kB | 35 kB | 32/263 kB&#xD;Progress (5): 118 kB | 31 kB | 212/316 kB | 35 kB | 36/263 kB&#xD;Progress (5): 118 kB | 31 kB | 216/316 kB | 35 kB | 36/263 kB&#xD;Progress (5): 118 kB | 31 kB | 220/316 kB | 35 kB | 36/263 kB&#xD;Progress (5): 118 kB | 31 kB | 220/316 kB | 35 kB | 40/263 kB&#xD;Progress (5): 118 kB | 31 kB | 224/316 kB | 35 kB | 40/263 kB&#xD;Progress (5): 118 kB | 31 kB | 224/316 kB | 35 kB | 44/263 kB&#xD;Progress (5): 118 kB | 31 kB | 228/316 kB | 35 kB | 44/263 kB&#xD;Progress (5): 118 kB | 31 kB | 228/316 kB | 35 kB | 48/263 kB&#xD;Progress (5): 118 kB | 31 kB | 233/316 kB | 35 kB | 48/263 kB&#xD;Progress (5): 118 kB | 31 kB | 233/316 kB | 35 kB | 52/263 kB&#xD;Progress (5): 118 kB | 31 kB | 237/316 kB | 35 kB | 52/263 kB&#xD;Progress (5): 118 kB | 31 kB | 237/316 kB | 35 kB | 56/263 kB&#xD;Progress (5): 118 kB | 31 kB | 237/316 kB | 35 kB | 61/263 kB&#xD;Progress (5): 118 kB | 31 kB | 237/316 kB | 35 kB | 65/263 kB&#xD;Progress (5): 118 kB | 31 kB | 237/316 kB | 35 kB | 69/263 kB&#xD;Progress (5): 118 kB | 31 kB | 237/316 kB | 35 kB | 73/263 kB&#xD;Progress (5): 118 kB | 31 kB | 237/316 kB | 35 kB | 77/263 kB&#xD;Progress (5): 118 kB | 31 kB | 237/316 kB | 35 kB | 81/263 kB&#xD;Progress (5): 118 kB | 31 kB | 237/316 kB | 35 kB | 85/263 kB&#xD;Progress (5): 118 kB | 31 kB | 237/316 kB | 35 kB | 89/263 kB&#xD;Progress (5): 118 kB | 31 kB | 241/316 kB | 35 kB | 89/263 kB&#xD;Progress (5): 118 kB | 31 kB | 241/316 kB | 35 kB | 93/263 kB&#xD;Progress (5): 118 kB | 31 kB | 245/316 kB | 35 kB | 93/263 kB&#xD;Progress (5): 118 kB | 31 kB | 245/316 kB | 35 kB | 97/263 kB&#xD;Progress (5): 118 kB | 31 kB | 249/316 kB | 35 kB | 97/263 kB&#xD;Progress (5): 118 kB | 31 kB | 249/316 kB | 35 kB | 101/263 kB&#xD;Progress (5): 118 kB | 31 kB | 253/316 kB | 35 kB | 101/263 kB&#xD;Progress (5): 118 kB | 31 kB | 253/316 kB | 35 kB | 106/263 kB&#xD;Progress (5): 118 kB | 31 kB | 257/316 kB | 35 kB | 106/263 kB&#xD;Progress (5): 118 kB | 31 kB | 257/316 kB | 35 kB | 110/263 kB&#xD;Progress (5): 118 kB | 31 kB | 261/316 kB | 35 kB | 110/263 kB&#xD;Progress (5): 118 kB | 31 kB | 265/316 kB | 35 kB | 110/263 kB&#xD;Progress (5): 118 kB | 31 kB | 269/316 kB | 35 kB | 110/263 kB&#xD;Progress (5): 118 kB | 31 kB | 274/316 kB | 35 kB | 110/263 kB&#xD;Progress (5): 118 kB | 31 kB | 274/316 kB | 35 kB | 114/263 kB&#xD;Progress (5): 118 kB | 31 kB | 278/316 kB | 35 kB | 114/263 kB&#xD;                                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/1.3/maven-common-artifact-filters-1.3.jar (31 kB at 1.0 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0.8/plexus-utils-3.0.8.jar&#xA;Progress (4): 118 kB | 282/316 kB | 35 kB | 114/263 kB&#xD;                                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-api/2.12.4/surefire-api-2.12.4.jar (118 kB at 3.8 MB/s)&#xA;Progress (3): 282/316 kB | 35 kB | 118/263 kB&#xD;Progress (3): 282/316 kB | 35 kB | 122/263 kB&#xD;Progress (3): 282/316 kB | 35 kB | 126/263 kB&#xD;Progress (3): 282/316 kB | 35 kB | 130/263 kB&#xD;Progress (3): 282/316 kB | 35 kB | 134/263 kB&#xD;Progress (3): 282/316 kB | 35 kB | 138/263 kB&#xD;Progress (3): 282/316 kB | 35 kB | 142/263 kB&#xD;Progress (3): 282/316 kB | 35 kB | 147/263 kB&#xD;Progress (3): 282/316 kB | 35 kB | 151/263 kB&#xD;Progress (3): 282/316 kB | 35 kB | 155/263 kB&#xD;Progress (3): 282/316 kB | 35 kB | 159/263 kB&#xD;                                             &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.9/maven-reporting-api-2.0.9.jar&#xA;Progress (3): 286/316 kB | 35 kB | 159/263 kB&#xD;Progress (3): 290/316 kB | 35 kB | 159/263 kB&#xD;Progress (3): 294/316 kB | 35 kB | 159/263 kB&#xD;Progress (3): 298/316 kB | 35 kB | 159/263 kB&#xD;Progress (3): 302/316 kB | 35 kB | 159/263 kB&#xD;Progress (3): 306/316 kB | 35 kB | 159/263 kB&#xD;Progress (3): 310/316 kB | 35 kB | 159/263 kB&#xD;Progress (3): 314/316 kB | 35 kB | 159/263 kB&#xD;Progress (3): 316 kB | 35 kB | 159/263 kB    &#xD;Progress (3): 316 kB | 35 kB | 163/263 kB&#xD;Progress (3): 316 kB | 35 kB | 167/263 kB&#xD;Progress (3): 316 kB | 35 kB | 171/263 kB&#xD;Progress (3): 316 kB | 35 kB | 175/263 kB&#xD;Progress (3): 316 kB | 35 kB | 179/263 kB&#xD;Progress (3): 316 kB | 35 kB | 183/263 kB&#xD;Progress (3): 316 kB | 35 kB | 187/263 kB&#xD;Progress (3): 316 kB | 35 kB | 192/263 kB&#xD;Progress (3): 316 kB | 35 kB | 196/263 kB&#xD;Progress (3): 316 kB | 35 kB | 200/263 kB&#xD;Progress (3): 316 kB | 35 kB | 204/263 kB&#xD;Progress (3): 316 kB | 35 kB | 208/263 kB&#xD;Progress (3): 316 kB | 35 kB | 212/263 kB&#xD;Progress (3): 316 kB | 35 kB | 216/263 kB&#xD;Progress (3): 316 kB | 35 kB | 220/263 kB&#xD;Progress (3): 316 kB | 35 kB | 224/263 kB&#xD;Progress (3): 316 kB | 35 kB | 228/263 kB&#xD;Progress (3): 316 kB | 35 kB | 233/263 kB&#xD;Progress (3): 316 kB | 35 kB | 237/263 kB&#xD;Progress (3): 316 kB | 35 kB | 241/263 kB&#xD;Progress (3): 316 kB | 35 kB | 245/263 kB&#xD;Progress (3): 316 kB | 35 kB | 249/263 kB&#xD;Progress (3): 316 kB | 35 kB | 253/263 kB&#xD;Progress (3): 316 kB | 35 kB | 257/263 kB&#xD;Progress (3): 316 kB | 35 kB | 261/263 kB&#xD;Progress (3): 316 kB | 35 kB | 263 kB    &#xD;Progress (4): 316 kB | 35 kB | 263 kB | 4.1/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 7.7/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 12/232 kB &#xD;Progress (4): 316 kB | 35 kB | 263 kB | 16/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 20/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 24/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 28/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 32/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 36/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 40/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 45/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 49/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 53/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 57/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 61/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 65/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 69/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 73/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 77/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 81/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 86/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 90/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 94/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 98/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 102/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 106/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 110/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 114/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 118/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 122/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 126/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 131/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 135/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 139/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 143/232 kB&#xD;Progress (4): 316 kB | 35 kB | 263 kB | 147/232 kB&#xD;                                                  &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-booter/2.12.4/surefire-booter-2.12.4.jar (35 kB at 754 kB/s)&#xA;Progress (3): 316 kB | 263 kB | 151/232 kB&#xD;                                          &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/2.0.9/maven-toolchain-2.0.9.jar&#xA;Progress (3): 316 kB | 263 kB | 155/232 kB&#xD;Progress (3): 316 kB | 263 kB | 159/232 kB&#xD;Progress (3): 316 kB | 263 kB | 163/232 kB&#xD;Progress (3): 316 kB | 263 kB | 167/232 kB&#xD;Progress (3): 316 kB | 263 kB | 172/232 kB&#xD;Progress (3): 316 kB | 263 kB | 176/232 kB&#xD;Progress (3): 316 kB | 263 kB | 180/232 kB&#xD;Progress (3): 316 kB | 263 kB | 184/232 kB&#xD;Progress (3): 316 kB | 263 kB | 188/232 kB&#xD;Progress (3): 316 kB | 263 kB | 192/232 kB&#xD;Progress (3): 316 kB | 263 kB | 196/232 kB&#xD;Progress (3): 316 kB | 263 kB | 200/232 kB&#xD;Progress (3): 316 kB | 263 kB | 204/232 kB&#xD;Progress (3): 316 kB | 263 kB | 208/232 kB&#xD;Progress (3): 316 kB | 263 kB | 213/232 kB&#xD;Progress (3): 316 kB | 263 kB | 217/232 kB&#xD;Progress (3): 316 kB | 263 kB | 221/232 kB&#xD;Progress (3): 316 kB | 263 kB | 225/232 kB&#xD;Progress (3): 316 kB | 263 kB | 229/232 kB&#xD;Progress (3): 316 kB | 263 kB | 232 kB    &#xD;Progress (4): 316 kB | 263 kB | 232 kB | 4.1/10 kB&#xD;Progress (4): 316 kB | 263 kB | 232 kB | 7.3/10 kB&#xD;Progress (4): 316 kB | 263 kB | 232 kB | 10 kB    &#xD;                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.1/commons-lang3-3.1.jar (316 kB at 6.7 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-annotations/3.1/maven-plugin-annotations-3.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/maven-surefire-common/2.12.4/maven-surefire-common-2.12.4.jar (263 kB at 4.8 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0.8/plexus-utils-3.0.8.jar (232 kB at 4.0 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.9/maven-reporting-api-2.0.9.jar (10 kB at 169 kB/s)&#xA;Progress (1): 4.1/14 kB&#xD;Progress (1): 7.7/14 kB&#xD;Progress (1): 12/14 kB &#xD;Progress (1): 14 kB   &#xD;Progress (2): 14 kB | 4.1/38 kB&#xD;Progress (2): 14 kB | 7.7/38 kB&#xD;Progress (2): 14 kB | 12/38 kB &#xD;Progress (2): 14 kB | 16/38 kB&#xD;Progress (2): 14 kB | 20/38 kB&#xD;Progress (2): 14 kB | 24/38 kB&#xD;Progress (2): 14 kB | 28/38 kB&#xD;Progress (2): 14 kB | 32/38 kB&#xD;Progress (2): 14 kB | 36/38 kB&#xD;Progress (2): 14 kB | 38 kB   &#xD;                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-annotations/3.1/maven-plugin-annotations-3.1.jar (14 kB at 171 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/2.0.9/maven-toolchain-2.0.9.jar (38 kB at 417 kB/s)&#xA;[INFO] Tests are skipped.&#xA;[INFO] &#xA;[INFO] --- maven-jar-plugin:3.3.0:jar (default-jar) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/file-management/3.1.0/file-management-3.1.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/file-management/3.1.0/file-management-3.1.0.pom (4.5 kB at 90 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/36/maven-shared-components-36.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/36/maven-shared-components-36.pom (4.9 kB at 111 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/36/maven-parent-36.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 45 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/36/maven-parent-36.pom (45 kB at 968 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/26/apache-26.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 21 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/26/apache-26.pom (21 kB at 437 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.36/slf4j-api-1.7.36.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.36/slf4j-api-1.7.36.pom (2.7 kB at 64 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.7.36/slf4j-parent-1.7.36.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.7.36/slf4j-parent-1.7.36.pom (14 kB at 344 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.3.0/plexus-utils-3.3.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.3.0/plexus-utils-3.3.0.pom (5.2 kB at 130 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/5.1/plexus-5.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 23 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/5.1/plexus-5.1.pom (23 kB at 536 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.11.0/commons-io-2.11.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.11.0/commons-io-2.11.0.pom (20 kB at 459 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/52/commons-parent-52.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 49 kB&#xD;Progress (1): 53 kB&#xD;Progress (1): 57 kB&#xD;Progress (1): 61 kB&#xD;Progress (1): 66 kB&#xD;Progress (1): 70 kB&#xD;Progress (1): 74 kB&#xD;Progress (1): 78 kB&#xD;Progress (1): 79 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/52/commons-parent-52.pom (79 kB at 1.7 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/junit/junit-bom/5.7.2/junit-bom-5.7.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/junit/junit-bom/5.7.2/junit-bom-5.7.2.pom (5.1 kB at 100 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-archiver/3.6.0/maven-archiver-3.6.0.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-archiver/3.6.0/maven-archiver-3.6.0.pom (3.9 kB at 89 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-io/3.4.0/plexus-io-3.4.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-io/3.4.0/plexus-io-3.4.0.pom (6.0 kB at 109 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/10/plexus-10.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 25 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/10/plexus-10.pom (25 kB at 552 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/javax/inject/javax.inject/1/javax.inject-1.pom&#xA;Progress (1): 612 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/javax/inject/javax.inject/1/javax.inject-1.pom (612 B at 14 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-archiver/4.4.0/plexus-archiver-4.4.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-archiver/4.4.0/plexus-archiver-4.4.0.pom (6.3 kB at 136 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-compress/1.21/commons-compress-1.21.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-compress/1.21/commons-compress-1.21.pom (20 kB at 437 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/iq80/snappy/snappy/0.4/snappy-0.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/iq80/snappy/snappy/0.4/snappy-0.4.pom (15 kB at 309 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/tukaani/xz/1.9/xz-1.9.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/tukaani/xz/1.9/xz-1.9.pom (2.0 kB at 51 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.26/plexus-interpolation-1.26.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.26/plexus-interpolation-1.26.pom (2.7 kB at 68 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.4.2/plexus-utils-3.4.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.4.2/plexus-utils-3.4.2.pom (8.2 kB at 216 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/8/plexus-8.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 25 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/8/plexus-8.pom (25 kB at 578 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/file-management/3.1.0/file-management-3.1.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.36/slf4j-api-1.7.36.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.11.0/commons-io-2.11.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-archiver/3.6.0/maven-archiver-3.6.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-io/3.4.0/plexus-io-3.4.0.jar&#xA;Progress (1): 4.1/41 kB&#xD;Progress (1): 7.7/41 kB&#xD;Progress (1): 12/41 kB &#xD;Progress (1): 15/41 kB&#xD;Progress (1): 20/41 kB&#xD;Progress (1): 24/41 kB&#xD;Progress (1): 28/41 kB&#xD;Progress (1): 32/41 kB&#xD;Progress (1): 36/41 kB&#xD;Progress (1): 40/41 kB&#xD;Progress (2): 40/41 kB | 4.1/327 kB&#xD;Progress (2): 41 kB | 4.1/327 kB   &#xD;Progress (2): 41 kB | 7.7/327 kB&#xD;Progress (2): 41 kB | 11/327 kB &#xD;Progress (2): 41 kB | 15/327 kB&#xD;Progress (2): 41 kB | 20/327 kB&#xD;Progress (2): 41 kB | 24/327 kB&#xD;Progress (2): 41 kB | 28/327 kB&#xD;Progress (2): 41 kB | 32/327 kB&#xD;Progress (2): 41 kB | 36/327 kB&#xD;Progress (2): 41 kB | 40/327 kB&#xD;Progress (2): 41 kB | 44/327 kB&#xD;Progress (2): 41 kB | 48/327 kB&#xD;Progress (2): 41 kB | 52/327 kB&#xD;Progress (2): 41 kB | 56/327 kB&#xD;Progress (2): 41 kB | 61/327 kB&#xD;Progress (2): 41 kB | 65/327 kB&#xD;Progress (2): 41 kB | 69/327 kB&#xD;Progress (2): 41 kB | 73/327 kB&#xD;Progress (2): 41 kB | 77/327 kB&#xD;Progress (2): 41 kB | 81/327 kB&#xD;Progress (2): 41 kB | 85/327 kB&#xD;Progress (2): 41 kB | 89/327 kB&#xD;Progress (2): 41 kB | 93/327 kB&#xD;Progress (2): 41 kB | 97/327 kB&#xD;Progress (2): 41 kB | 102/327 kB&#xD;Progress (2): 41 kB | 106/327 kB&#xD;Progress (2): 41 kB | 110/327 kB&#xD;Progress (2): 41 kB | 114/327 kB&#xD;Progress (2): 41 kB | 118/327 kB&#xD;Progress (2): 41 kB | 122/327 kB&#xD;Progress (2): 41 kB | 126/327 kB&#xD;Progress (2): 41 kB | 130/327 kB&#xD;Progress (2): 41 kB | 134/327 kB&#xD;Progress (2): 41 kB | 138/327 kB&#xD;Progress (2): 41 kB | 142/327 kB&#xD;Progress (2): 41 kB | 147/327 kB&#xD;Progress (2): 41 kB | 151/327 kB&#xD;Progress (2): 41 kB | 155/327 kB&#xD;Progress (2): 41 kB | 159/327 kB&#xD;Progress (2): 41 kB | 163/327 kB&#xD;Progress (2): 41 kB | 167/327 kB&#xD;Progress (2): 41 kB | 171/327 kB&#xD;Progress (2): 41 kB | 175/327 kB&#xD;Progress (2): 41 kB | 179/327 kB&#xD;Progress (2): 41 kB | 183/327 kB&#xD;Progress (2): 41 kB | 188/327 kB&#xD;Progress (2): 41 kB | 192/327 kB&#xD;Progress (2): 41 kB | 196/327 kB&#xD;Progress (2): 41 kB | 200/327 kB&#xD;Progress (2): 41 kB | 204/327 kB&#xD;Progress (2): 41 kB | 208/327 kB&#xD;Progress (2): 41 kB | 212/327 kB&#xD;Progress (2): 41 kB | 216/327 kB&#xD;Progress (2): 41 kB | 220/327 kB&#xD;Progress (2): 41 kB | 224/327 kB&#xD;Progress (2): 41 kB | 228/327 kB&#xD;Progress (2): 41 kB | 233/327 kB&#xD;Progress (2): 41 kB | 237/327 kB&#xD;Progress (2): 41 kB | 241/327 kB&#xD;Progress (2): 41 kB | 245/327 kB&#xD;Progress (2): 41 kB | 249/327 kB&#xD;Progress (2): 41 kB | 253/327 kB&#xD;Progress (2): 41 kB | 257/327 kB&#xD;Progress (2): 41 kB | 261/327 kB&#xD;Progress (2): 41 kB | 265/327 kB&#xD;Progress (2): 41 kB | 269/327 kB&#xD;Progress (2): 41 kB | 274/327 kB&#xD;Progress (2): 41 kB | 278/327 kB&#xD;Progress (2): 41 kB | 282/327 kB&#xD;Progress (2): 41 kB | 286/327 kB&#xD;Progress (2): 41 kB | 290/327 kB&#xD;Progress (2): 41 kB | 294/327 kB&#xD;Progress (2): 41 kB | 298/327 kB&#xD;Progress (2): 41 kB | 302/327 kB&#xD;Progress (2): 41 kB | 306/327 kB&#xD;Progress (2): 41 kB | 310/327 kB&#xD;Progress (2): 41 kB | 314/327 kB&#xD;Progress (2): 41 kB | 319/327 kB&#xD;Progress (2): 41 kB | 323/327 kB&#xD;Progress (2): 41 kB | 327/327 kB&#xD;Progress (2): 41 kB | 327 kB    &#xD;Progress (3): 41 kB | 327 kB | 4.1/26 kB&#xD;Progress (3): 41 kB | 327 kB | 8.2/26 kB&#xD;Progress (3): 41 kB | 327 kB | 12/26 kB &#xD;Progress (3): 41 kB | 327 kB | 16/26 kB&#xD;Progress (3): 41 kB | 327 kB | 20/26 kB&#xD;Progress (3): 41 kB | 327 kB | 25/26 kB&#xD;Progress (3): 41 kB | 327 kB | 26 kB   &#xD;Progress (4): 41 kB | 327 kB | 26 kB | 4.1/36 kB&#xD;Progress (4): 41 kB | 327 kB | 26 kB | 7.7/36 kB&#xD;Progress (4): 41 kB | 327 kB | 26 kB | 12/36 kB &#xD;Progress (4): 41 kB | 327 kB | 26 kB | 15/36 kB&#xD;Progress (4): 41 kB | 327 kB | 26 kB | 20/36 kB&#xD;Progress (4): 41 kB | 327 kB | 26 kB | 24/36 kB&#xD;Progress (4): 41 kB | 327 kB | 26 kB | 28/36 kB&#xD;Progress (4): 41 kB | 327 kB | 26 kB | 32/36 kB&#xD;Progress (4): 41 kB | 327 kB | 26 kB | 36/36 kB&#xD;Progress (4): 41 kB | 327 kB | 26 kB | 36 kB   &#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 4.1/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 7.7/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 12/79 kB &#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 16/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 20/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 24/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 28/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 32/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 36/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 40/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 44/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 48/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 52/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 56/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 61/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 65/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 69/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 73/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 77/79 kB&#xD;Progress (5): 41 kB | 327 kB | 26 kB | 36 kB | 79 kB   &#xD;                                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.36/slf4j-api-1.7.36.jar (41 kB at 1.5 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/javax/inject/javax.inject/1/javax.inject-1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.11.0/commons-io-2.11.0.jar (327 kB at 11 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-archiver/4.4.0/plexus-archiver-4.4.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-archiver/3.6.0/maven-archiver-3.6.0.jar (26 kB at 750 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-compress/1.21/commons-compress-1.21.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/file-management/3.1.0/file-management-3.1.0.jar (36 kB at 931 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/iq80/snappy/snappy/0.4/snappy-0.4.jar&#xA;Progress (2): 79 kB | 2.5 kB&#xD;                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-io/3.4.0/plexus-io-3.4.0.jar (79 kB at 1.9 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/tukaani/xz/1.9/xz-1.9.jar&#xA;Progress (2): 2.5 kB | 4.1/211 kB&#xD;Progress (2): 2.5 kB | 7.7/211 kB&#xD;Progress (2): 2.5 kB | 12/211 kB &#xD;Progress (2): 2.5 kB | 16/211 kB&#xD;Progress (2): 2.5 kB | 20/211 kB&#xD;Progress (2): 2.5 kB | 24/211 kB&#xD;Progress (2): 2.5 kB | 28/211 kB&#xD;Progress (2): 2.5 kB | 32/211 kB&#xD;Progress (2): 2.5 kB | 36/211 kB&#xD;Progress (2): 2.5 kB | 40/211 kB&#xD;Progress (2): 2.5 kB | 45/211 kB&#xD;Progress (2): 2.5 kB | 49/211 kB&#xD;Progress (2): 2.5 kB | 53/211 kB&#xD;Progress (2): 2.5 kB | 57/211 kB&#xD;Progress (2): 2.5 kB | 61/211 kB&#xD;Progress (2): 2.5 kB | 65/211 kB&#xD;Progress (2): 2.5 kB | 69/211 kB&#xD;Progress (2): 2.5 kB | 73/211 kB&#xD;Progress (2): 2.5 kB | 77/211 kB&#xD;Progress (2): 2.5 kB | 81/211 kB&#xD;Progress (2): 2.5 kB | 86/211 kB&#xD;Progress (2): 2.5 kB | 90/211 kB&#xD;Progress (2): 2.5 kB | 94/211 kB&#xD;Progress (2): 2.5 kB | 98/211 kB&#xD;Progress (2): 2.5 kB | 102/211 kB&#xD;Progress (2): 2.5 kB | 106/211 kB&#xD;Progress (2): 2.5 kB | 110/211 kB&#xD;Progress (2): 2.5 kB | 114/211 kB&#xD;Progress (2): 2.5 kB | 118/211 kB&#xD;Progress (2): 2.5 kB | 122/211 kB&#xD;Progress (2): 2.5 kB | 126/211 kB&#xD;Progress (2): 2.5 kB | 131/211 kB&#xD;Progress (2): 2.5 kB | 135/211 kB&#xD;Progress (2): 2.5 kB | 139/211 kB&#xD;Progress (2): 2.5 kB | 143/211 kB&#xD;Progress (2): 2.5 kB | 147/211 kB&#xD;Progress (2): 2.5 kB | 151/211 kB&#xD;Progress (2): 2.5 kB | 155/211 kB&#xD;Progress (2): 2.5 kB | 159/211 kB&#xD;Progress (2): 2.5 kB | 163/211 kB&#xD;Progress (2): 2.5 kB | 167/211 kB&#xD;Progress (2): 2.5 kB | 172/211 kB&#xD;Progress (2): 2.5 kB | 176/211 kB&#xD;Progress (2): 2.5 kB | 180/211 kB&#xD;Progress (2): 2.5 kB | 184/211 kB&#xD;Progress (2): 2.5 kB | 188/211 kB&#xD;Progress (2): 2.5 kB | 192/211 kB&#xD;Progress (2): 2.5 kB | 196/211 kB&#xD;Progress (2): 2.5 kB | 200/211 kB&#xD;Progress (2): 2.5 kB | 204/211 kB&#xD;Progress (2): 2.5 kB | 208/211 kB&#xD;Progress (2): 2.5 kB | 211 kB    &#xD;Progress (3): 2.5 kB | 211 kB | 0/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;                                          &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/javax/inject/javax.inject/1/javax.inject-1.jar (2.5 kB at 44 kB/s)&#xA;Progress (2): 211 kB | 0.3/1.0 MB&#xD;                                 &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.26/plexus-interpolation-1.26.jar&#xA;Progress (2): 211 kB | 0.3/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;                                 &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-archiver/4.4.0/plexus-archiver-4.4.0.jar (211 kB at 3.6 MB/s)&#xA;Progress (1): 0.5/1.0 MB&#xD;                        &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.4.2/plexus-utils-3.4.2.jar&#xA;Progress (1): 0.5/1.0 MB&#xD;Progress (1): 0.5/1.0 MB&#xD;Progress (1): 0.5/1.0 MB&#xD;Progress (1): 0.6/1.0 MB&#xD;Progress (1): 0.6/1.0 MB&#xD;Progress (1): 0.6/1.0 MB&#xD;Progress (1): 0.6/1.0 MB&#xD;Progress (1): 0.6/1.0 MB&#xD;Progress (1): 0.6/1.0 MB&#xD;Progress (1): 0.6/1.0 MB&#xD;Progress (1): 0.6/1.0 MB&#xD;Progress (2): 0.6/1.0 MB | 4.1/58 kB&#xD;Progress (2): 0.6/1.0 MB | 4.1/58 kB&#xD;Progress (2): 0.6/1.0 MB | 7.7/58 kB&#xD;Progress (2): 0.6/1.0 MB | 7.7/58 kB&#xD;Progress (2): 0.6/1.0 MB | 12/58 kB &#xD;Progress (2): 0.6/1.0 MB | 16/58 kB&#xD;Progress (2): 0.6/1.0 MB | 16/58 kB&#xD;Progress (2): 0.6/1.0 MB | 16/58 kB&#xD;Progress (2): 0.6/1.0 MB | 20/58 kB&#xD;Progress (2): 0.7/1.0 MB | 20/58 kB&#xD;Progress (2): 0.7/1.0 MB | 20/58 kB&#xD;Progress (2): 0.7/1.0 MB | 24/58 kB&#xD;Progress (2): 0.7/1.0 MB | 24/58 kB&#xD;Progress (2): 0.7/1.0 MB | 28/58 kB&#xD;Progress (2): 0.7/1.0 MB | 28/58 kB&#xD;Progress (2): 0.7/1.0 MB | 32/58 kB&#xD;Progress (2): 0.7/1.0 MB | 32/58 kB&#xD;Progress (2): 0.7/1.0 MB | 36/58 kB&#xD;Progress (2): 0.7/1.0 MB | 36/58 kB&#xD;Progress (2): 0.7/1.0 MB | 40/58 kB&#xD;Progress (2): 0.7/1.0 MB | 45/58 kB&#xD;Progress (2): 0.7/1.0 MB | 45/58 kB&#xD;Progress (2): 0.7/1.0 MB | 49/58 kB&#xD;Progress (2): 0.7/1.0 MB | 49/58 kB&#xD;Progress (2): 0.7/1.0 MB | 53/58 kB&#xD;Progress (2): 0.7/1.0 MB | 53/58 kB&#xD;Progress (2): 0.7/1.0 MB | 57/58 kB&#xD;Progress (2): 0.7/1.0 MB | 57/58 kB&#xD;Progress (2): 0.7/1.0 MB | 58 kB   &#xD;Progress (2): 0.7/1.0 MB | 58 kB&#xD;Progress (2): 0.7/1.0 MB | 58 kB&#xD;Progress (2): 0.8/1.0 MB | 58 kB&#xD;Progress (2): 0.8/1.0 MB | 58 kB&#xD;Progress (2): 0.8/1.0 MB | 58 kB&#xD;Progress (2): 0.8/1.0 MB | 58 kB&#xD;Progress (2): 0.8/1.0 MB | 58 kB&#xD;Progress (2): 0.8/1.0 MB | 58 kB&#xD;Progress (2): 0.8/1.0 MB | 58 kB&#xD;Progress (2): 0.8/1.0 MB | 58 kB&#xD;Progress (2): 0.8/1.0 MB | 58 kB&#xD;Progress (2): 0.8/1.0 MB | 58 kB&#xD;Progress (2): 0.8/1.0 MB | 58 kB&#xD;Progress (2): 0.8/1.0 MB | 58 kB&#xD;Progress (2): 0.9/1.0 MB | 58 kB&#xD;Progress (2): 0.9/1.0 MB | 58 kB&#xD;Progress (2): 0.9/1.0 MB | 58 kB&#xD;Progress (2): 0.9/1.0 MB | 58 kB&#xD;Progress (2): 0.9/1.0 MB | 58 kB&#xD;Progress (2): 0.9/1.0 MB | 58 kB&#xD;Progress (2): 0.9/1.0 MB | 58 kB&#xD;Progress (2): 0.9/1.0 MB | 58 kB&#xD;Progress (2): 0.9/1.0 MB | 58 kB&#xD;Progress (2): 0.9/1.0 MB | 58 kB&#xD;Progress (2): 0.9/1.0 MB | 58 kB&#xD;Progress (2): 0.9/1.0 MB | 58 kB&#xD;Progress (2): 0.9/1.0 MB | 58 kB&#xD;Progress (2): 1.0/1.0 MB | 58 kB&#xD;Progress (2): 1.0/1.0 MB | 58 kB&#xD;Progress (2): 1.0/1.0 MB | 58 kB&#xD;Progress (2): 1.0/1.0 MB | 58 kB&#xD;Progress (2): 1.0/1.0 MB | 58 kB&#xD;Progress (2): 1.0/1.0 MB | 58 kB&#xD;Progress (2): 1.0/1.0 MB | 58 kB&#xD;Progress (2): 1.0/1.0 MB | 58 kB&#xD;Progress (2): 1.0 MB | 58 kB    &#xD;Progress (3): 1.0 MB | 58 kB | 4.1/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 7.7/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 12/116 kB &#xD;Progress (3): 1.0 MB | 58 kB | 15/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 20/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 24/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 28/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 32/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 36/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 40/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 44/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 48/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 52/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 56/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 61/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 65/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 69/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 73/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 77/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 81/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 85/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 89/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 93/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 97/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 102/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 106/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 110/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 114/116 kB&#xD;Progress (3): 1.0 MB | 58 kB | 116 kB    &#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 4.1/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 7.7/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 12/85 kB &#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 16/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 20/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 24/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 28/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 32/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 36/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 40/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 45/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 49/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 53/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 57/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 61/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 65/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 69/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 73/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 77/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 81/85 kB&#xD;Progress (4): 1.0 MB | 58 kB | 116 kB | 85 kB   &#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 4.1/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 7.7/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 12/267 kB &#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 16/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 20/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 24/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 28/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 32/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 36/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 40/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 45/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 49/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 53/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 57/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 61/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 65/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 69/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 73/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 77/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 81/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 86/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 90/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 94/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 98/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 102/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 106/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 110/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 114/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 118/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 122/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 126/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 131/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 135/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 139/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 143/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 147/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 151/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 155/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 159/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 163/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 167/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 172/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 176/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 180/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 184/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 188/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 192/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 196/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 200/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 204/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 208/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 213/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 217/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 221/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 225/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 229/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 233/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 237/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 241/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 245/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 249/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 253/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 258/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 262/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 266/267 kB&#xD;Progress (5): 1.0 MB | 58 kB | 116 kB | 85 kB | 267 kB    &#xD;                                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-compress/1.21/commons-compress-1.21.jar (1.0 MB at 13 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.26/plexus-interpolation-1.26.jar (85 kB at 1.0 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/tukaani/xz/1.9/xz-1.9.jar (116 kB at 1.3 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/iq80/snappy/snappy/0.4/snappy-0.4.jar (58 kB at 644 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.4.2/plexus-utils-3.4.2.jar (267 kB at 2.9 MB/s)&#xA;[INFO] Building jar: /work/target/hacbs-test.jar&#xA;[INFO] &#xA;[INFO] --- maven-shade-plugin:3.2.4:shade (default) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/3.0/maven-plugin-api-3.0.pom&#xA;Progress (1): 2.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/3.0/maven-plugin-api-3.0.pom (2.3 kB at 72 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/3.0/maven-3.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 22 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/3.0/maven-3.0.pom (22 kB at 625 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/15/maven-parent-15.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 24 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/15/maven-parent-15.pom (24 kB at 828 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/3.0/maven-model-3.0.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/3.0/maven-model-3.0.pom (3.9 kB at 134 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.4/plexus-utils-2.0.4.pom&#xA;Progress (1): 3.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.4/plexus-utils-2.0.4.pom (3.3 kB at 123 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/3.0/maven-artifact-3.0.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/3.0/maven-artifact-3.0.pom (1.9 kB at 57 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-plexus/1.4.2/sisu-inject-plexus-1.4.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-plexus/1.4.2/sisu-inject-plexus-1.4.2.pom (5.4 kB at 199 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/inject/guice-plexus/1.4.2/guice-plexus-1.4.2.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/inject/guice-plexus/1.4.2/guice-plexus-1.4.2.pom (3.1 kB at 125 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/inject/guice-bean/1.4.2/guice-bean-1.4.2.pom&#xA;Progress (1): 2.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/inject/guice-bean/1.4.2/guice-bean-1.4.2.pom (2.6 kB at 97 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject/1.4.2/sisu-inject-1.4.2.pom&#xA;Progress (1): 1.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject/1.4.2/sisu-inject-1.4.2.pom (1.2 kB at 46 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-parent/1.4.2/sisu-parent-1.4.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-parent/1.4.2/sisu-parent-1.4.2.pom (7.8 kB at 222 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/6/forge-parent-6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/6/forge-parent-6.pom (11 kB at 307 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/2.0.0/plexus-component-annotations-2.0.0.pom&#xA;Progress (1): 750 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/2.0.0/plexus-component-annotations-2.0.0.pom (750 B at 31 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/2.0.0/plexus-containers-2.0.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/2.0.0/plexus-containers-2.0.0.pom (4.8 kB at 172 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.3/plexus-classworlds-2.2.3.pom&#xA;Progress (1): 4.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.3/plexus-classworlds-2.2.3.pom (4.0 kB at 160 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-bean/1.4.2/sisu-inject-bean-1.4.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-bean/1.4.2/sisu-inject-bean-1.4.2.pom (5.5 kB at 202 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-guice/2.1.7/sisu-guice-2.1.7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-guice/2.1.7/sisu-guice-2.1.7.pom (11 kB at 395 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/3.0/maven-core-3.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/3.0/maven-core-3.0.pom (6.6 kB at 189 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/3.0/maven-settings-3.0.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/3.0/maven-settings-3.0.pom (1.9 kB at 72 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings-builder/3.0/maven-settings-builder-3.0.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings-builder/3.0/maven-settings-builder-3.0.pom (2.2 kB at 65 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.14/plexus-interpolation-1.14.pom&#xA;Progress (1): 910 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.14/plexus-interpolation-1.14.pom (910 B at 31 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.18/plexus-components-1.1.18.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.18/plexus-components-1.1.18.pom (5.4 kB at 214 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/3.0/maven-repository-metadata-3.0.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/3.0/maven-repository-metadata-3.0.pom (1.9 kB at 69 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model-builder/3.0/maven-model-builder-3.0.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model-builder/3.0/maven-model-builder-3.0.pom (2.2 kB at 80 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-aether-provider/3.0/maven-aether-provider-3.0.pom&#xA;Progress (1): 2.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-aether-provider/3.0/maven-aether-provider-3.0.pom (2.5 kB at 80 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-api/1.7/aether-api-1.7.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-api/1.7/aether-api-1.7.pom (1.7 kB at 49 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-parent/1.7/aether-parent-1.7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-parent/1.7/aether-parent-1.7.pom (7.7 kB at 297 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-util/1.7/aether-util-1.7.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-util/1.7/aether-util-1.7.pom (2.1 kB at 82 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-impl/1.7/aether-impl-1.7.pom&#xA;Progress (1): 3.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-impl/1.7/aether-impl-1.7.pom (3.7 kB at 142 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-spi/1.7/aether-spi-1.7.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-spi/1.7/aether-spi-1.7.pom (1.7 kB at 67 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-artifact-transfer/0.12.0/maven-artifact-transfer-0.12.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-artifact-transfer/0.12.0/maven-artifact-transfer-0.12.0.pom (11 kB at 363 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/33/maven-shared-components-33.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/33/maven-shared-components-33.pom (5.1 kB at 189 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/33/maven-parent-33.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 44 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/33/maven-parent-33.pom (44 kB at 1.5 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/21/apache-21.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 17 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/21/apache-21.pom (17 kB at 658 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/3.0.1/maven-common-artifact-filters-3.0.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/3.0.1/maven-common-artifact-filters-3.0.1.pom (4.8 kB at 151 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/30/maven-shared-components-30.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/30/maven-shared-components-30.pom (4.6 kB at 164 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/30/maven-parent-30.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 41 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/30/maven-parent-30.pom (41 kB at 1.4 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/18/apache-18.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/18/apache-18.pom (16 kB at 560 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/3.1.0/maven-shared-utils-3.1.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/3.1.0/maven-shared-utils-3.1.0.pom (5.0 kB at 172 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.5/commons-io-2.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 13 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.5/commons-io-2.5.pom (13 kB at 475 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/39/commons-parent-39.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 49 kB&#xD;Progress (1): 53 kB&#xD;Progress (1): 57 kB&#xD;Progress (1): 61 kB&#xD;Progress (1): 62 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/39/commons-parent-39.pom (62 kB at 1.9 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/16/apache-16.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/16/apache-16.pom (15 kB at 513 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.1.1/plexus-utils-3.1.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.1.1/plexus-utils-3.1.1.pom (5.1 kB at 158 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/4.0/plexus-4.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 22 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/4.0/plexus-4.0.pom (22 kB at 717 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-codec/commons-codec/1.11/commons-codec-1.11.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-codec/commons-codec/1.11/commons-codec-1.11.pom (14 kB at 517 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/42/commons-parent-42.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 49 kB&#xD;Progress (1): 53 kB&#xD;Progress (1): 57 kB&#xD;Progress (1): 61 kB&#xD;Progress (1): 66 kB&#xD;Progress (1): 68 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/42/commons-parent-42.pom (68 kB at 2.1 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.5/slf4j-api-1.7.5.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.5/slf4j-api-1.7.5.pom (2.7 kB at 108 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.7.5/slf4j-parent-1.7.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.7.5/slf4j-parent-1.7.5.pom (12 kB at 407 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm/8.0/asm-8.0.pom&#xA;Progress (1): 2.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm/8.0/asm-8.0.pom (2.9 kB at 98 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/ow2/1.5/ow2-1.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/ow2/1.5/ow2-1.5.pom (11 kB at 362 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-commons/8.0/asm-commons-8.0.pom&#xA;Progress (1): 3.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-commons/8.0/asm-commons-8.0.pom (3.7 kB at 131 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-tree/8.0/asm-tree-8.0.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-tree/8.0/asm-tree-8.0.pom (3.1 kB at 116 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-analysis/8.0/asm-analysis-8.0.pom&#xA;Progress (1): 3.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-analysis/8.0/asm-analysis-8.0.pom (3.2 kB at 113 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/jdom/jdom2/2.0.6/jdom2-2.0.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/jdom/jdom2/2.0.6/jdom2-2.0.6.pom (4.6 kB at 164 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-dependency-tree/3.0.1/maven-dependency-tree-3.0.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-dependency-tree/3.0.1/maven-dependency-tree-3.0.1.pom (7.5 kB at 227 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether-util/0.9.0.M2/aether-util-0.9.0.M2.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether-util/0.9.0.M2/aether-util-0.9.0.M2.pom (2.0 kB at 73 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether/0.9.0.M2/aether-0.9.0.M2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 28 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether/0.9.0.M2/aether-0.9.0.M2.pom (28 kB at 961 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.6/commons-io-2.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.6/commons-io-2.6.pom (14 kB at 492 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/vafer/jdependency/2.4.0/jdependency-2.4.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/vafer/jdependency/2.4.0/jdependency-2.4.0.pom (15 kB at 359 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-util/8.0/asm-util-8.0.pom&#xA;Progress (1): 3.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-util/8.0/asm-util-8.0.pom (3.7 kB at 122 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/guava/28.2-android/guava-28.2-android.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/guava/28.2-android/guava-28.2-android.pom (11 kB at 364 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/guava-parent/28.2-android/guava-parent-28.2-android.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 13 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/guava-parent/28.2-android/guava-parent-28.2-android.pom (13 kB at 461 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/failureaccess/1.0.1/failureaccess-1.0.1.pom&#xA;Progress (1): 2.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/failureaccess/1.0.1/failureaccess-1.0.1.pom (2.4 kB at 86 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/guava-parent/26.0-android/guava-parent-26.0-android.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 10 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/guava-parent/26.0-android/guava-parent-26.0-android.pom (10 kB at 377 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/oss/oss-parent/9/oss-parent-9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/oss/oss-parent/9/oss-parent-9.pom (6.6 kB at 227 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/listenablefuture/9999.0-empty-to-avoid-conflict-with-guava/listenablefuture-9999.0-empty-to-avoid-conflict-with-guava.pom&#xA;Progress (1): 2.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/listenablefuture/9999.0-empty-to-avoid-conflict-with-guava/listenablefuture-9999.0-empty-to-avoid-conflict-with-guava.pom (2.3 kB at 71 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.pom (4.3 kB at 148 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/oss/oss-parent/7/oss-parent-7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/oss/oss-parent/7/oss-parent-7.pom (4.8 kB at 186 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/checkerframework/checker-compat-qual/2.5.5/checker-compat-qual-2.5.5.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/checkerframework/checker-compat-qual/2.5.5/checker-compat-qual-2.5.5.pom (2.7 kB at 110 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_annotations/2.3.4/error_prone_annotations-2.3.4.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_annotations/2.3.4/error_prone_annotations-2.3.4.pom (2.1 kB at 81 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_parent/2.3.4/error_prone_parent-2.3.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_parent/2.3.4/error_prone_parent-2.3.4.pom (5.4 kB at 201 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/j2objc/j2objc-annotations/1.3/j2objc-annotations-1.3.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/j2objc/j2objc-annotations/1.3/j2objc-annotations-1.3.pom (2.8 kB at 110 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 28 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.pom (28 kB at 949 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/3.0/maven-plugin-api-3.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-plexus/1.4.2/sisu-inject-plexus-1.4.2.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-bean/1.4.2/sisu-inject-bean-1.4.2.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-guice/2.1.7/sisu-guice-2.1.7-noaop.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/3.0/maven-model-3.0.jar&#xA;Progress (1): 4.1/49 kB&#xD;Progress (1): 7.7/49 kB&#xD;Progress (1): 12/49 kB &#xD;Progress (1): 15/49 kB&#xD;Progress (1): 20/49 kB&#xD;Progress (1): 24/49 kB&#xD;Progress (1): 28/49 kB&#xD;Progress (1): 32/49 kB&#xD;Progress (1): 36/49 kB&#xD;Progress (1): 40/49 kB&#xD;Progress (1): 44/49 kB&#xD;Progress (1): 48/49 kB&#xD;Progress (1): 49 kB   &#xD;Progress (2): 49 kB | 4.1/472 kB&#xD;Progress (3): 49 kB | 4.1/472 kB | 4.1/165 kB&#xD;Progress (3): 49 kB | 7.7/472 kB | 4.1/165 kB&#xD;Progress (3): 49 kB | 12/472 kB | 4.1/165 kB &#xD;Progress (3): 49 kB | 12/472 kB | 7.7/165 kB&#xD;Progress (3): 49 kB | 16/472 kB | 7.7/165 kB&#xD;Progress (3): 49 kB | 16/472 kB | 12/165 kB &#xD;Progress (3): 49 kB | 20/472 kB | 12/165 kB&#xD;Progress (3): 49 kB | 20/472 kB | 15/165 kB&#xD;Progress (3): 49 kB | 24/472 kB | 15/165 kB&#xD;Progress (3): 49 kB | 24/472 kB | 20/165 kB&#xD;Progress (3): 49 kB | 28/472 kB | 20/165 kB&#xD;Progress (3): 49 kB | 28/472 kB | 24/165 kB&#xD;Progress (3): 49 kB | 32/472 kB | 24/165 kB&#xD;Progress (3): 49 kB | 32/472 kB | 28/165 kB&#xD;Progress (3): 49 kB | 32/472 kB | 32/165 kB&#xD;Progress (3): 49 kB | 36/472 kB | 32/165 kB&#xD;Progress (3): 49 kB | 40/472 kB | 32/165 kB&#xD;Progress (3): 49 kB | 40/472 kB | 36/165 kB&#xD;Progress (3): 49 kB | 45/472 kB | 36/165 kB&#xD;Progress (3): 49 kB | 45/472 kB | 40/165 kB&#xD;Progress (3): 49 kB | 49/472 kB | 40/165 kB&#xD;Progress (3): 49 kB | 49/472 kB | 44/165 kB&#xD;Progress (3): 49 kB | 49/472 kB | 48/165 kB&#xD;Progress (3): 49 kB | 53/472 kB | 48/165 kB&#xD;Progress (3): 49 kB | 53/472 kB | 52/165 kB&#xD;Progress (3): 49 kB | 57/472 kB | 52/165 kB&#xD;Progress (3): 49 kB | 57/472 kB | 56/165 kB&#xD;Progress (3): 49 kB | 61/472 kB | 56/165 kB&#xD;Progress (3): 49 kB | 61/472 kB | 61/165 kB&#xD;Progress (3): 49 kB | 65/472 kB | 61/165 kB&#xD;Progress (3): 49 kB | 65/472 kB | 65/165 kB&#xD;Progress (3): 49 kB | 69/472 kB | 65/165 kB&#xD;Progress (3): 49 kB | 69/472 kB | 69/165 kB&#xD;Progress (3): 49 kB | 69/472 kB | 73/165 kB&#xD;Progress (3): 49 kB | 73/472 kB | 73/165 kB&#xD;Progress (3): 49 kB | 73/472 kB | 77/165 kB&#xD;Progress (3): 49 kB | 77/472 kB | 77/165 kB&#xD;Progress (3): 49 kB | 77/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 81/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 85/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 89/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 93/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 97/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 102/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 106/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 110/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 114/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 118/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 122/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 126/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 130/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 134/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 138/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 142/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 147/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 151/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 155/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 159/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 163/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 167/472 kB | 81/165 kB&#xD;Progress (3): 49 kB | 167/472 kB | 85/165 kB&#xD;Progress (3): 49 kB | 171/472 kB | 85/165 kB&#xD;Progress (3): 49 kB | 171/472 kB | 89/165 kB&#xD;Progress (3): 49 kB | 175/472 kB | 89/165 kB&#xD;Progress (3): 49 kB | 175/472 kB | 93/165 kB&#xD;Progress (3): 49 kB | 175/472 kB | 97/165 kB&#xD;Progress (3): 49 kB | 179/472 kB | 97/165 kB&#xD;Progress (3): 49 kB | 183/472 kB | 97/165 kB&#xD;Progress (3): 49 kB | 183/472 kB | 101/165 kB&#xD;Progress (3): 49 kB | 188/472 kB | 101/165 kB&#xD;Progress (3): 49 kB | 188/472 kB | 106/165 kB&#xD;Progress (3): 49 kB | 192/472 kB | 106/165 kB&#xD;Progress (3): 49 kB | 192/472 kB | 110/165 kB&#xD;Progress (3): 49 kB | 192/472 kB | 114/165 kB&#xD;Progress (3): 49 kB | 196/472 kB | 114/165 kB&#xD;Progress (3): 49 kB | 196/472 kB | 118/165 kB&#xD;Progress (3): 49 kB | 200/472 kB | 118/165 kB&#xD;Progress (3): 49 kB | 200/472 kB | 122/165 kB&#xD;Progress (3): 49 kB | 204/472 kB | 122/165 kB&#xD;Progress (3): 49 kB | 204/472 kB | 126/165 kB&#xD;Progress (3): 49 kB | 208/472 kB | 126/165 kB&#xD;Progress (3): 49 kB | 212/472 kB | 126/165 kB&#xD;Progress (3): 49 kB | 212/472 kB | 130/165 kB&#xD;Progress (3): 49 kB | 212/472 kB | 134/165 kB&#xD;Progress (3): 49 kB | 216/472 kB | 134/165 kB&#xD;Progress (3): 49 kB | 216/472 kB | 138/165 kB&#xD;Progress (3): 49 kB | 220/472 kB | 138/165 kB&#xD;Progress (3): 49 kB | 224/472 kB | 138/165 kB&#xD;Progress (3): 49 kB | 224/472 kB | 142/165 kB&#xD;Progress (3): 49 kB | 224/472 kB | 147/165 kB&#xD;Progress (3): 49 kB | 228/472 kB | 147/165 kB&#xD;Progress (3): 49 kB | 233/472 kB | 147/165 kB&#xD;Progress (3): 49 kB | 233/472 kB | 151/165 kB&#xD;Progress (3): 49 kB | 237/472 kB | 151/165 kB&#xD;Progress (3): 49 kB | 237/472 kB | 155/165 kB&#xD;Progress (3): 49 kB | 237/472 kB | 159/165 kB&#xD;Progress (3): 49 kB | 241/472 kB | 159/165 kB&#xD;Progress (3): 49 kB | 241/472 kB | 163/165 kB&#xD;Progress (3): 49 kB | 245/472 kB | 163/165 kB&#xD;Progress (3): 49 kB | 245/472 kB | 165 kB    &#xD;Progress (3): 49 kB | 249/472 kB | 165 kB&#xD;Progress (3): 49 kB | 253/472 kB | 165 kB&#xD;Progress (3): 49 kB | 257/472 kB | 165 kB&#xD;Progress (3): 49 kB | 261/472 kB | 165 kB&#xD;Progress (3): 49 kB | 265/472 kB | 165 kB&#xD;Progress (3): 49 kB | 269/472 kB | 165 kB&#xD;Progress (3): 49 kB | 274/472 kB | 165 kB&#xD;Progress (3): 49 kB | 278/472 kB | 165 kB&#xD;Progress (3): 49 kB | 282/472 kB | 165 kB&#xD;Progress (3): 49 kB | 286/472 kB | 165 kB&#xD;Progress (3): 49 kB | 290/472 kB | 165 kB&#xD;Progress (3): 49 kB | 294/472 kB | 165 kB&#xD;Progress (3): 49 kB | 298/472 kB | 165 kB&#xD;Progress (3): 49 kB | 302/472 kB | 165 kB&#xD;Progress (3): 49 kB | 306/472 kB | 165 kB&#xD;Progress (3): 49 kB | 310/472 kB | 165 kB&#xD;Progress (3): 49 kB | 314/472 kB | 165 kB&#xD;Progress (3): 49 kB | 319/472 kB | 165 kB&#xD;Progress (3): 49 kB | 323/472 kB | 165 kB&#xD;Progress (3): 49 kB | 327/472 kB | 165 kB&#xD;Progress (3): 49 kB | 331/472 kB | 165 kB&#xD;Progress (3): 49 kB | 335/472 kB | 165 kB&#xD;Progress (3): 49 kB | 339/472 kB | 165 kB&#xD;Progress (3): 49 kB | 343/472 kB | 165 kB&#xD;Progress (3): 49 kB | 347/472 kB | 165 kB&#xD;Progress (3): 49 kB | 351/472 kB | 165 kB&#xD;Progress (3): 49 kB | 355/472 kB | 165 kB&#xD;Progress (3): 49 kB | 360/472 kB | 165 kB&#xD;Progress (4): 49 kB | 360/472 kB | 165 kB | 4.1/202 kB&#xD;Progress (4): 49 kB | 364/472 kB | 165 kB | 4.1/202 kB&#xD;Progress (4): 49 kB | 368/472 kB | 165 kB | 4.1/202 kB&#xD;Progress (4): 49 kB | 368/472 kB | 165 kB | 7.7/202 kB&#xD;Progress (4): 49 kB | 372/472 kB | 165 kB | 7.7/202 kB&#xD;Progress (4): 49 kB | 372/472 kB | 165 kB | 12/202 kB &#xD;Progress (4): 49 kB | 376/472 kB | 165 kB | 12/202 kB&#xD;                                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/3.0/maven-plugin-api-3.0.jar (49 kB at 2.0 MB/s)&#xA;Progress (3): 380/472 kB | 165 kB | 12/202 kB&#xD;Progress (3): 380/472 kB | 165 kB | 16/202 kB&#xD;Progress (3): 380/472 kB | 165 kB | 20/202 kB&#xD;Progress (3): 380/472 kB | 165 kB | 24/202 kB&#xD;Progress (3): 384/472 kB | 165 kB | 24/202 kB&#xD;                                             &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/3.0/maven-core-3.0.jar&#xA;Progress (3): 384/472 kB | 165 kB | 28/202 kB&#xD;Progress (3): 388/472 kB | 165 kB | 28/202 kB&#xD;Progress (3): 388/472 kB | 165 kB | 32/202 kB&#xD;Progress (3): 388/472 kB | 165 kB | 36/202 kB&#xD;Progress (3): 388/472 kB | 165 kB | 40/202 kB&#xD;Progress (3): 388/472 kB | 165 kB | 45/202 kB&#xD;Progress (3): 392/472 kB | 165 kB | 45/202 kB&#xD;Progress (3): 392/472 kB | 165 kB | 49/202 kB&#xD;Progress (3): 396/472 kB | 165 kB | 49/202 kB&#xD;Progress (3): 396/472 kB | 165 kB | 53/202 kB&#xD;Progress (3): 401/472 kB | 165 kB | 53/202 kB&#xD;Progress (3): 401/472 kB | 165 kB | 57/202 kB&#xD;Progress (3): 401/472 kB | 165 kB | 61/202 kB&#xD;Progress (3): 405/472 kB | 165 kB | 61/202 kB&#xD;Progress (3): 409/472 kB | 165 kB | 61/202 kB&#xD;Progress (3): 409/472 kB | 165 kB | 65/202 kB&#xD;Progress (3): 413/472 kB | 165 kB | 65/202 kB&#xD;Progress (3): 413/472 kB | 165 kB | 69/202 kB&#xD;Progress (3): 417/472 kB | 165 kB | 69/202 kB&#xD;Progress (3): 417/472 kB | 165 kB | 73/202 kB&#xD;Progress (3): 421/472 kB | 165 kB | 73/202 kB&#xD;Progress (3): 421/472 kB | 165 kB | 77/202 kB&#xD;Progress (3): 425/472 kB | 165 kB | 77/202 kB&#xD;Progress (3): 425/472 kB | 165 kB | 81/202 kB&#xD;Progress (3): 429/472 kB | 165 kB | 81/202 kB&#xD;Progress (3): 429/472 kB | 165 kB | 86/202 kB&#xD;Progress (3): 433/472 kB | 165 kB | 86/202 kB&#xD;Progress (3): 433/472 kB | 165 kB | 90/202 kB&#xD;Progress (3): 437/472 kB | 165 kB | 90/202 kB&#xD;Progress (3): 437/472 kB | 165 kB | 94/202 kB&#xD;Progress (3): 441/472 kB | 165 kB | 94/202 kB&#xD;Progress (3): 446/472 kB | 165 kB | 94/202 kB&#xD;Progress (3): 446/472 kB | 165 kB | 98/202 kB&#xD;Progress (3): 450/472 kB | 165 kB | 98/202 kB&#xD;Progress (3): 450/472 kB | 165 kB | 102/202 kB&#xD;Progress (3): 454/472 kB | 165 kB | 102/202 kB&#xD;Progress (3): 454/472 kB | 165 kB | 106/202 kB&#xD;Progress (3): 458/472 kB | 165 kB | 106/202 kB&#xD;Progress (3): 458/472 kB | 165 kB | 110/202 kB&#xD;Progress (3): 462/472 kB | 165 kB | 110/202 kB&#xD;Progress (3): 462/472 kB | 165 kB | 114/202 kB&#xD;Progress (3): 466/472 kB | 165 kB | 114/202 kB&#xD;Progress (3): 466/472 kB | 165 kB | 118/202 kB&#xD;Progress (3): 470/472 kB | 165 kB | 118/202 kB&#xD;Progress (3): 470/472 kB | 165 kB | 122/202 kB&#xD;Progress (3): 472 kB | 165 kB | 122/202 kB    &#xD;Progress (3): 472 kB | 165 kB | 126/202 kB&#xD;Progress (3): 472 kB | 165 kB | 131/202 kB&#xD;Progress (3): 472 kB | 165 kB | 135/202 kB&#xD;Progress (3): 472 kB | 165 kB | 139/202 kB&#xD;Progress (3): 472 kB | 165 kB | 143/202 kB&#xD;Progress (3): 472 kB | 165 kB | 147/202 kB&#xD;Progress (3): 472 kB | 165 kB | 151/202 kB&#xD;Progress (3): 472 kB | 165 kB | 155/202 kB&#xD;Progress (3): 472 kB | 165 kB | 159/202 kB&#xD;Progress (3): 472 kB | 165 kB | 163/202 kB&#xD;Progress (3): 472 kB | 165 kB | 167/202 kB&#xD;Progress (3): 472 kB | 165 kB | 172/202 kB&#xD;Progress (3): 472 kB | 165 kB | 176/202 kB&#xD;Progress (3): 472 kB | 165 kB | 180/202 kB&#xD;Progress (3): 472 kB | 165 kB | 184/202 kB&#xD;Progress (3): 472 kB | 165 kB | 188/202 kB&#xD;Progress (3): 472 kB | 165 kB | 192/202 kB&#xD;Progress (3): 472 kB | 165 kB | 196/202 kB&#xD;Progress (3): 472 kB | 165 kB | 200/202 kB&#xD;Progress (3): 472 kB | 165 kB | 202 kB    &#xD;Progress (4): 472 kB | 165 kB | 202 kB | 4.1/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 7.7/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 12/153 kB &#xD;Progress (4): 472 kB | 165 kB | 202 kB | 16/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 20/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 24/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 28/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 32/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 36/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 40/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 45/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 49/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 53/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 57/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 61/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 65/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 69/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 73/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 77/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 81/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 86/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 90/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 94/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 98/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 102/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 106/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 110/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 114/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 118/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 122/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 126/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 131/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 135/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 139/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 143/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 147/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 151/153 kB&#xD;Progress (4): 472 kB | 165 kB | 202 kB | 153 kB    &#xD;Progress (5): 472 kB | 165 kB | 202 kB | 153 kB | 4.1/527 kB&#xD;Progress (5): 472 kB | 165 kB | 202 kB | 153 kB | 7.7/527 kB&#xD;Progress (5): 472 kB | 165 kB | 202 kB | 153 kB | 12/527 kB &#xD;                                                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/3.0/maven-model-3.0.jar (165 kB at 4.5 MB/s)&#xA;Progress (4): 472 kB | 202 kB | 153 kB | 15/527 kB&#xD;                                                  &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/3.0/maven-settings-3.0.jar&#xA;Progress (4): 472 kB | 202 kB | 153 kB | 20/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 24/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 28/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 32/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 36/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 40/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 44/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 48/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 52/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 56/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 61/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 65/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 69/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 73/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 77/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 81/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 85/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 89/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 93/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 97/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 102/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 106/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 110/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 114/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 118/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 122/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 126/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 130/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 134/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 138/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 142/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 147/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 151/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 155/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 159/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 163/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 167/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 171/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 175/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 179/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 183/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 188/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 192/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 196/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 200/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 204/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 208/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 212/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 216/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 220/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 224/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 228/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 233/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 237/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 241/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 245/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 249/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 253/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 257/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 261/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 265/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 269/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 274/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 278/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 282/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 286/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 290/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 294/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 298/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 302/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 306/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 310/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 314/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 319/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 323/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 327/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 331/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 335/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 339/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 343/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 347/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 351/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 355/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 360/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 364/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 368/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 372/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 376/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 380/527 kB&#xD;Progress (4): 472 kB | 202 kB | 153 kB | 384/527 kB&#xD;                                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-guice/2.1.7/sisu-guice-2.1.7-noaop.jar (472 kB at 11 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings-builder/3.0/maven-settings-builder-3.0.jar&#xA;Progress (3): 202 kB | 153 kB | 388/527 kB&#xD;Progress (3): 202 kB | 153 kB | 392/527 kB&#xD;Progress (3): 202 kB | 153 kB | 396/527 kB&#xD;Progress (3): 202 kB | 153 kB | 401/527 kB&#xD;Progress (3): 202 kB | 153 kB | 405/527 kB&#xD;Progress (3): 202 kB | 153 kB | 409/527 kB&#xD;Progress (3): 202 kB | 153 kB | 413/527 kB&#xD;Progress (3): 202 kB | 153 kB | 417/527 kB&#xD;Progress (3): 202 kB | 153 kB | 421/527 kB&#xD;Progress (3): 202 kB | 153 kB | 425/527 kB&#xD;Progress (3): 202 kB | 153 kB | 429/527 kB&#xD;Progress (3): 202 kB | 153 kB | 433/527 kB&#xD;Progress (3): 202 kB | 153 kB | 437/527 kB&#xD;Progress (3): 202 kB | 153 kB | 441/527 kB&#xD;Progress (3): 202 kB | 153 kB | 446/527 kB&#xD;Progress (3): 202 kB | 153 kB | 450/527 kB&#xD;Progress (3): 202 kB | 153 kB | 454/527 kB&#xD;Progress (3): 202 kB | 153 kB | 458/527 kB&#xD;Progress (3): 202 kB | 153 kB | 462/527 kB&#xD;Progress (3): 202 kB | 153 kB | 466/527 kB&#xD;Progress (3): 202 kB | 153 kB | 470/527 kB&#xD;Progress (3): 202 kB | 153 kB | 474/527 kB&#xD;Progress (3): 202 kB | 153 kB | 478/527 kB&#xD;Progress (3): 202 kB | 153 kB | 482/527 kB&#xD;Progress (3): 202 kB | 153 kB | 487/527 kB&#xD;Progress (3): 202 kB | 153 kB | 491/527 kB&#xD;Progress (3): 202 kB | 153 kB | 495/527 kB&#xD;Progress (3): 202 kB | 153 kB | 499/527 kB&#xD;Progress (3): 202 kB | 153 kB | 503/527 kB&#xD;Progress (3): 202 kB | 153 kB | 507/527 kB&#xD;Progress (3): 202 kB | 153 kB | 511/527 kB&#xD;Progress (3): 202 kB | 153 kB | 515/527 kB&#xD;Progress (3): 202 kB | 153 kB | 519/527 kB&#xD;Progress (3): 202 kB | 153 kB | 523/527 kB&#xD;Progress (3): 202 kB | 153 kB | 527 kB    &#xD;                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-plexus/1.4.2/sisu-inject-plexus-1.4.2.jar (202 kB at 4.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/3.0/maven-repository-metadata-3.0.jar&#xA;Progress (3): 153 kB | 527 kB | 4.1/47 kB&#xD;Progress (3): 153 kB | 527 kB | 7.7/47 kB&#xD;Progress (3): 153 kB | 527 kB | 12/47 kB &#xD;Progress (3): 153 kB | 527 kB | 16/47 kB&#xD;Progress (3): 153 kB | 527 kB | 20/47 kB&#xD;Progress (3): 153 kB | 527 kB | 24/47 kB&#xD;Progress (3): 153 kB | 527 kB | 28/47 kB&#xD;Progress (3): 153 kB | 527 kB | 32/47 kB&#xD;Progress (3): 153 kB | 527 kB | 36/47 kB&#xD;Progress (3): 153 kB | 527 kB | 40/47 kB&#xD;Progress (3): 153 kB | 527 kB | 45/47 kB&#xD;Progress (3): 153 kB | 527 kB | 47 kB   &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-bean/1.4.2/sisu-inject-bean-1.4.2.jar (153 kB at 2.8 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model-builder/3.0/maven-model-builder-3.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/3.0/maven-core-3.0.jar (527 kB at 9.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-aether-provider/3.0/maven-aether-provider-3.0.jar&#xA;Progress (2): 47 kB | 4.1/38 kB&#xD;Progress (2): 47 kB | 7.7/38 kB&#xD;Progress (2): 47 kB | 12/38 kB &#xD;Progress (2): 47 kB | 16/38 kB&#xD;Progress (2): 47 kB | 20/38 kB&#xD;Progress (2): 47 kB | 24/38 kB&#xD;Progress (2): 47 kB | 28/38 kB&#xD;Progress (2): 47 kB | 32/38 kB&#xD;Progress (2): 47 kB | 36/38 kB&#xD;Progress (2): 47 kB | 38 kB   &#xD;                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/3.0/maven-settings-3.0.jar (47 kB at 697 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-impl/1.7/aether-impl-1.7.jar&#xA;Progress (2): 38 kB | 4.1/51 kB&#xD;Progress (2): 38 kB | 7.7/51 kB&#xD;Progress (2): 38 kB | 12/51 kB &#xD;Progress (2): 38 kB | 15/51 kB&#xD;Progress (2): 38 kB | 20/51 kB&#xD;Progress (2): 38 kB | 24/51 kB&#xD;Progress (2): 38 kB | 28/51 kB&#xD;Progress (2): 38 kB | 32/51 kB&#xD;Progress (2): 38 kB | 36/51 kB&#xD;Progress (2): 38 kB | 40/51 kB&#xD;Progress (2): 38 kB | 44/51 kB&#xD;Progress (2): 38 kB | 48/51 kB&#xD;Progress (2): 38 kB | 51 kB   &#xD;Progress (3): 38 kB | 51 kB | 4.1/30 kB&#xD;Progress (3): 38 kB | 51 kB | 7.7/30 kB&#xD;Progress (3): 38 kB | 51 kB | 12/30 kB &#xD;Progress (3): 38 kB | 51 kB | 16/30 kB&#xD;Progress (3): 38 kB | 51 kB | 20/30 kB&#xD;Progress (3): 38 kB | 51 kB | 24/30 kB&#xD;Progress (3): 38 kB | 51 kB | 28/30 kB&#xD;Progress (3): 38 kB | 51 kB | 30 kB   &#xD;                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings-builder/3.0/maven-settings-builder-3.0.jar (38 kB at 511 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-spi/1.7/aether-spi-1.7.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-aether-provider/3.0/maven-aether-provider-3.0.jar (51 kB at 624 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-api/1.7/aether-api-1.7.jar&#xA;Progress (2): 30 kB | 4.1/106 kB&#xD;Progress (2): 30 kB | 7.7/106 kB&#xD;Progress (3): 30 kB | 7.7/106 kB | 3.2/148 kB&#xD;Progress (3): 30 kB | 12/106 kB | 3.2/148 kB &#xD;Progress (3): 30 kB | 12/106 kB | 7.3/148 kB&#xD;Progress (3): 30 kB | 16/106 kB | 7.3/148 kB&#xD;Progress (3): 30 kB | 16/106 kB | 11/148 kB &#xD;Progress (3): 30 kB | 20/106 kB | 11/148 kB&#xD;Progress (3): 30 kB | 20/106 kB | 15/148 kB&#xD;Progress (3): 30 kB | 24/106 kB | 15/148 kB&#xD;Progress (3): 30 kB | 24/106 kB | 20/148 kB&#xD;Progress (3): 30 kB | 28/106 kB | 20/148 kB&#xD;Progress (3): 30 kB | 28/106 kB | 24/148 kB&#xD;Progress (3): 30 kB | 28/106 kB | 28/148 kB&#xD;Progress (3): 30 kB | 32/106 kB | 28/148 kB&#xD;Progress (3): 30 kB | 36/106 kB | 28/148 kB&#xD;Progress (3): 30 kB | 36/106 kB | 32/148 kB&#xD;Progress (3): 30 kB | 40/106 kB | 32/148 kB&#xD;Progress (3): 30 kB | 40/106 kB | 36/148 kB&#xD;Progress (3): 30 kB | 45/106 kB | 36/148 kB&#xD;Progress (3): 30 kB | 45/106 kB | 40/148 kB&#xD;Progress (3): 30 kB | 49/106 kB | 40/148 kB&#xD;Progress (3): 30 kB | 49/106 kB | 44/148 kB&#xD;Progress (3): 30 kB | 53/106 kB | 44/148 kB&#xD;Progress (3): 30 kB | 57/106 kB | 44/148 kB&#xD;Progress (3): 30 kB | 57/106 kB | 48/148 kB&#xD;Progress (3): 30 kB | 61/106 kB | 48/148 kB&#xD;Progress (3): 30 kB | 61/106 kB | 52/148 kB&#xD;Progress (3): 30 kB | 65/106 kB | 52/148 kB&#xD;Progress (3): 30 kB | 65/106 kB | 56/148 kB&#xD;Progress (3): 30 kB | 69/106 kB | 56/148 kB&#xD;Progress (3): 30 kB | 69/106 kB | 61/148 kB&#xD;Progress (3): 30 kB | 73/106 kB | 61/148 kB&#xD;Progress (3): 30 kB | 73/106 kB | 65/148 kB&#xD;Progress (3): 30 kB | 73/106 kB | 69/148 kB&#xD;Progress (3): 30 kB | 73/106 kB | 73/148 kB&#xD;Progress (3): 30 kB | 73/106 kB | 77/148 kB&#xD;Progress (3): 30 kB | 73/106 kB | 81/148 kB&#xD;Progress (3): 30 kB | 73/106 kB | 85/148 kB&#xD;Progress (3): 30 kB | 73/106 kB | 89/148 kB&#xD;Progress (3): 30 kB | 73/106 kB | 93/148 kB&#xD;Progress (3): 30 kB | 73/106 kB | 97/148 kB&#xD;Progress (3): 30 kB | 73/106 kB | 102/148 kB&#xD;Progress (3): 30 kB | 77/106 kB | 102/148 kB&#xD;Progress (3): 30 kB | 77/106 kB | 106/148 kB&#xD;Progress (3): 30 kB | 81/106 kB | 106/148 kB&#xD;Progress (3): 30 kB | 81/106 kB | 110/148 kB&#xD;Progress (3): 30 kB | 86/106 kB | 110/148 kB&#xD;Progress (3): 30 kB | 90/106 kB | 110/148 kB&#xD;Progress (3): 30 kB | 90/106 kB | 114/148 kB&#xD;Progress (3): 30 kB | 94/106 kB | 114/148 kB&#xD;Progress (3): 30 kB | 94/106 kB | 118/148 kB&#xD;Progress (3): 30 kB | 94/106 kB | 122/148 kB&#xD;Progress (3): 30 kB | 98/106 kB | 122/148 kB&#xD;Progress (3): 30 kB | 98/106 kB | 126/148 kB&#xD;Progress (3): 30 kB | 102/106 kB | 126/148 kB&#xD;Progress (3): 30 kB | 102/106 kB | 130/148 kB&#xD;Progress (3): 30 kB | 106/106 kB | 130/148 kB&#xD;Progress (3): 30 kB | 106/106 kB | 134/148 kB&#xD;Progress (3): 30 kB | 106 kB | 134/148 kB    &#xD;Progress (3): 30 kB | 106 kB | 138/148 kB&#xD;Progress (3): 30 kB | 106 kB | 142/148 kB&#xD;Progress (3): 30 kB | 106 kB | 147/148 kB&#xD;Progress (3): 30 kB | 106 kB | 148 kB    &#xD;Progress (4): 30 kB | 106 kB | 148 kB | 4.1/14 kB&#xD;Progress (4): 30 kB | 106 kB | 148 kB | 7.7/14 kB&#xD;Progress (4): 30 kB | 106 kB | 148 kB | 12/14 kB &#xD;Progress (4): 30 kB | 106 kB | 148 kB | 14 kB   &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/3.0/maven-repository-metadata-3.0.jar (30 kB at 331 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-util/1.7/aether-util-1.7.jar&#xA;Progress (4): 106 kB | 148 kB | 14 kB | 4.1/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 7.7/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 12/74 kB &#xD;Progress (4): 106 kB | 148 kB | 14 kB | 16/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 20/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 24/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 28/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 32/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 36/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 40/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 45/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 49/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 53/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 57/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 61/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 65/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 69/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 73/74 kB&#xD;Progress (4): 106 kB | 148 kB | 14 kB | 74 kB   &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model-builder/3.0/maven-model-builder-3.0.jar (148 kB at 1.5 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.14/plexus-interpolation-1.14.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-spi/1.7/aether-spi-1.7.jar (14 kB at 132 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.3/plexus-classworlds-2.2.3.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-api/1.7/aether-api-1.7.jar (74 kB at 674 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/2.0.0/plexus-component-annotations-2.0.0.jar&#xA;Progress (2): 106 kB | 4.1/108 kB&#xD;Progress (2): 106 kB | 7.7/108 kB&#xD;Progress (2): 106 kB | 12/108 kB &#xD;Progress (2): 106 kB | 16/108 kB&#xD;Progress (2): 106 kB | 20/108 kB&#xD;Progress (2): 106 kB | 24/108 kB&#xD;Progress (2): 106 kB | 28/108 kB&#xD;Progress (2): 106 kB | 32/108 kB&#xD;Progress (2): 106 kB | 36/108 kB&#xD;Progress (2): 106 kB | 40/108 kB&#xD;Progress (2): 106 kB | 45/108 kB&#xD;Progress (2): 106 kB | 49/108 kB&#xD;Progress (2): 106 kB | 53/108 kB&#xD;Progress (2): 106 kB | 57/108 kB&#xD;Progress (2): 106 kB | 61/108 kB&#xD;Progress (2): 106 kB | 65/108 kB&#xD;Progress (2): 106 kB | 69/108 kB&#xD;Progress (2): 106 kB | 73/108 kB&#xD;Progress (2): 106 kB | 77/108 kB&#xD;Progress (2): 106 kB | 81/108 kB&#xD;Progress (2): 106 kB | 86/108 kB&#xD;Progress (2): 106 kB | 90/108 kB&#xD;Progress (2): 106 kB | 94/108 kB&#xD;Progress (2): 106 kB | 98/108 kB&#xD;Progress (2): 106 kB | 102/108 kB&#xD;Progress (2): 106 kB | 106/108 kB&#xD;Progress (2): 106 kB | 108 kB    &#xD;                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-impl/1.7/aether-impl-1.7.jar (106 kB at 908 kB/s)&#xA;Progress (2): 108 kB | 4.1/61 kB&#xD;                                &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-sec-dispatcher/1.3/plexus-sec-dispatcher-1.3.jar&#xA;Progress (2): 108 kB | 7.7/61 kB&#xD;Progress (2): 108 kB | 12/61 kB &#xD;Progress (2): 108 kB | 16/61 kB&#xD;Progress (2): 108 kB | 20/61 kB&#xD;Progress (2): 108 kB | 24/61 kB&#xD;Progress (3): 108 kB | 24/61 kB | 4.1/46 kB&#xD;Progress (3): 108 kB | 24/61 kB | 7.7/46 kB&#xD;Progress (3): 108 kB | 24/61 kB | 12/46 kB &#xD;Progress (3): 108 kB | 24/61 kB | 16/46 kB&#xD;Progress (3): 108 kB | 24/61 kB | 20/46 kB&#xD;Progress (3): 108 kB | 24/61 kB | 24/46 kB&#xD;Progress (3): 108 kB | 28/61 kB | 24/46 kB&#xD;Progress (3): 108 kB | 28/61 kB | 28/46 kB&#xD;Progress (3): 108 kB | 28/61 kB | 32/46 kB&#xD;Progress (3): 108 kB | 28/61 kB | 36/46 kB&#xD;Progress (3): 108 kB | 32/61 kB | 36/46 kB&#xD;Progress (3): 108 kB | 32/61 kB | 40/46 kB&#xD;Progress (3): 108 kB | 36/61 kB | 40/46 kB&#xD;Progress (3): 108 kB | 36/61 kB | 45/46 kB&#xD;Progress (3): 108 kB | 36/61 kB | 46 kB   &#xD;Progress (3): 108 kB | 40/61 kB | 46 kB&#xD;Progress (3): 108 kB | 45/61 kB | 46 kB&#xD;Progress (3): 108 kB | 49/61 kB | 46 kB&#xD;Progress (3): 108 kB | 53/61 kB | 46 kB&#xD;Progress (3): 108 kB | 57/61 kB | 46 kB&#xD;Progress (3): 108 kB | 61/61 kB | 46 kB&#xD;Progress (3): 108 kB | 61 kB | 46 kB   &#xD;Progress (4): 108 kB | 61 kB | 46 kB | 4.1/4.2 kB&#xD;Progress (4): 108 kB | 61 kB | 46 kB | 4.2 kB    &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.14/plexus-interpolation-1.14.jar (61 kB at 463 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.3/plexus-classworlds-2.2.3.jar (46 kB at 349 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-cipher/1.4/plexus-cipher-1.4.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/3.0/maven-artifact-3.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-util/1.7/aether-util-1.7.jar (108 kB at 812 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.3.0/plexus-utils-3.3.0.jar&#xA;Progress (2): 4.2 kB | 4.1/29 kB&#xD;Progress (2): 4.2 kB | 7.7/29 kB&#xD;Progress (2): 4.2 kB | 12/29 kB &#xD;Progress (2): 4.2 kB | 15/29 kB&#xD;Progress (2): 4.2 kB | 20/29 kB&#xD;Progress (2): 4.2 kB | 24/29 kB&#xD;Progress (2): 4.2 kB | 28/29 kB&#xD;Progress (2): 4.2 kB | 29 kB   &#xD;                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-sec-dispatcher/1.3/plexus-sec-dispatcher-1.3.jar (29 kB at 167 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-artifact-transfer/0.12.0/maven-artifact-transfer-0.12.0.jar&#xA;Progress (2): 4.2 kB | 4.1/120 kB&#xD;Progress (2): 4.2 kB | 7.7/120 kB&#xD;Progress (2): 4.2 kB | 11/120 kB &#xD;Progress (2): 4.2 kB | 15/120 kB&#xD;Progress (2): 4.2 kB | 20/120 kB&#xD;Progress (2): 4.2 kB | 24/120 kB&#xD;Progress (2): 4.2 kB | 28/120 kB&#xD;Progress (2): 4.2 kB | 32/120 kB&#xD;Progress (2): 4.2 kB | 36/120 kB&#xD;Progress (2): 4.2 kB | 40/120 kB&#xD;Progress (2): 4.2 kB | 44/120 kB&#xD;Progress (2): 4.2 kB | 48/120 kB&#xD;Progress (2): 4.2 kB | 52/120 kB&#xD;Progress (2): 4.2 kB | 56/120 kB&#xD;Progress (2): 4.2 kB | 61/120 kB&#xD;Progress (2): 4.2 kB | 65/120 kB&#xD;Progress (2): 4.2 kB | 69/120 kB&#xD;Progress (2): 4.2 kB | 73/120 kB&#xD;Progress (2): 4.2 kB | 77/120 kB&#xD;Progress (2): 4.2 kB | 81/120 kB&#xD;Progress (2): 4.2 kB | 85/120 kB&#xD;Progress (2): 4.2 kB | 89/120 kB&#xD;Progress (2): 4.2 kB | 93/120 kB&#xD;Progress (2): 4.2 kB | 97/120 kB&#xD;Progress (2): 4.2 kB | 102/120 kB&#xD;Progress (2): 4.2 kB | 106/120 kB&#xD;Progress (2): 4.2 kB | 110/120 kB&#xD;Progress (2): 4.2 kB | 114/120 kB&#xD;Progress (2): 4.2 kB | 118/120 kB&#xD;Progress (2): 4.2 kB | 120 kB    &#xD;                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/2.0.0/plexus-component-annotations-2.0.0.jar (4.2 kB at 19 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/3.0.1/maven-common-artifact-filters-3.0.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-artifact-transfer/0.12.0/maven-artifact-transfer-0.12.0.jar (120 kB at 547 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/3.1.0/maven-shared-utils-3.1.0.jar&#xA;Progress (1): 4.1/52 kB&#xD;Progress (1): 7.7/52 kB&#xD;Progress (1): 11/52 kB &#xD;Progress (1): 15/52 kB&#xD;Progress (1): 20/52 kB&#xD;Progress (1): 24/52 kB&#xD;Progress (1): 28/52 kB&#xD;Progress (1): 32/52 kB&#xD;Progress (1): 36/52 kB&#xD;Progress (1): 40/52 kB&#xD;Progress (1): 44/52 kB&#xD;Progress (1): 48/52 kB&#xD;Progress (1): 52 kB   &#xD;Progress (2): 52 kB | 4.1/263 kB&#xD;Progress (2): 52 kB | 7.7/263 kB&#xD;Progress (2): 52 kB | 12/263 kB &#xD;Progress (2): 52 kB | 16/263 kB&#xD;Progress (2): 52 kB | 20/263 kB&#xD;Progress (2): 52 kB | 24/263 kB&#xD;Progress (2): 52 kB | 28/263 kB&#xD;Progress (2): 52 kB | 32/263 kB&#xD;Progress (2): 52 kB | 36/263 kB&#xD;Progress (2): 52 kB | 40/263 kB&#xD;Progress (2): 52 kB | 45/263 kB&#xD;Progress (2): 52 kB | 49/263 kB&#xD;Progress (2): 52 kB | 53/263 kB&#xD;Progress (2): 52 kB | 57/263 kB&#xD;Progress (2): 52 kB | 61/263 kB&#xD;Progress (2): 52 kB | 65/263 kB&#xD;Progress (3): 52 kB | 65/263 kB | 4.1/61 kB&#xD;Progress (3): 52 kB | 65/263 kB | 7.7/61 kB&#xD;Progress (3): 52 kB | 65/263 kB | 12/61 kB &#xD;Progress (3): 52 kB | 65/263 kB | 16/61 kB&#xD;Progress (3): 52 kB | 65/263 kB | 20/61 kB&#xD;Progress (3): 52 kB | 65/263 kB | 24/61 kB&#xD;Progress (3): 52 kB | 65/263 kB | 28/61 kB&#xD;Progress (3): 52 kB | 65/263 kB | 32/61 kB&#xD;Progress (3): 52 kB | 65/263 kB | 36/61 kB&#xD;Progress (3): 52 kB | 65/263 kB | 40/61 kB&#xD;Progress (3): 52 kB | 65/263 kB | 45/61 kB&#xD;Progress (3): 52 kB | 65/263 kB | 49/61 kB&#xD;Progress (3): 52 kB | 69/263 kB | 49/61 kB&#xD;Progress (3): 52 kB | 69/263 kB | 53/61 kB&#xD;Progress (3): 52 kB | 73/263 kB | 53/61 kB&#xD;Progress (3): 52 kB | 73/263 kB | 57/61 kB&#xD;Progress (3): 52 kB | 77/263 kB | 57/61 kB&#xD;Progress (3): 52 kB | 77/263 kB | 61/61 kB&#xD;Progress (3): 52 kB | 81/263 kB | 61/61 kB&#xD;Progress (3): 52 kB | 81/263 kB | 61 kB   &#xD;Progress (3): 52 kB | 86/263 kB | 61 kB&#xD;Progress (3): 52 kB | 90/263 kB | 61 kB&#xD;Progress (3): 52 kB | 94/263 kB | 61 kB&#xD;Progress (3): 52 kB | 98/263 kB | 61 kB&#xD;Progress (3): 52 kB | 102/263 kB | 61 kB&#xD;Progress (3): 52 kB | 106/263 kB | 61 kB&#xD;Progress (3): 52 kB | 110/263 kB | 61 kB&#xD;Progress (3): 52 kB | 114/263 kB | 61 kB&#xD;Progress (3): 52 kB | 118/263 kB | 61 kB&#xD;Progress (3): 52 kB | 122/263 kB | 61 kB&#xD;Progress (3): 52 kB | 126/263 kB | 61 kB&#xD;Progress (3): 52 kB | 131/263 kB | 61 kB&#xD;Progress (3): 52 kB | 135/263 kB | 61 kB&#xD;Progress (3): 52 kB | 139/263 kB | 61 kB&#xD;Progress (3): 52 kB | 143/263 kB | 61 kB&#xD;Progress (3): 52 kB | 147/263 kB | 61 kB&#xD;Progress (3): 52 kB | 151/263 kB | 61 kB&#xD;Progress (3): 52 kB | 155/263 kB | 61 kB&#xD;Progress (3): 52 kB | 159/263 kB | 61 kB&#xD;Progress (3): 52 kB | 163/263 kB | 61 kB&#xD;Progress (3): 52 kB | 167/263 kB | 61 kB&#xD;Progress (3): 52 kB | 172/263 kB | 61 kB&#xD;Progress (3): 52 kB | 176/263 kB | 61 kB&#xD;Progress (3): 52 kB | 180/263 kB | 61 kB&#xD;Progress (3): 52 kB | 184/263 kB | 61 kB&#xD;Progress (3): 52 kB | 188/263 kB | 61 kB&#xD;Progress (3): 52 kB | 192/263 kB | 61 kB&#xD;Progress (3): 52 kB | 196/263 kB | 61 kB&#xD;Progress (3): 52 kB | 200/263 kB | 61 kB&#xD;Progress (3): 52 kB | 204/263 kB | 61 kB&#xD;Progress (3): 52 kB | 208/263 kB | 61 kB&#xD;Progress (3): 52 kB | 213/263 kB | 61 kB&#xD;Progress (3): 52 kB | 217/263 kB | 61 kB&#xD;Progress (3): 52 kB | 221/263 kB | 61 kB&#xD;Progress (3): 52 kB | 225/263 kB | 61 kB&#xD;Progress (3): 52 kB | 229/263 kB | 61 kB&#xD;Progress (3): 52 kB | 233/263 kB | 61 kB&#xD;Progress (3): 52 kB | 237/263 kB | 61 kB&#xD;Progress (3): 52 kB | 241/263 kB | 61 kB&#xD;Progress (3): 52 kB | 245/263 kB | 61 kB&#xD;Progress (3): 52 kB | 249/263 kB | 61 kB&#xD;Progress (3): 52 kB | 253/263 kB | 61 kB&#xD;Progress (3): 52 kB | 258/263 kB | 61 kB&#xD;Progress (3): 52 kB | 262/263 kB | 61 kB&#xD;Progress (3): 52 kB | 263 kB | 61 kB    &#xD;Progress (4): 52 kB | 263 kB | 61 kB | 4.1/13 kB&#xD;Progress (4): 52 kB | 263 kB | 61 kB | 7.7/13 kB&#xD;Progress (4): 52 kB | 263 kB | 61 kB | 12/13 kB &#xD;Progress (4): 52 kB | 263 kB | 61 kB | 13 kB   &#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 4.1/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 7.7/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 12/164 kB &#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 16/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 20/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 24/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 28/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 32/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 36/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 40/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 45/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 49/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 53/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 57/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 61/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 65/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 69/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 73/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 77/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 81/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 86/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 90/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 94/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 98/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 102/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 106/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 110/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 114/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 118/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 122/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 126/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 131/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 135/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 139/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 143/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 147/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 151/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 155/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 159/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 163/164 kB&#xD;Progress (5): 52 kB | 263 kB | 61 kB | 13 kB | 164 kB    &#xD;                                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/3.0/maven-artifact-3.0.jar (52 kB at 211 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-codec/commons-codec/1.11/commons-codec-1.11.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/3.0.1/maven-common-artifact-filters-3.0.1.jar (61 kB at 244 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.5/slf4j-api-1.7.5.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.3.0/plexus-utils-3.3.0.jar (263 kB at 1.0 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm/8.0/asm-8.0.jar&#xA;Progress (3): 13 kB | 164 kB | 4.1/335 kB&#xD;Progress (3): 13 kB | 164 kB | 7.7/335 kB&#xD;Progress (3): 13 kB | 164 kB | 12/335 kB &#xD;Progress (3): 13 kB | 164 kB | 16/335 kB&#xD;                                        &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-cipher/1.4/plexus-cipher-1.4.jar (13 kB at 52 kB/s)&#xA;Progress (2): 164 kB | 20/335 kB&#xD;                                &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-commons/8.0/asm-commons-8.0.jar&#xA;Progress (2): 164 kB | 24/335 kB&#xD;Progress (2): 164 kB | 28/335 kB&#xD;Progress (2): 164 kB | 32/335 kB&#xD;Progress (2): 164 kB | 36/335 kB&#xD;Progress (2): 164 kB | 40/335 kB&#xD;Progress (2): 164 kB | 45/335 kB&#xD;Progress (2): 164 kB | 49/335 kB&#xD;Progress (2): 164 kB | 53/335 kB&#xD;Progress (2): 164 kB | 57/335 kB&#xD;Progress (2): 164 kB | 61/335 kB&#xD;Progress (2): 164 kB | 65/335 kB&#xD;Progress (2): 164 kB | 69/335 kB&#xD;Progress (2): 164 kB | 73/335 kB&#xD;Progress (2): 164 kB | 77/335 kB&#xD;Progress (2): 164 kB | 81/335 kB&#xD;Progress (2): 164 kB | 86/335 kB&#xD;Progress (2): 164 kB | 90/335 kB&#xD;Progress (2): 164 kB | 94/335 kB&#xD;Progress (2): 164 kB | 98/335 kB&#xD;Progress (2): 164 kB | 102/335 kB&#xD;Progress (2): 164 kB | 106/335 kB&#xD;Progress (2): 164 kB | 110/335 kB&#xD;Progress (2): 164 kB | 114/335 kB&#xD;Progress (2): 164 kB | 118/335 kB&#xD;Progress (2): 164 kB | 122/335 kB&#xD;Progress (2): 164 kB | 126/335 kB&#xD;Progress (2): 164 kB | 131/335 kB&#xD;Progress (2): 164 kB | 135/335 kB&#xD;Progress (2): 164 kB | 139/335 kB&#xD;Progress (2): 164 kB | 143/335 kB&#xD;Progress (2): 164 kB | 147/335 kB&#xD;Progress (2): 164 kB | 151/335 kB&#xD;Progress (2): 164 kB | 155/335 kB&#xD;Progress (2): 164 kB | 159/335 kB&#xD;Progress (2): 164 kB | 163/335 kB&#xD;Progress (2): 164 kB | 167/335 kB&#xD;Progress (2): 164 kB | 172/335 kB&#xD;Progress (2): 164 kB | 176/335 kB&#xD;Progress (2): 164 kB | 180/335 kB&#xD;Progress (2): 164 kB | 184/335 kB&#xD;Progress (2): 164 kB | 188/335 kB&#xD;Progress (2): 164 kB | 192/335 kB&#xD;Progress (2): 164 kB | 196/335 kB&#xD;Progress (2): 164 kB | 200/335 kB&#xD;Progress (2): 164 kB | 204/335 kB&#xD;Progress (2): 164 kB | 208/335 kB&#xD;Progress (2): 164 kB | 213/335 kB&#xD;Progress (2): 164 kB | 217/335 kB&#xD;Progress (2): 164 kB | 221/335 kB&#xD;Progress (2): 164 kB | 225/335 kB&#xD;Progress (2): 164 kB | 229/335 kB&#xD;Progress (2): 164 kB | 233/335 kB&#xD;Progress (2): 164 kB | 237/335 kB&#xD;Progress (2): 164 kB | 241/335 kB&#xD;Progress (2): 164 kB | 245/335 kB&#xD;Progress (2): 164 kB | 249/335 kB&#xD;Progress (2): 164 kB | 253/335 kB&#xD;Progress (2): 164 kB | 258/335 kB&#xD;Progress (2): 164 kB | 262/335 kB&#xD;Progress (2): 164 kB | 266/335 kB&#xD;Progress (2): 164 kB | 270/335 kB&#xD;Progress (2): 164 kB | 274/335 kB&#xD;Progress (2): 164 kB | 278/335 kB&#xD;Progress (2): 164 kB | 282/335 kB&#xD;Progress (2): 164 kB | 286/335 kB&#xD;Progress (2): 164 kB | 290/335 kB&#xD;Progress (3): 164 kB | 290/335 kB | 4.1/122 kB&#xD;Progress (3): 164 kB | 294/335 kB | 4.1/122 kB&#xD;Progress (3): 164 kB | 294/335 kB | 7.7/122 kB&#xD;                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/3.1.0/maven-shared-utils-3.1.0.jar (164 kB at 618 kB/s)&#xA;Progress (2): 299/335 kB | 7.7/122 kB&#xD;                                     &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-tree/8.0/asm-tree-8.0.jar&#xA;Progress (2): 303/335 kB | 7.7/122 kB&#xD;Progress (2): 303/335 kB | 12/122 kB &#xD;Progress (2): 303/335 kB | 16/122 kB&#xD;Progress (2): 307/335 kB | 16/122 kB&#xD;Progress (2): 307/335 kB | 20/122 kB&#xD;Progress (2): 311/335 kB | 20/122 kB&#xD;Progress (2): 315/335 kB | 20/122 kB&#xD;Progress (2): 315/335 kB | 24/122 kB&#xD;Progress (2): 319/335 kB | 24/122 kB&#xD;Progress (2): 319/335 kB | 28/122 kB&#xD;Progress (2): 323/335 kB | 28/122 kB&#xD;Progress (2): 323/335 kB | 32/122 kB&#xD;Progress (2): 327/335 kB | 32/122 kB&#xD;Progress (2): 327/335 kB | 36/122 kB&#xD;Progress (2): 331/335 kB | 36/122 kB&#xD;Progress (2): 331/335 kB | 40/122 kB&#xD;Progress (3): 331/335 kB | 40/122 kB | 4.1/26 kB&#xD;Progress (3): 335 kB | 40/122 kB | 4.1/26 kB    &#xD;Progress (3): 335 kB | 45/122 kB | 4.1/26 kB&#xD;Progress (3): 335 kB | 45/122 kB | 7.7/26 kB&#xD;Progress (3): 335 kB | 49/122 kB | 7.7/26 kB&#xD;Progress (3): 335 kB | 53/122 kB | 7.7/26 kB&#xD;Progress (3): 335 kB | 53/122 kB | 12/26 kB &#xD;Progress (3): 335 kB | 57/122 kB | 12/26 kB&#xD;Progress (3): 335 kB | 57/122 kB | 16/26 kB&#xD;Progress (3): 335 kB | 61/122 kB | 16/26 kB&#xD;Progress (3): 335 kB | 61/122 kB | 20/26 kB&#xD;Progress (3): 335 kB | 61/122 kB | 24/26 kB&#xD;Progress (3): 335 kB | 65/122 kB | 24/26 kB&#xD;Progress (3): 335 kB | 65/122 kB | 26 kB   &#xD;Progress (3): 335 kB | 69/122 kB | 26 kB&#xD;Progress (3): 335 kB | 73/122 kB | 26 kB&#xD;Progress (3): 335 kB | 77/122 kB | 26 kB&#xD;Progress (3): 335 kB | 81/122 kB | 26 kB&#xD;Progress (3): 335 kB | 86/122 kB | 26 kB&#xD;Progress (3): 335 kB | 90/122 kB | 26 kB&#xD;Progress (3): 335 kB | 94/122 kB | 26 kB&#xD;Progress (3): 335 kB | 98/122 kB | 26 kB&#xD;Progress (3): 335 kB | 102/122 kB | 26 kB&#xD;Progress (3): 335 kB | 106/122 kB | 26 kB&#xD;Progress (3): 335 kB | 110/122 kB | 26 kB&#xD;Progress (3): 335 kB | 114/122 kB | 26 kB&#xD;Progress (3): 335 kB | 118/122 kB | 26 kB&#xD;Progress (3): 335 kB | 122 kB | 26 kB    &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm/8.0/asm-8.0.jar (122 kB at 439 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-analysis/8.0/asm-analysis-8.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/commons-codec/commons-codec/1.11/commons-codec-1.11.jar (335 kB at 1.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.5/slf4j-api-1.7.5.jar (26 kB at 93 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-dependency-tree/3.0.1/maven-dependency-tree-3.0.1.jar&#xA;Progress (1): 4.1/72 kB&#xD;Progress (1): 7.7/72 kB&#xD;Progress (1): 12/72 kB &#xD;Progress (1): 16/72 kB&#xD;Progress (1): 20/72 kB&#xD;Progress (1): 24/72 kB&#xD;Progress (1): 28/72 kB&#xD;Progress (1): 32/72 kB&#xD;Progress (1): 36/72 kB&#xD;Progress (1): 40/72 kB&#xD;Progress (1): 45/72 kB&#xD;Progress (1): 49/72 kB&#xD;Progress (1): 53/72 kB&#xD;Progress (1): 57/72 kB&#xD;Progress (1): 61/72 kB&#xD;Progress (1): 65/72 kB&#xD;Progress (1): 69/72 kB&#xD;Progress (1): 72 kB   &#xD;Progress (2): 72 kB | 4.1/53 kB&#xD;Progress (2): 72 kB | 7.7/53 kB&#xD;Progress (2): 72 kB | 12/53 kB &#xD;Progress (2): 72 kB | 16/53 kB&#xD;Progress (2): 72 kB | 20/53 kB&#xD;Progress (2): 72 kB | 24/53 kB&#xD;Progress (2): 72 kB | 28/53 kB&#xD;Progress (3): 72 kB | 28/53 kB | 4.1/33 kB&#xD;Progress (3): 72 kB | 32/53 kB | 4.1/33 kB&#xD;Progress (3): 72 kB | 32/53 kB | 7.7/33 kB&#xD;Progress (3): 72 kB | 32/53 kB | 11/33 kB &#xD;Progress (3): 72 kB | 36/53 kB | 11/33 kB&#xD;Progress (3): 72 kB | 40/53 kB | 11/33 kB&#xD;Progress (3): 72 kB | 40/53 kB | 15/33 kB&#xD;Progress (3): 72 kB | 45/53 kB | 15/33 kB&#xD;Progress (3): 72 kB | 45/53 kB | 20/33 kB&#xD;Progress (3): 72 kB | 49/53 kB | 20/33 kB&#xD;Progress (3): 72 kB | 49/53 kB | 24/33 kB&#xD;Progress (3): 72 kB | 53 kB | 24/33 kB   &#xD;Progress (3): 72 kB | 53 kB | 28/33 kB&#xD;Progress (3): 72 kB | 53 kB | 32/33 kB&#xD;Progress (3): 72 kB | 53 kB | 33 kB   &#xD;Progress (4): 72 kB | 53 kB | 33 kB | 3.2/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 7.3/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 11/305 kB &#xD;Progress (4): 72 kB | 53 kB | 33 kB | 15/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 20/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 24/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 28/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 32/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 36/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 40/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 44/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 48/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 52/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 56/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 61/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 65/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 69/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 73/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 77/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 81/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 85/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 89/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 93/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 97/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 102/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 106/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 110/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 114/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 118/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 122/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 126/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 130/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 134/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 138/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 142/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 147/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 151/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 155/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 159/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 163/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 167/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 171/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 175/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 179/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 183/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 188/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 192/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 196/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 200/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 204/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 208/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 212/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 216/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 220/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 224/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 228/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 233/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 237/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 241/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 245/305 kB&#xD;Progress (4): 72 kB | 53 kB | 33 kB | 249/305 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 249/305 kB | 4.1/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 253/305 kB | 4.1/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 253/305 kB | 7.7/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 257/305 kB | 7.7/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 257/305 kB | 12/37 kB &#xD;Progress (5): 72 kB | 53 kB | 33 kB | 257/305 kB | 15/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 261/305 kB | 15/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 265/305 kB | 15/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 265/305 kB | 20/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 269/305 kB | 20/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 269/305 kB | 24/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 274/305 kB | 24/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 274/305 kB | 28/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 274/305 kB | 32/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 278/305 kB | 32/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 278/305 kB | 36/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 282/305 kB | 36/37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 282/305 kB | 37 kB   &#xD;Progress (5): 72 kB | 53 kB | 33 kB | 286/305 kB | 37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 290/305 kB | 37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 294/305 kB | 37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 298/305 kB | 37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 302/305 kB | 37 kB&#xD;Progress (5): 72 kB | 53 kB | 33 kB | 305 kB | 37 kB    &#xD;                                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-tree/8.0/asm-tree-8.0.jar (53 kB at 175 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether-util/0.9.0.M2/aether-util-0.9.0.M2.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-commons/8.0/asm-commons-8.0.jar (72 kB at 236 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.6/commons-io-2.6.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-dependency-tree/3.0.1/maven-dependency-tree-3.0.1.jar (37 kB at 119 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/vafer/jdependency/2.4.0/jdependency-2.4.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar (305 kB at 987 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-util/8.0/asm-util-8.0.jar&#xA;Progress (2): 33 kB | 4.1/134 kB&#xD;Progress (2): 33 kB | 7.7/134 kB&#xD;Progress (2): 33 kB | 12/134 kB &#xD;Progress (2): 33 kB | 16/134 kB&#xD;Progress (2): 33 kB | 20/134 kB&#xD;Progress (2): 33 kB | 24/134 kB&#xD;Progress (2): 33 kB | 28/134 kB&#xD;Progress (2): 33 kB | 32/134 kB&#xD;Progress (2): 33 kB | 36/134 kB&#xD;Progress (2): 33 kB | 40/134 kB&#xD;Progress (2): 33 kB | 45/134 kB&#xD;Progress (2): 33 kB | 49/134 kB&#xD;Progress (2): 33 kB | 53/134 kB&#xD;Progress (2): 33 kB | 57/134 kB&#xD;Progress (2): 33 kB | 61/134 kB&#xD;Progress (2): 33 kB | 65/134 kB&#xD;Progress (2): 33 kB | 69/134 kB&#xD;Progress (2): 33 kB | 73/134 kB&#xD;Progress (2): 33 kB | 77/134 kB&#xD;Progress (2): 33 kB | 81/134 kB&#xD;Progress (2): 33 kB | 86/134 kB&#xD;Progress (2): 33 kB | 90/134 kB&#xD;Progress (2): 33 kB | 94/134 kB&#xD;Progress (2): 33 kB | 98/134 kB&#xD;Progress (2): 33 kB | 102/134 kB&#xD;Progress (2): 33 kB | 106/134 kB&#xD;Progress (2): 33 kB | 110/134 kB&#xD;Progress (2): 33 kB | 114/134 kB&#xD;Progress (2): 33 kB | 118/134 kB&#xD;Progress (2): 33 kB | 122/134 kB&#xD;Progress (2): 33 kB | 126/134 kB&#xD;Progress (2): 33 kB | 131/134 kB&#xD;Progress (2): 33 kB | 134 kB    &#xD;                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-analysis/8.0/asm-analysis-8.0.jar (33 kB at 104 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/guava/28.2-android/guava-28.2-android.jar&#xA;Progress (2): 134 kB | 4.1/180 kB&#xD;Progress (2): 134 kB | 7.7/180 kB&#xD;Progress (2): 134 kB | 12/180 kB &#xD;Progress (2): 134 kB | 16/180 kB&#xD;Progress (2): 134 kB | 20/180 kB&#xD;Progress (2): 134 kB | 24/180 kB&#xD;Progress (2): 134 kB | 28/180 kB&#xD;Progress (2): 134 kB | 32/180 kB&#xD;Progress (2): 134 kB | 36/180 kB&#xD;Progress (2): 134 kB | 40/180 kB&#xD;Progress (2): 134 kB | 45/180 kB&#xD;Progress (2): 134 kB | 49/180 kB&#xD;Progress (2): 134 kB | 53/180 kB&#xD;Progress (2): 134 kB | 57/180 kB&#xD;Progress (2): 134 kB | 61/180 kB&#xD;Progress (2): 134 kB | 65/180 kB&#xD;Progress (2): 134 kB | 69/180 kB&#xD;Progress (2): 134 kB | 73/180 kB&#xD;Progress (2): 134 kB | 77/180 kB&#xD;Progress (2): 134 kB | 81/180 kB&#xD;Progress (2): 134 kB | 86/180 kB&#xD;Progress (2): 134 kB | 90/180 kB&#xD;Progress (2): 134 kB | 94/180 kB&#xD;Progress (2): 134 kB | 98/180 kB&#xD;Progress (2): 134 kB | 102/180 kB&#xD;Progress (2): 134 kB | 106/180 kB&#xD;Progress (2): 134 kB | 110/180 kB&#xD;Progress (2): 134 kB | 114/180 kB&#xD;Progress (2): 134 kB | 118/180 kB&#xD;Progress (2): 134 kB | 122/180 kB&#xD;Progress (2): 134 kB | 126/180 kB&#xD;Progress (2): 134 kB | 131/180 kB&#xD;Progress (2): 134 kB | 135/180 kB&#xD;Progress (2): 134 kB | 139/180 kB&#xD;Progress (2): 134 kB | 143/180 kB&#xD;Progress (2): 134 kB | 147/180 kB&#xD;Progress (2): 134 kB | 151/180 kB&#xD;Progress (2): 134 kB | 155/180 kB&#xD;Progress (2): 134 kB | 159/180 kB&#xD;Progress (2): 134 kB | 163/180 kB&#xD;Progress (2): 134 kB | 167/180 kB&#xD;Progress (2): 134 kB | 172/180 kB&#xD;Progress (2): 134 kB | 176/180 kB&#xD;Progress (2): 134 kB | 180/180 kB&#xD;Progress (2): 134 kB | 180 kB    &#xD;Progress (3): 134 kB | 180 kB | 4.1/215 kB&#xD;Progress (4): 134 kB | 180 kB | 4.1/215 kB | 3.2/85 kB&#xD;Progress (4): 134 kB | 180 kB | 7.7/215 kB | 3.2/85 kB&#xD;Progress (4): 134 kB | 180 kB | 12/215 kB | 3.2/85 kB &#xD;Progress (4): 134 kB | 180 kB | 16/215 kB | 3.2/85 kB&#xD;Progress (4): 134 kB | 180 kB | 16/215 kB | 7.3/85 kB&#xD;Progress (4): 134 kB | 180 kB | 16/215 kB | 11/85 kB &#xD;Progress (4): 134 kB | 180 kB | 20/215 kB | 11/85 kB&#xD;Progress (4): 134 kB | 180 kB | 20/215 kB | 15/85 kB&#xD;Progress (4): 134 kB | 180 kB | 24/215 kB | 15/85 kB&#xD;Progress (4): 134 kB | 180 kB | 24/215 kB | 20/85 kB&#xD;Progress (4): 134 kB | 180 kB | 28/215 kB | 20/85 kB&#xD;Progress (4): 134 kB | 180 kB | 32/215 kB | 20/85 kB&#xD;Progress (4): 134 kB | 180 kB | 32/215 kB | 24/85 kB&#xD;Progress (4): 134 kB | 180 kB | 32/215 kB | 28/85 kB&#xD;Progress (4): 134 kB | 180 kB | 36/215 kB | 28/85 kB&#xD;Progress (4): 134 kB | 180 kB | 36/215 kB | 32/85 kB&#xD;Progress (4): 134 kB | 180 kB | 40/215 kB | 32/85 kB&#xD;Progress (4): 134 kB | 180 kB | 40/215 kB | 36/85 kB&#xD;Progress (4): 134 kB | 180 kB | 45/215 kB | 36/85 kB&#xD;Progress (4): 134 kB | 180 kB | 45/215 kB | 40/85 kB&#xD;Progress (4): 134 kB | 180 kB | 49/215 kB | 40/85 kB&#xD;Progress (4): 134 kB | 180 kB | 49/215 kB | 44/85 kB&#xD;Progress (4): 134 kB | 180 kB | 53/215 kB | 44/85 kB&#xD;Progress (4): 134 kB | 180 kB | 53/215 kB | 48/85 kB&#xD;Progress (4): 134 kB | 180 kB | 57/215 kB | 48/85 kB&#xD;Progress (4): 134 kB | 180 kB | 57/215 kB | 52/85 kB&#xD;Progress (4): 134 kB | 180 kB | 61/215 kB | 52/85 kB&#xD;Progress (4): 134 kB | 180 kB | 61/215 kB | 56/85 kB&#xD;Progress (4): 134 kB | 180 kB | 65/215 kB | 56/85 kB&#xD;Progress (4): 134 kB | 180 kB | 65/215 kB | 61/85 kB&#xD;Progress (4): 134 kB | 180 kB | 69/215 kB | 61/85 kB&#xD;Progress (4): 134 kB | 180 kB | 69/215 kB | 65/85 kB&#xD;Progress (4): 134 kB | 180 kB | 73/215 kB | 65/85 kB&#xD;Progress (4): 134 kB | 180 kB | 73/215 kB | 69/85 kB&#xD;Progress (4): 134 kB | 180 kB | 77/215 kB | 69/85 kB&#xD;Progress (4): 134 kB | 180 kB | 77/215 kB | 73/85 kB&#xD;Progress (4): 134 kB | 180 kB | 81/215 kB | 73/85 kB&#xD;Progress (4): 134 kB | 180 kB | 81/215 kB | 77/85 kB&#xD;Progress (4): 134 kB | 180 kB | 86/215 kB | 77/85 kB&#xD;Progress (4): 134 kB | 180 kB | 86/215 kB | 81/85 kB&#xD;Progress (4): 134 kB | 180 kB | 90/215 kB | 81/85 kB&#xD;Progress (4): 134 kB | 180 kB | 90/215 kB | 85 kB   &#xD;Progress (4): 134 kB | 180 kB | 94/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 98/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 102/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 106/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 110/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 114/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 118/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 122/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 126/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 131/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 135/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 139/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 143/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 147/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 151/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 155/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 159/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 163/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 167/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 172/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 176/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 180/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 184/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 188/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 192/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 196/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 200/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 204/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 208/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 212/215 kB | 85 kB&#xD;Progress (4): 134 kB | 180 kB | 215 kB | 85 kB    &#xD;                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether-util/0.9.0.M2/aether-util-0.9.0.M2.jar (134 kB at 405 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/failureaccess/1.0.1/failureaccess-1.0.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/vafer/jdependency/2.4.0/jdependency-2.4.0.jar (180 kB at 531 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/listenablefuture/9999.0-empty-to-avoid-conflict-with-guava/listenablefuture-9999.0-empty-to-avoid-conflict-with-guava.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-util/8.0/asm-util-8.0.jar (85 kB at 249 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.jar&#xA;Progress (2): 215 kB | 0/2.6 MB&#xD;Progress (2): 215 kB | 0/2.6 MB&#xD;Progress (2): 215 kB | 0/2.6 MB&#xD;Progress (2): 215 kB | 0.1/2.6 MB&#xD;Progress (2): 215 kB | 0.1/2.6 MB&#xD;Progress (2): 215 kB | 0.1/2.6 MB&#xD;Progress (2): 215 kB | 0.1/2.6 MB&#xD;Progress (2): 215 kB | 0.1/2.6 MB&#xD;Progress (2): 215 kB | 0.1/2.6 MB&#xD;Progress (2): 215 kB | 0.2/2.6 MB&#xD;Progress (2): 215 kB | 0.2/2.6 MB&#xD;Progress (2): 215 kB | 0.2/2.6 MB&#xD;Progress (2): 215 kB | 0.2/2.6 MB&#xD;Progress (2): 215 kB | 0.2/2.6 MB&#xD;Progress (3): 215 kB | 0.2/2.6 MB | 4.1/4.6 kB&#xD;Progress (3): 215 kB | 0.2/2.6 MB | 4.1/4.6 kB&#xD;Progress (3): 215 kB | 0.2/2.6 MB | 4.6 kB    &#xD;Progress (3): 215 kB | 0.3/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.3/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.3/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.3/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.3/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.3/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.4/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.4/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.4/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.4/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.4/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.4/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.5/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.5/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.5/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.5/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.5/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.5/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.6/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.6/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.6/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.6/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.6/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.6/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.7/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.7/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.7/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.7/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.7/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.7/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.8/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.8/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.8/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.8/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.8/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.8/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.9/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.9/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.9/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.9/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.9/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 0.9/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.0/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.0/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.0/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.0/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.0/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.0/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.0/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.1/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.1/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.1/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.1/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.1/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.1/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.2/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.2/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.2/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.2/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.2/2.6 MB | 4.6 kB&#xD;Progress (3): 215 kB | 1.2/2.6 MB | 4.6 kB&#xD;Progress (4): 215 kB | 1.2/2.6 MB | 4.6 kB | 4.1/20 kB&#xD;Progress (4): 215 kB | 1.3/2.6 MB | 4.6 kB | 4.1/20 kB&#xD;Progress (4): 215 kB | 1.3/2.6 MB | 4.6 kB | 7.7/20 kB&#xD;Progress (4): 215 kB | 1.3/2.6 MB | 4.6 kB | 12/20 kB &#xD;Progress (4): 215 kB | 1.3/2.6 MB | 4.6 kB | 12/20 kB&#xD;Progress (4): 215 kB | 1.3/2.6 MB | 4.6 kB | 15/20 kB&#xD;Progress (4): 215 kB | 1.3/2.6 MB | 4.6 kB | 15/20 kB&#xD;Progress (4): 215 kB | 1.3/2.6 MB | 4.6 kB | 20/20 kB&#xD;Progress (4): 215 kB | 1.3/2.6 MB | 4.6 kB | 20 kB   &#xD;Progress (4): 215 kB | 1.3/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (4): 215 kB | 1.3/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (4): 215 kB | 1.3/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (4): 215 kB | 1.4/2.6 MB | 4.6 kB | 20 kB&#xD;                                                  &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.6/commons-io-2.6.jar (215 kB at 608 kB/s)&#xA;Progress (3): 1.4/2.6 MB | 4.6 kB | 20 kB&#xD;                                         &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/checkerframework/checker-compat-qual/2.5.5/checker-compat-qual-2.5.5.jar&#xA;Progress (3): 1.4/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.4/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.4/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.4/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.5/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.5/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.5/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.5/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.5/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.5/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.6/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.6/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.6/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.6/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.6/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.6/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.6/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (3): 1.7/2.6 MB | 4.6 kB | 20 kB&#xD;Progress (4): 1.7/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.7/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.7/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.7/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.7/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.7/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.8/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.8/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.8/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.8/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.8/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.8/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.9/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.9/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.9/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.9/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.9/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 1.9/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.0/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.0/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.0/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.0/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.0/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.0/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.1/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.1/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.1/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.1/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.1/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.1/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.2/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;Progress (4): 2.2/2.6 MB | 4.6 kB | 20 kB | 2.2 kB&#xD;                                                  &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/failureaccess/1.0.1/failureaccess-1.0.1.jar (4.6 kB at 13 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_annotations/2.3.4/error_prone_annotations-2.3.4.jar&#xA;Progress (3): 2.2/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.2/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.2/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.2/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.3/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.3/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.3/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.3/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.3/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.3/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.4/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.4/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.4/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.4/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.4/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.4/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.5/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.5/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.5/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.5/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.5/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.5/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.5/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.6/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.6/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.6/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.6/2.6 MB | 20 kB | 2.2 kB&#xD;Progress (3): 2.6 MB | 20 kB | 2.2 kB    &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/listenablefuture/9999.0-empty-to-avoid-conflict-with-guava/listenablefuture-9999.0-empty-to-avoid-conflict-with-guava.jar (2.2 kB at 6.0 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/j2objc/j2objc-annotations/1.3/j2objc-annotations-1.3.jar&#xA;Progress (3): 2.6 MB | 20 kB | 4.1/5.9 kB&#xD;Progress (3): 2.6 MB | 20 kB | 5.9 kB    &#xD;Progress (4): 2.6 MB | 20 kB | 5.9 kB | 4.1/14 kB&#xD;Progress (4): 2.6 MB | 20 kB | 5.9 kB | 7.7/14 kB&#xD;Progress (4): 2.6 MB | 20 kB | 5.9 kB | 12/14 kB &#xD;Progress (4): 2.6 MB | 20 kB | 5.9 kB | 14 kB   &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.jar (20 kB at 54 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/guava/28.2-android/guava-28.2-android.jar (2.6 MB at 6.9 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/checkerframework/checker-compat-qual/2.5.5/checker-compat-qual-2.5.5.jar (5.9 kB at 15 kB/s)&#xA;Progress (2): 14 kB | 4.1/8.8 kB&#xD;Progress (2): 14 kB | 7.7/8.8 kB&#xD;Progress (2): 14 kB | 8.8 kB    &#xD;                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_annotations/2.3.4/error_prone_annotations-2.3.4.jar (14 kB at 36 kB/s)&#xA;Progress (2): 8.8 kB | 4.1/500 kB&#xD;Progress (2): 8.8 kB | 7.7/500 kB&#xD;Progress (2): 8.8 kB | 12/500 kB &#xD;Progress (2): 8.8 kB | 16/500 kB&#xD;Progress (2): 8.8 kB | 20/500 kB&#xD;Progress (2): 8.8 kB | 24/500 kB&#xD;Progress (2): 8.8 kB | 28/500 kB&#xD;Progress (2): 8.8 kB | 32/500 kB&#xD;Progress (2): 8.8 kB | 36/500 kB&#xD;Progress (2): 8.8 kB | 40/500 kB&#xD;Progress (2): 8.8 kB | 45/500 kB&#xD;Progress (2): 8.8 kB | 49/500 kB&#xD;Progress (2): 8.8 kB | 53/500 kB&#xD;Progress (2): 8.8 kB | 57/500 kB&#xD;Progress (2): 8.8 kB | 61/500 kB&#xD;Progress (2): 8.8 kB | 65/500 kB&#xD;Progress (2): 8.8 kB | 69/500 kB&#xD;Progress (2): 8.8 kB | 73/500 kB&#xD;Progress (2): 8.8 kB | 77/500 kB&#xD;Progress (2): 8.8 kB | 81/500 kB&#xD;Progress (2): 8.8 kB | 86/500 kB&#xD;Progress (2): 8.8 kB | 90/500 kB&#xD;Progress (2): 8.8 kB | 94/500 kB&#xD;Progress (2): 8.8 kB | 98/500 kB&#xD;Progress (2): 8.8 kB | 102/500 kB&#xD;Progress (2): 8.8 kB | 106/500 kB&#xD;Progress (2): 8.8 kB | 110/500 kB&#xD;Progress (2): 8.8 kB | 114/500 kB&#xD;Progress (2): 8.8 kB | 118/500 kB&#xD;Progress (2): 8.8 kB | 122/500 kB&#xD;Progress (2): 8.8 kB | 126/500 kB&#xD;Progress (2): 8.8 kB | 131/500 kB&#xD;Progress (2): 8.8 kB | 135/500 kB&#xD;Progress (2): 8.8 kB | 139/500 kB&#xD;Progress (2): 8.8 kB | 143/500 kB&#xD;Progress (2): 8.8 kB | 147/500 kB&#xD;Progress (2): 8.8 kB | 151/500 kB&#xD;Progress (2): 8.8 kB | 155/500 kB&#xD;Progress (2): 8.8 kB | 159/500 kB&#xD;Progress (2): 8.8 kB | 163/500 kB&#xD;Progress (2): 8.8 kB | 167/500 kB&#xD;Progress (2): 8.8 kB | 172/500 kB&#xD;Progress (2): 8.8 kB | 176/500 kB&#xD;Progress (2): 8.8 kB | 180/500 kB&#xD;Progress (2): 8.8 kB | 184/500 kB&#xD;Progress (2): 8.8 kB | 188/500 kB&#xD;Progress (2): 8.8 kB | 192/500 kB&#xD;Progress (2): 8.8 kB | 196/500 kB&#xD;Progress (2): 8.8 kB | 200/500 kB&#xD;Progress (2): 8.8 kB | 204/500 kB&#xD;Progress (2): 8.8 kB | 208/500 kB&#xD;Progress (2): 8.8 kB | 213/500 kB&#xD;Progress (2): 8.8 kB | 217/500 kB&#xD;Progress (2): 8.8 kB | 221/500 kB&#xD;Progress (2): 8.8 kB | 225/500 kB&#xD;Progress (2): 8.8 kB | 229/500 kB&#xD;Progress (2): 8.8 kB | 233/500 kB&#xD;Progress (2): 8.8 kB | 237/500 kB&#xD;Progress (2): 8.8 kB | 241/500 kB&#xD;Progress (2): 8.8 kB | 245/500 kB&#xD;Progress (2): 8.8 kB | 249/500 kB&#xD;Progress (2): 8.8 kB | 253/500 kB&#xD;Progress (2): 8.8 kB | 258/500 kB&#xD;Progress (2): 8.8 kB | 262/500 kB&#xD;Progress (2): 8.8 kB | 266/500 kB&#xD;Progress (2): 8.8 kB | 270/500 kB&#xD;Progress (2): 8.8 kB | 274/500 kB&#xD;Progress (2): 8.8 kB | 278/500 kB&#xD;Progress (2): 8.8 kB | 282/500 kB&#xD;Progress (2): 8.8 kB | 286/500 kB&#xD;Progress (2): 8.8 kB | 290/500 kB&#xD;Progress (2): 8.8 kB | 294/500 kB&#xD;Progress (2): 8.8 kB | 299/500 kB&#xD;Progress (2): 8.8 kB | 303/500 kB&#xD;Progress (2): 8.8 kB | 307/500 kB&#xD;Progress (2): 8.8 kB | 311/500 kB&#xD;Progress (2): 8.8 kB | 315/500 kB&#xD;Progress (2): 8.8 kB | 319/500 kB&#xD;Progress (2): 8.8 kB | 323/500 kB&#xD;Progress (2): 8.8 kB | 327/500 kB&#xD;Progress (2): 8.8 kB | 331/500 kB&#xD;Progress (2): 8.8 kB | 335/500 kB&#xD;Progress (2): 8.8 kB | 339/500 kB&#xD;Progress (2): 8.8 kB | 344/500 kB&#xD;Progress (2): 8.8 kB | 348/500 kB&#xD;Progress (2): 8.8 kB | 352/500 kB&#xD;Progress (2): 8.8 kB | 356/500 kB&#xD;Progress (2): 8.8 kB | 360/500 kB&#xD;Progress (2): 8.8 kB | 364/500 kB&#xD;Progress (2): 8.8 kB | 368/500 kB&#xD;Progress (2): 8.8 kB | 372/500 kB&#xD;Progress (2): 8.8 kB | 376/500 kB&#xD;Progress (2): 8.8 kB | 380/500 kB&#xD;Progress (2): 8.8 kB | 385/500 kB&#xD;Progress (2): 8.8 kB | 389/500 kB&#xD;Progress (2): 8.8 kB | 393/500 kB&#xD;Progress (2): 8.8 kB | 397/500 kB&#xD;Progress (2): 8.8 kB | 401/500 kB&#xD;Progress (2): 8.8 kB | 405/500 kB&#xD;Progress (2): 8.8 kB | 409/500 kB&#xD;Progress (2): 8.8 kB | 413/500 kB&#xD;Progress (2): 8.8 kB | 417/500 kB&#xD;Progress (2): 8.8 kB | 421/500 kB&#xD;Progress (2): 8.8 kB | 426/500 kB&#xD;Progress (2): 8.8 kB | 430/500 kB&#xD;Progress (2): 8.8 kB | 434/500 kB&#xD;Progress (2): 8.8 kB | 438/500 kB&#xD;Progress (2): 8.8 kB | 442/500 kB&#xD;Progress (2): 8.8 kB | 446/500 kB&#xD;Progress (2): 8.8 kB | 450/500 kB&#xD;Progress (2): 8.8 kB | 454/500 kB&#xD;Progress (2): 8.8 kB | 458/500 kB&#xD;Progress (2): 8.8 kB | 462/500 kB&#xD;Progress (2): 8.8 kB | 466/500 kB&#xD;Progress (2): 8.8 kB | 471/500 kB&#xD;Progress (2): 8.8 kB | 475/500 kB&#xD;Progress (2): 8.8 kB | 479/500 kB&#xD;Progress (2): 8.8 kB | 481/500 kB&#xD;Progress (2): 8.8 kB | 486/500 kB&#xD;Progress (2): 8.8 kB | 490/500 kB&#xD;Progress (2): 8.8 kB | 494/500 kB&#xD;Progress (2): 8.8 kB | 498/500 kB&#xD;Progress (2): 8.8 kB | 500 kB    &#xD;                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/j2objc/j2objc-annotations/1.3/j2objc-annotations-1.3.jar (8.8 kB at 22 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.jar (500 kB at 1.2 MB/s)&#xA;[INFO] Including io.github.stuartwdouglas.hacbs-test.simple:simple-jdk17:jar:0.1.2 in the shaded jar.&#xA;[INFO] Including io.github.stuartwdouglas.hacbs-test.shaded:shaded-jdk11:jar:1.9 in the shaded jar.&#xA;[INFO] Including io.github.stuartwdouglas.hacbs-test.simple:simple-jdk8:jar:1.2.4 in the shaded jar.&#xA;[INFO] Including io.github.stuartwdouglas.hacbs-test.gradle:hacbs-test-simple-gradle-jdk8:jar:1.1 in the shaded jar.&#xA;[WARNING] hacbs-test-simple-gradle-jdk8-1.1.jar, hacbs-test.jar, shaded-jdk11-1.9.jar, simple-jdk17-0.1.2.jar, simple-jdk8-1.2.4.jar define 1 overlapping resource: &#xA;[WARNING]   - META-INF/MANIFEST.MF&#xA;[WARNING] shaded-jdk11-1.9.jar, simple-jdk8-1.2.4.jar define 3 overlapping classes and resources: &#xA;[WARNING]   - META-INF/maven/io.github.stuartwdouglas.hacbs-test.simple/simple-jdk8/pom.properties&#xA;[WARNING]   - META-INF/maven/io.github.stuartwdouglas.hacbs-test.simple/simple-jdk8/pom.xml&#xA;[WARNING]   - io.github.stuartwdouglas.hacbstest.simple.simplejdk8.Placeholder&#xA;[WARNING] maven-shade-plugin has detected that some class files are&#xA;[WARNING] present in two or more JARs. When this happens, only one&#xA;[WARNING] single version of the class is copied to the uber jar.&#xA;[WARNING] Usually this is not harmful and you can skip these warnings,&#xA;[WARNING] otherwise try to manually exclude artifacts based on&#xA;[WARNING] mvn dependency:tree -Ddetail=true and the above output.&#xA;[WARNING] See http://maven.apache.org/plugins/maven-shade-plugin/&#xA;[INFO] Replacing original artifact with shaded artifact.&#xA;[INFO] Replacing /work/target/hacbs-test.jar with /work/target/simple-java-project-1.0-SNAPSHOT-shaded.jar&#xA;[INFO] ------------------------------------------------------------------------&#xA;[INFO] BUILD SUCCESS&#xA;[INFO] ------------------------------------------------------------------------&#xA;[INFO] Total time:  13.239 s&#xA;[INFO] Finished at: 2026-05-06T07:06:37Z&#xA;[INFO] ------------------------------------------------------------------------&#xA;[2/2] STEP 1/10: FROM registry.access.redhat.com/ubi8/openjdk-17-runtime:1.23&#xA;[2/2] STEP 2/10: USER 185&#xA;[2/2] STEP 3/10: WORKDIR /work/&#xA;[2/2] STEP 4/10: COPY --from=builder /work/target/hacbs-test.jar /deployments&#xA;[2/2] STEP 5/10: EXPOSE 8081&#xA;[2/2] STEP 6/10: ENV AB_JOLOKIA_OFF=&#34;&#34;&#xA;[2/2] STEP 7/10: ENV JAVA_APP_JAR=&#34;/deployments/hacbs-test.jar&#34;&#xA;[2/2] STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;[2/2] STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;[2/2] STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;00775aff393ad7f166602cdc0ae09d8b098fdac5&#34; &#34;org.opencontainers.image.revision&#34;=&#34;00775aff393ad7f166602cdc0ae09d8b098fdac5&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo&#34; &#34;build-date&#34;=&#34;2026-05-06T07:06:11Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-06T07:06:11Z&#34;&#xA;[2/2] COMMIT quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#xA;--&gt; 0f97adb4a2b5&#xA;Successfully tagged quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#xA;0f97adb4a2b5d0e83f4301cb519d9da46972843ab2541462f39833b0ed45be45&#xA;[2026-05-06T07:06:39,103236472+00:00] Unsetting proxy&#xA;[2026-05-06T07:06:39,104523142+00:00] Add metadata&#xA;Recording base image digests used&#xA;registry.access.redhat.com/ubi8/openjdk-17:1.23 registry.access.redhat.com/ubi8/openjdk-17:1.23@sha256:6b594556530fc1f7e56ec1a798f27cfc87e328923d71a15b3a625cc0fc57618b&#xA;registry.access.redhat.com/ubi8/openjdk-17-runtime:1.23 registry.access.redhat.com/ubi8/openjdk-17-runtime:1.23@sha256:d1c41a39da6dd219a2c002e604e9412ecc1d8635533da3aadfbcf4d2a6878e92&#xA;Getting image source signatures&#xA;Copying blob sha256:5bd6594c895f98246729592cb36ec9c9920a4846dd674e84343b1ab8964bf471&#xA;Copying blob sha256:4fbd9e6ac35fac37ebf8cf165f41281d51056114cf97527414fa90b32b5d14d6&#xA;Copying blob sha256:5dbea8ad0b8fafeea55704769972b289a91254713435480168ce69a7d81ee19e&#xA;Copying config sha256:0f97adb4a2b5d0e83f4301cb519d9da46972843ab2541462f39833b0ed45be45&#xA;Writing manifest to image destination&#xA;[2026-05-06T07:06:43,265196961+00:00] End build&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-build-container-pod | container step-push: &#xA;[2026-05-06T07:06:43,341021939+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-06T07:06:45,946698267+00:00] Convert image&#xA;[2026-05-06T07:06:45,947888314+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:konflux-demo-component-mihh-on-push-h5kr7-build-container&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5 docker://quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:konflux-demo-component-mihh-on-push-h5kr7-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:5bd6594c895f98246729592cb36ec9c9920a4846dd674e84343b1ab8964bf471&#xA;Copying blob sha256:4fbd9e6ac35fac37ebf8cf165f41281d51056114cf97527414fa90b32b5d14d6&#xA;Copying blob sha256:5dbea8ad0b8fafeea55704769972b289a91254713435480168ce69a7d81ee19e&#xA;Copying config sha256:0f97adb4a2b5d0e83f4301cb519d9da46972843ab2541462f39833b0ed45be45&#xA;Writing manifest to image destination&#xA;[2026-05-06T07:07:49,847059522+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5 docker://quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#xA;Getting image source signatures&#xA;Copying blob sha256:5bd6594c895f98246729592cb36ec9c9920a4846dd674e84343b1ab8964bf471&#xA;Copying blob sha256:4fbd9e6ac35fac37ebf8cf165f41281d51056114cf97527414fa90b32b5d14d6&#xA;Copying blob sha256:5dbea8ad0b8fafeea55704769972b289a91254713435480168ce69a7d81ee19e&#xA;Copying config sha256:0f97adb4a2b5d0e83f4301cb519d9da46972843ab2541462f39833b0ed45be45&#xA;Writing manifest to image destination&#xA;sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452cquay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-05-06T07:07:50,617767349+00:00] End push&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-build-container-pod | container step-sbom-syft-generate: &#xA;[2026-05-06T07:07:51,465345399+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-05-06T07:08:01,231709537+00:00] End sbom-syft-generate&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-build-container-pod | container step-prepare-sboms: &#xA;[2026-05-06T07:08:01,645415089+00:00] Prepare SBOM&#xA;[2026-05-06T07:08:01,649840484+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-05-06 07:08:02,988 [INFO] mobster.log: Logging level set to 20&#xA;2026-05-06 07:08:03,141 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:d1c41a39da6dd219a2c002e604e9412ecc1d8635533da3aadfbcf4d2a6878e92&#xA;2026-05-06 07:08:03,758 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\nerror during command execution: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\n&#34;&#xA;2026-05-06 07:08:03,951 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\nerror during command execution: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\n&#34;&#xA;2026-05-06 07:08:04,375 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\nerror during command execution: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\n&#34;&#xA;2026-05-06 07:08:04,616 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\nerror during command execution: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\n&#34;&#xA;2026-05-06 07:08:05,031 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\nerror during command execution: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\n&#34;&#xA;2026-05-06 07:08:05,228 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\nerror during command execution: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\n&#34;&#xA;2026-05-06 07:08:05,626 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\nerror during command execution: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\n&#34;&#xA;2026-05-06 07:08:05,845 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:afcb4b2ab317e980bff127ff13e046c2a485f3eaaee0e82896c66fdd5be54988 with output b&#34;Error: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\nerror during command execution: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\n&#34;&#xA;2026-05-06 07:08:05,846 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-05-06 07:08:05,846 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-05-06 07:08:05,846 [INFO] mobster.log: Contextual workflow completed in 2.73s&#xA;2026-05-06 07:08:05,880 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-05-06T07:08:05,944260486+00:00] End prepare-sboms&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-build-container-pod | container step-upload-sbom: &#xA;[2026-05-06T07:08:06,715850507+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5@sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c] to [quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:sha256-853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:e61c77c1eb39a2188e61c7d35f884996119017d9789f14df993e8f4a726e234b&#xA;[2026-05-06T07:08:10,627032776+00:00] End upload-sbom&#xA;&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-build-image-index-pod | init container: prepare&#xA;2026/05/06 07:08:27 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-build-image-index-pod | init container: place-scripts&#xA;2026/05/06 07:08:28 Decoded script /tekton/scripts/script-0-wlkw4&#xA;2026/05/06 07:08:28 Decoded script /tekton/scripts/script-1-wq75v&#xA;2026/05/06 07:08:29 Decoded script /tekton/scripts/script-2-wzh8b&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-build-image-index-pod | container step-build: &#xA;[2026-05-06T07:08:48,179153692+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Running konflux-build-cli&#xA;time=&#34;2026-05-06T07:08:50Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;&#xA;time=&#34;2026-05-06T07:08:50Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5@sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c]&#34;&#xA;time=&#34;2026-05-06T07:08:50Z&#34; level=info msg=&#34;[param] buildah-format: docker&#34;&#xA;time=&#34;2026-05-06T07:08:50Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;time=&#34;2026-05-06T07:08:50Z&#34; level=info msg=&#34;[param] additional-tags: [konflux-demo-component-mihh-on-push-h5kr7-build-image-index]&#34;&#xA;time=&#34;2026-05-06T07:08:50Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;time=&#34;2026-05-06T07:08:50Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;time=&#34;2026-05-06T07:08:50Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;time=&#34;2026-05-06T07:08:50Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-06T07:08:50Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;time=&#34;2026-05-06T07:08:50Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;&#xA;time=&#34;2026-05-06T07:08:50Z&#34; level=info msg=&#34;buildah [stdout] 8601f17bc57b192958784626b24d73bcf1caf289f3b95fb144e50200e5e77e5a&#34; logger=CliExecutor&#xA;time=&#34;2026-05-06T07:08:50Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;{&#34;image_digest&#34;:&#34;sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#34;}&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-build-image-index-pod | container step-create-sbom: &#xA;The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-build-image-index-pod | container step-upload-sbom: &#xA;[2026-05-06T07:08:51,670196227+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-clamav-scan-pod | init container: prepare&#xA;2026/05/06 07:10:03 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-clamav-scan-pod | init container: place-scripts&#xA;2026/05/06 07:10:04 Decoded script /tekton/scripts/script-0-rp5n9&#xA;2026/05/06 07:10:04 Decoded script /tekton/scripts/script-1-ml5kw&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-clamav-scan-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 46.670 sec (0 m 46 s)&#xA;Start Date: 2026:05:06 07:10:21&#xA;End Date:   2026:05:06 07:11:08&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27992/Tue May  5 06:26:41 2026 Database version: 27992&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1778051468&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778051468&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778051468&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;, &#34;digests&#34;: [&#34;sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#34;]}}&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-clamav-scan-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh&#xA;Attaching to quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5@sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Uploading d6196719fa5f clamscan-ec-test-amd64.json&#xA;Uploading e49181513e9d clamscan-result-amd64.log&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploaded  e49181513e9d clamscan-result-amd64.log&#xA;Uploaded  d6196719fa5f clamscan-ec-test-amd64.json&#xA;Uploading b4e583f75d19 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  b4e583f75d19 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5@sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#xA;Digest: sha256:b4e583f75d19cb0074cdf6ebb6cc60839aa4d412659078ad80d5ed55c49d46f1&#xA;&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-clone-repository-pod | init container: prepare&#xA;2026/05/06 07:05:35 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-clone-repository-pod | init container: place-scripts&#xA;2026/05/06 07:05:36 Decoded script /tekton/scripts/script-0-d95vt&#xA;2026/05/06 07:05:36 Decoded script /tekton/scripts/script-1-z57gn&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051141.9047983,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051142.1439512,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo @ 00775aff393ad7f166602cdc0ae09d8b098fdac5 (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051142.1440122,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051142.176169,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision 00775aff393ad7f166602cdc0ae09d8b098fdac5 directly.&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-clone-repository-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:d00067650ac6c5dc7b74ea544d566868d34e69d3841c5e8c02d1c8059c59e73b)&#xA;Using token for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh&#xA;Executing: oras push --registry-config /tmp/create-oci.sh.8JPrDA/auth-RcmVaF.json quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5.git SOURCE_ARTIFACT&#xA;Uploading d00067650ac6 SOURCE_ARTIFACT&#xA;Uploaded  d00067650ac6 SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:04d1d547249ce68f9c6a0102cfce064cfc3adbf078717a1eef0aa2497a8d1697&#xA;Artifacts created&#xA;&#xA;&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-init-pod | init container: prepare&#xA;2026/05/06 07:04:57 Entrypoint initialization&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-init-pod | container step-init: &#xA;time=&#34;2026-05-06T07:05:00Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-06T07:05:00Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-06T07:05:00Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-06T07:05:00Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-06T07:05:00Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-06T07:05:00Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:05:00Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-06T07:05:00Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-06T07:05:00Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-push-dockerfile-pod | init container: prepare&#xA;2026/05/06 07:09:44 Entrypoint initialization&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-push-dockerfile-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.bQVxMx/auth-moUSua.json quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:d00067650ac6c5dc7b74ea544d566868d34e69d3841c5e8c02d1c8059c59e73b --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:d00067650ac6c5dc7b74ea544d566868d34e69d3841c5e8c02d1c8059c59e73b to /var/workdir/source&#xA;&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-push-dockerfile-pod | container step-push: &#xA;time=&#34;2026-05-06T07:09:49Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;&#xA;time=&#34;2026-05-06T07:09:49Z&#34; level=info msg=&#34;[param] image-digest: sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#34;&#xA;time=&#34;2026-05-06T07:09:49Z&#34; level=info msg=&#34;[param] containerfile: Dockerfile&#34;&#xA;time=&#34;2026-05-06T07:09:49Z&#34; level=info msg=&#34;[param] context: .&#34;&#xA;time=&#34;2026-05-06T07:09:49Z&#34; level=info msg=&#34;[param] tag-suffix: .dockerfile&#34;&#xA;time=&#34;2026-05-06T07:09:49Z&#34; level=info msg=&#34;[param] artifact-type: application/vnd.konflux.dockerfile&#34;&#xA;time=&#34;2026-05-06T07:09:49Z&#34; level=info msg=&#34;[param] source: source&#34;&#xA;time=&#34;2026-05-06T07:09:49Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-06T07:09:49Z&#34; level=info msg=&#34;[param] alternative-filename: Dockerfile&#34;&#xA;time=&#34;2026-05-06T07:09:51Z&#34; level=info msg=&#34;oras [stdout] quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:97e49e871510d771d30db3418032e7ebac33999316880de264175bed0bcc6322&#34; logger=CliExecutor&#xA;time=&#34;2026-05-06T07:09:51Z&#34; level=info msg=&#34;Containerfile &#39;/var/workdir/source/Dockerfile&#39; is pushed to registry with tag: sha256-853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c.dockerfile&#34;&#xA;{&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:97e49e871510d771d30db3418032e7ebac33999316880de264175bed0bcc6322&#34;}&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-sast-shell-check-pod | init container: prepare&#xA;2026/05/06 07:10:13 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-sast-shell-check-pod | init container: place-scripts&#xA;2026/05/06 07:10:14 Decoded script /tekton/scripts/script-1-8l9kb&#xA;2026/05/06 07:10:14 Decoded script /tekton/scripts/script-2-5stm8&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-sast-shell-check-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.5I27IM/auth-sPr3Xf.json quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:d00067650ac6c5dc7b74ea544d566868d34e69d3841c5e8c02d1c8059c59e73b --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:d00067650ac6c5dc7b74ea544d566868d34e69d3841c5e8c02d1c8059c59e73b to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-sast-shell-check-pod | container step-sast-shell-check: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=konflux-demo-component-mihh&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: konflux-demo-component-mihh&#39;&#xA;INFO: The PROJECT_NAME used is: konflux-demo-component-mihh&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;++ rpm -q --queryformat &#39;%{NAME}-%{VERSION}-%{RELEASE}\n&#39; ShellCheck&#xA;+ PACKAGE_VERSION=ShellCheck-0.10.0-3.el9&#xA;+ OUTPUT_FILE=shellcheck-results.json&#xA;+ SOURCE_CODE_DIR=/var/workdir/source&#xA;+ declare -a ALL_TARGETS&#xA;+ IFS=,&#xA;+ read -ra TARGET_ARRAY&#xA;+ for d in &#34;${TARGET_ARRAY[@]}&#34;&#xA;+ potential_path=/var/workdir/source/.&#xA;++ realpath -m /var/workdir/source/.&#xA;+ resolved_path=/var/workdir/source&#xA;+ [[ /var/workdir/source == \/\v\a\r\/\w\o\r\k\d\i\r\/\s\o\u\r\c\e* ]]&#xA;+ ALL_TARGETS+=(&#34;$resolved_path&#34;)&#xA;+ &#39;[&#39; -z &#39;&#39; &#39;]&#39;&#xA;+ &#39;[&#39; -r /sys/fs/cgroup/cpu.max &#39;]&#39;&#xA;+ read -r quota period&#xA;+ &#39;[&#39; 800000 &#39;!=&#39; max &#39;]&#39;&#xA;+ &#39;[&#39; -n 100000 &#39;]&#39;&#xA;+ &#39;[&#39; 100000 -gt 0 &#39;]&#39;&#xA;+ export SC_JOBS=8&#xA;+ SC_JOBS=8&#xA;+ echo &#39;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#39;&#xA;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#xA;+ /usr/share/csmock/scripts/run-shellcheck.sh /var/workdir/source&#xA;Looking for shell scripts................ done&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/applypatch-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/post-update.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/prepare-commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-applypatch.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-merge-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-push.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-rebase.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-receive.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/push-to-checkout.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/sendemail-validate.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/update.sample&#xA;+ CSGREP_OPTS=(--mode=json --strip-path-prefix=&#34;$SOURCE_CODE_DIR&#34;/ --remove-duplicates --embed-context=3 --set-scan-prop=&#34;ShellCheck:${PACKAGE_VERSION}&#34;)&#xA;+ [[ true == \t\r\u\e ]]&#xA;+ CSGREP_EVENT_FILTER=&#39;\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2218|2224|2225|2242|2256|2258|2261)\]$&#39;&#xA;+ CSGREP_OPTS+=(--event=&#34;$CSGREP_EVENT_FILTER&#34;)&#xA;+ csgrep --mode=json --strip-path-prefix=/var/workdir/source/ --remove-duplicates --embed-context=3 --set-scan-prop=ShellCheck:ShellCheck-0.10.0-3.el9 &#39;--event=\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|2218|2224|2225|2242|2256|2258|2261)\]$&#39; ./shellcheck-results/empty.json ./shellcheck-results/sc-105.json ./shellcheck-results/sc-112.json ./shellcheck-results/sc-115.json ./shellcheck-results/sc-123.json ./shellcheck-results/sc-71.json ./shellcheck-results/sc-74.json ./shellcheck-results/sc-75.json ./shellcheck-results/sc-76.json ./shellcheck-results/sc-78.json ./shellcheck-results/sc-82.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;ShellCheck results have been saved to shellcheck-results.json&#xA;+ echo &#39;ShellCheck results have been saved to shellcheck-results.json&#39;&#xA;+ csgrep --mode=evtstat shellcheck-results.json&#xA;+ csgrep --mode=sarif shellcheck-results.json&#xA;+ TEST_OUTPUT=&#xA;+ parse_test_output sast-shell-check-oci-ta sarif shellcheck-results.sarif&#xA;+ TEST_NAME=sast-shell-check-oci-ta&#xA;+ TEST_RESULT_FORMAT=sarif&#xA;+ TEST_RESULT_FILE=shellcheck-results.sarif&#xA;+ &#39;[&#39; -z sast-shell-check-oci-ta &#39;]&#39;&#xA;+ &#39;[&#39; -z sarif &#39;]&#39;&#xA;+ &#39;[&#39; -z shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; &#39;!&#39; -f shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; sarif = sarif &#39;]&#39;&#xA;+++ jq -rce &#39;(if (.runs[].results | length &gt; 0) then &#34;FAILURE&#34; else &#34;SUCCESS&#34; end)&#39; shellcheck-results.sarif&#xA;+++ jq -rce &#39;(.runs[].results | length)&#39; shellcheck-results.sarif&#xA;++ make_result_json -r SUCCESS -f 0&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ FAILURES=0&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-06T07:10:19+00:00 --arg result SUCCESS --arg note &#39;For details, check Tekton task log.&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:10:19+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:10:19+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:10:19+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:10:19+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ jq .failures&#xA;+ &#39;[&#39; 0 -gt 0 &#39;]&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:10:19+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:10:19+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-sast-shell-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh&#xA;Attaching to quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5@sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c shellcheck-results.sarif:application/sarif+json&#xA;Preparing shellcheck-results.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading da808faebf6f shellcheck-results.sarif&#xA;Uploaded  da808faebf6f shellcheck-results.sarif&#xA;Uploading 1c76d7c694da application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  1c76d7c694da application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5@sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#xA;Digest: sha256:1c76d7c694da636e54b6795b0ae143048df9e69d936c53158d5ee43a49687ec2&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-sast-snyk-check-pod | init container: prepare&#xA;2026/05/06 07:09:53 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-mihh-on-push-h5kr7-sast-snyk-check-pod | init container: place-scripts&#xA;2026/05/06 07:09:54 Decoded script /tekton/scripts/script-1-sr985&#xA;2026/05/06 07:09:54 Decoded script /tekton/scripts/script-2-sqwmt&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-sast-snyk-check-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.kOE8WM/auth-i4SPG0.json quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:d00067650ac6c5dc7b74ea544d566868d34e69d3841c5e8c02d1c8059c59e73b --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:d00067650ac6c5dc7b74ea544d566868d34e69d3841c5e8c02d1c8059c59e73b to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-sast-snyk-check-pod | container step-sast-snyk-check: &#xA;INFO: The PROJECT_NAME used is: konflux-demo-component-mihh&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;{&#34;result&#34;:&#34;SKIPPED&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:09:59+00:00&#34;,&#34;note&#34;:&#34;Task sast-snyk-check-oci-ta skipped: If you wish to use the Snyk code SAST task, please create a secret name snyk-secret with the key &#39;snyk_token&#39; containing the Snyk token by following the steps given [here](https://konflux-ci.dev/docs/testing/build/snyk/)&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA;pod: konflux-demo-component-mihh-on-push-h5kr7-sast-snyk-check-pod | container step-upload: &#xA;No sast_snyk_check_out.sarif exists. Skipping upload.&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: konflux-demo-component-mihh1d79807a9c83a866c5958d80cb9b3f81-pod | init container: prepare&#xA;2026/05/06 07:09:40 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-mihh1d79807a9c83a866c5958d80cb9b3f81-pod | init container: place-scripts&#xA;2026/05/06 07:09:41 Decoded script /tekton/scripts/script-0-m855p&#xA;2026/05/06 07:09:41 Decoded script /tekton/scripts/script-1-zkckj&#xA;2026/05/06 07:09:41 Decoded script /tekton/scripts/script-2-hjbtq&#xA;2026/05/06 07:09:41 Decoded script /tekton/scripts/script-3-c9fwp&#xA;2026/05/06 07:09:41 Decoded script /tekton/scripts/script-4-q27hx&#xA;2026/05/06 07:09:41 Decoded script /tekton/scripts/script-5-dbq4s&#xA;&#xA;pod: konflux-demo-component-mihh1d79807a9c83a866c5958d80cb9b3f81-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#xA;The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: konflux-demo-component-mihh1d79807a9c83a866c5958d80cb9b3f81-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#xA;Using token for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: konflux-demo-component-mihh1d79807a9c83a866c5958d80cb9b3f81-pod | container step-set-skip-for-bundles: &#xA;2026/05/06 07:09:47 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: konflux-demo-component-mihh1d79807a9c83a866c5958d80cb9b3f81-pod | container step-app-check: &#xA;time=&#34;2026-05-06T07:09:47Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.17.2 &lt;commit: eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&gt;&#34;&#xA;time=&#34;2026-05-06T07:09:47Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5 for platform amd64&#34;&#xA;time=&#34;2026-05-06T07:09:47Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;&#xA;time=&#34;2026-05-06T07:09:55Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-3587153105/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-05-06T07:09:55Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-05-06T07:09:55Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-05-06T07:09:55Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-05-06T07:09:55Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages result=PASSED&#xA;time=&#34;2026-05-06T07:09:55Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=PASSED&#xA;time=&#34;2026-05-06T07:09:55Z&#34; level=info msg=&#34;USER 185 specified that is non-root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-06T07:09:55Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=PASSED&#xA;time=&#34;2026-05-06T07:10:05Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-05-06T07:10:05Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=PASSED&#xA;time=&#34;2026-05-06T07:10:05Z&#34; level=info msg=&#34;This image&#39;s tag 00775aff393ad7f166602cdc0ae09d8b098fdac5 will be paired with digest sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.17.2&#34;,&#xA;        &#34;commit&#34;: &#34;eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 39,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 9575,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 149,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: []&#xA;    }&#xA;}&#xA;time=&#34;2026-05-06T07:10:05Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;&#xA;pod: konflux-demo-component-mihh1d79807a9c83a866c5958d80cb9b3f81-pod | container step-app-set-outcome: &#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1778051405&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#xA;&#xA;pod: konflux-demo-component-mihh1d79807a9c83a866c5958d80cb9b3f81-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1778051405&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}&#xA; pod: konflux-demo-component-mihh793253559ca70753a34500f0d9cb606d-pod | init container: prepare&#xA;2026/05/06 07:05:51 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-mihh793253559ca70753a34500f0d9cb606d-pod | init container: place-scripts&#xA;2026/05/06 07:05:52 Decoded script /tekton/scripts/script-0-g98jh&#xA;2026/05/06 07:05:52 Decoded script /tekton/scripts/script-2-nb9zz&#xA;&#xA;pod: konflux-demo-component-mihh793253559ca70753a34500f0d9cb606d-pod | container step-skip-ta: &#xA;&#xA;pod: konflux-demo-component-mihh793253559ca70753a34500f0d9cb606d-pod | container step-use-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;&#xA;&#xA;pod: konflux-demo-component-mihh793253559ca70753a34500f0d9cb606d-pod | container step-prefetch-dependencies: &#xA;Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using mounted service CA bundle: /mnt/service-ca/ca-bundle.crt&#xA;&#39;/mnt/service-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/service-ca.crt&#39;&#xA;time=&#34;2026-05-06T07:05:58Z&#34; level=debug msg=&#34;Starting prefetch-dependencies&#34;&#xA;time=&#34;2026-05-06T07:05:58Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:05:58Z&#34; level=info msg=&#34;Not using package registry proxy because allow-package-registry-proxy is not set to `true` on the cluster level&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-06T07:05:58Z&#34; level=info msg=&#34;[param] source-dir: /var/workdir/source&#34;&#xA;time=&#34;2026-05-06T07:05:58Z&#34; level=info msg=&#34;[param] output-dir: /var/workdir/cachi2/output&#34;&#xA;time=&#34;2026-05-06T07:05:58Z&#34; level=info msg=&#34;[param] sbom-format: spdx&#34;&#xA;time=&#34;2026-05-06T07:05:58Z&#34; level=info msg=&#34;[param] mode: strict&#34;&#xA;time=&#34;2026-05-06T07:05:58Z&#34; level=info msg=&#34;[param] output-dir-mount-point: /cachi2/output&#34;&#xA;time=&#34;2026-05-06T07:05:58Z&#34; level=info msg=&#34;[param] env-files: [/var/workdir/cachi2/cachi2.env /var/workdir/cachi2/prefetch.env /var/workdir/cachi2/prefetch-env.json]&#34;&#xA;time=&#34;2026-05-06T07:05:58Z&#34; level=info msg=&#34;[param] git-auth-directory: /workspace/git-basic-auth&#34;&#xA;time=&#34;2026-05-06T07:06:00Z&#34; level=info msg=&#34;hermeto [stdout] hermeto 0.51.0&#34; logger=CliExecutor&#xA;time=&#34;2026-05-06T07:06:00Z&#34; level=warning msg=&#34;No input provided; skipping prefetch-dependencies&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-06T07:06:00Z&#34; level=debug msg=&#34;Finished prefetch-dependencies&#34;&#xA;&#xA;pod: konflux-demo-component-mihh793253559ca70753a34500f0d9cb606d-pod | container step-create-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;WARN: found skip file in /var/workdir/cachi2&#xA;&#xA;&#xA; pod: konflux-demo-component-mihhb3e9516c1c3376ad19edaa39fdcf5fc7-pod | init container: prepare&#xA;2026/05/06 07:09:44 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-mihhb3e9516c1c3376ad19edaa39fdcf5fc7-pod | init container: place-scripts&#xA;2026/05/06 07:09:45 Decoded script /tekton/scripts/script-0-kjb8n&#xA;2026/05/06 07:09:45 Decoded script /tekton/scripts/script-1-srq9d&#xA;&#xA;pod: konflux-demo-component-mihhb3e9516c1c3376ad19edaa39fdcf5fc7-pod | container step-rpms-signature-scan: &#xA;+ set -o pipefail&#xA;+ rpm_verifier --image-url quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5 --image-digest sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c --workdir /tmp&#xA;Image: quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#xA;No unsigned RPMs found&#xA;&#xA;{&#39;keys&#39;: {&#39;199e2f91fd431d51&#39;: 132, &#39;unsigned&#39;: 0}}&#xA;====================================&#xA;&#xA;Final results:&#xA;{&#34;keys&#34;: {&#34;199e2f91fd431d51&#34;: 132, &#34;unsigned&#34;: 0}}&#xA;Images processed:&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;, &#34;digests&#34;: [&#34;sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#34;]}}&#xA;&#xA;pod: konflux-demo-component-mihhb3e9516c1c3376ad19edaa39fdcf5fc7-pod | container step-output-results: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;++ cat /tmp/status&#xA;+ status=SUCCESS&#xA;++ cat /tmp/results&#xA;+ rpms_data=&#39;{&#34;keys&#34;: {&#34;199e2f91fd431d51&#34;: 132, &#34;unsigned&#34;: 0}}&#39;&#xA;++ cat /tmp/images_processed&#xA;+ images_processed=&#39;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;, &#34;digests&#34;: [&#34;sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#34;]}}&#39;&#xA;+ &#39;[&#39; SUCCESS == ERROR &#39;]&#39;&#xA;+ note=&#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-06T07:10:10+00:00 --arg result SUCCESS --arg note &#39;Task rpms-signature-scan completed successfully&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:10:10+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:10:10+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:10:10+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:10:10+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:10:10+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ echo &#39;{&#34;keys&#34;: {&#34;199e2f91fd431d51&#34;: 132, &#34;unsigned&#34;: 0}}&#39;&#xA;+ tee /tekton/results/RPMS_DATA&#xA;{&#34;keys&#34;: {&#34;199e2f91fd431d51&#34;: 132, &#34;unsigned&#34;: 0}}&#xA;+ echo &#39;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;, &#34;digests&#34;: [&#34;sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#34;]}}&#39;&#xA;+ tee /tekton/results/IMAGES_PROCESSED&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#34;, &#34;digests&#34;: [&#34;sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#34;]}}&#xA;&#xA; pod: konflux-demo-component-mihhb5e93b3d2a6489b545aadc52dd58a166-pod | init container: prepare&#xA;2026/05/06 07:09:36 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-mihhb5e93b3d2a6489b545aadc52dd58a166-pod | init container: place-scripts&#xA;2026/05/06 07:09:38 Decoded script /tekton/scripts/script-1-99mqg&#xA;2026/05/06 07:09:38 Decoded script /tekton/scripts/script-2-b7k97&#xA;&#xA;pod: konflux-demo-component-mihhb5e93b3d2a6489b545aadc52dd58a166-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.GE8RR6/auth-Z0XRNE.json quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:d00067650ac6c5dc7b74ea544d566868d34e69d3841c5e8c02d1c8059c59e73b --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh@sha256:d00067650ac6c5dc7b74ea544d566868d34e69d3841c5e8c02d1c8059c59e73b to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: konflux-demo-component-mihhb5e93b3d2a6489b545aadc52dd58a166-pod | container step-sast-unicode-check: &#xA;+ . /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=konflux-demo-component-mihh&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: konflux-demo-component-mihh&#39;&#xA;INFO: The PROJECT_NAME used is: konflux-demo-component-mihh&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;+ SCAN_PROP=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58&#xA;+ FUC_EXIT_CODE=0&#xA;+ declare -a ALL_TARGETS&#xA;+ OLD_IFS=&#39; &#x9;&#xA;&#39;&#xA;+ IFS=,&#xA;+ for d in $TARGET_DIRS&#xA;+ ALL_TARGETS+=(&#34;${SOURCE_CODE_DIR}/source/${d}&#34;)&#xA;+ IFS=&#39; &#x9;&#xA;&#39;&#xA;+ LANG=en_US.utf8&#xA;+ find_unicode_control.py -p bidi -v -d -t /var/workdir/source/.&#xA;+ [[ 0 -ne 0 ]]&#xA;+ sed -i raw_sast_unicode_check_out.txt -E -e &#39;s|(.*:[0-9]+)(.*)|\1: warning:\2|&#39; -e &#39;s|^|Error: UNICONTROL_WARNING:\n|&#39;&#xA;+ CSGERP_OPTS=(--mode=json --remove-duplicates --embed-context=3 --set-scan-prop=&#34;${SCAN_PROP}&#34; --strip-path-prefix=&#34;${SOURCE_CODE_DIR}&#34;/source/)&#xA;+ csgrep --mode=json --remove-duplicates --embed-context=3 --set-scan-prop=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58 --strip-path-prefix=/var/workdir/source/ raw_sast_unicode_check_out.txt&#xA;+ csgrep --mode=evtstat processed_sast_unicode_check_out.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;+ mv processed_sast_unicode_check_out.json sast_unicode_check_out.json&#xA;+ csgrep --mode=sarif sast_unicode_check_out.json&#xA;+ [[ 0 -eq 0 ]]&#xA;+ note=&#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-06T07:09:44+00:00 --arg result SUCCESS --arg note &#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:09:44+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:09:44+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ ERROR_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:09:44+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:09:44+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:09:44+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: konflux-demo-component-mihhb5e93b3d2a6489b545aadc52dd58a166-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh&#xA;Attaching to quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5@sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c sast_unicode_check_out.sarif:application/sarif+json&#xA;Preparing sast_unicode_check_out.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading 0e9806f310b4 sast_unicode_check_out.sarif&#xA;Uploaded  0e9806f310b4 sast_unicode_check_out.sarif&#xA;Uploading 4c631aca24f3 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  4c631aca24f3 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/konflux-nqmn/konflux-demo-component-mihh:00775aff393ad7f166602cdc0ae09d8b098fdac5@sha256:853c6d340b1a68458402543a8ae375a9546ffc35dc8d00ad1d5811b792b4452c&#xA;Digest: sha256:4c631aca24f3c619ac909fac82a1440f3e4475245747b6bfbf1d98390142b825&#xA;No excluded-findings.json exists. Skipping upload.&#xA;New PipelineRun konflux-demo-component-mihh-on-push-c7l9f found after retrigger for component konflux-nqmn/konflux-demo-component-mihh&#xA;PipelineRun konflux-demo-component-mihh-on-push-c7l9f found for Component konflux-nqmn/konflux-demo-component-mihh&#xA;PipelineRun konflux-demo-component-mihh-on-push-c7l9f reason: ResolvingTaskRef&#xA;PipelineRun konflux-demo-component-mihh-on-push-c7l9f reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-c7l9f reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-c7l9f reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-c7l9f reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-c7l9f reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-c7l9f reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-c7l9f reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-c7l9f reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-c7l9f reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-c7l9f reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-c7l9f reason: Completed&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: build PipelineRun finishedpipelineRunkonflux-demo-component-mihh-on-push-c7l9fheadSHA3769006ca8a95a3d58bcfb462f34b8e38ed72ef3&#34;&#xA;&lt; Exit [It] should eventually complete successfully - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:373 @ 05/06/26 07:15:49.359 (10m55.798s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate Tekton TaskRun test results successfully [konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.402489914">
              <system-err>&gt; Enter [It] should validate Tekton TaskRun test results successfully - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:389 @ 05/06/26 07:15:49.36&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: validating build PipelineRun TaskRun test resultscomponentkonflux-demo-component-mihhheadSHA3769006ca8a95a3d58bcfb462f34b8e38ed72ef3&#34;&#xA;&lt; Exit [It] should validate Tekton TaskRun test results successfully - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:389 @ 05/06/26 07:15:49.763 (402ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate that the build pipelineRun is signed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.009461057">
              <system-err>&gt; Enter [It] should validate that the build pipelineRun is signed - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:403 @ 05/06/26 07:15:49.763&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: validating build PipelineRun is signedcomponentkonflux-demo-component-mihh&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: build PipelineRun is signedpipelineRunkonflux-demo-component-mihh-on-push-c7l9f&#34;&#xA;&lt; Exit [It] should validate that the build pipelineRun is signed - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:403 @ 05/06/26 07:15:49.772 (9ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should find the related Snapshot CR [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.005731958">
              <system-err>&gt; Enter [It] should find the related Snapshot CR - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:419 @ 05/06/26 07:15:49.773&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Snapshot CRpipelineRunkonflux-demo-component-mihh-on-push-c7l9fnamespacekonflux-nqmn&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Snapshot foundsnapshotkonflux-demo-app-20260506-071204-000&#34;&#xA;&lt; Exit [It] should find the related Snapshot CR - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:419 @ 05/06/26 07:15:49.779 (6ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate that the build pipelineRun is annotated with the name of the Snapshot [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.008244691">
              <system-err>&gt; Enter [It] should validate that the build pipelineRun is annotated with the name of the Snapshot - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:432 @ 05/06/26 07:15:49.779&#xA;&lt; Exit [It] should validate that the build pipelineRun is annotated with the name of the Snapshot - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:432 @ 05/06/26 07:15:49.787 (8ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should find the related Integration Test PipelineRun [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.006045817">
              <system-err>&gt; Enter [It] should find the related Integration Test PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:441 @ 05/06/26 07:15:49.788&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Integration Test PipelineRunscenariomy-integration-test-xmfcsnapshotkonflux-demo-app-20260506-071204-000&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Integration Test PipelineRun foundpipelineRunmy-integration-test-xmfc-n7xl4&#34;&#xA;&lt; Exit [It] should find the related Integration Test PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:441 @ 05/06/26 07:15:49.794 (6ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when push pipelinerun is retriggered should eventually succeed [konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="200.108087183">
              <system-err>&gt; Enter [It] should eventually succeed - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:462 @ 05/06/26 07:15:49.794&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: triggering PaC build retriggercomponentkonflux-demo-component-mihh&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for retriggered PipelineRun to appearcomponentkonflux-demo-component-mihh&#34;&#xA;PipelineRun is not been retriggered yet for the component konflux-nqmn/konflux-demo-component-mihh&#xA;&#34;msg&#34;=&#34;Konflux demo: GetComponentPipelineRunWithType (incoming) failed: no pipelinerun found for component konflux-demo-component-mihh&#34; &#34;error&#34;=null&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for retriggered build PipelineRun to finishpipelineRunkonflux-demo-component-mihh-on-push-g8lwd&#34;&#xA;PipelineRun konflux-demo-component-mihh-on-push-g8lwd found for Component konflux-nqmn/konflux-demo-component-mihh&#xA;PipelineRun konflux-demo-component-mihh-on-push-g8lwd reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-g8lwd reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-g8lwd reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-g8lwd reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-g8lwd reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-g8lwd reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-g8lwd reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-g8lwd reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-g8lwd reason: Running&#xA;PipelineRun konflux-demo-component-mihh-on-push-g8lwd reason: Completed&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: retriggered build PipelineRun finishedpipelineRunkonflux-demo-component-mihh-on-push-g8lwd&#34;&#xA;&lt; Exit [It] should eventually succeed - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:462 @ 05/06/26 07:19:09.902 (3m20.108s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun is created should eventually complete successfully [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.00536291">
              <system-err>&gt; Enter [It] should eventually complete successfully - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:493 @ 05/06/26 07:19:09.902&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Integration pipeline to finishscenariomy-integration-test-xmfcsnapshotkonflux-demo-app-20260506-071204-000&#34;&#xA;PipelineRun my-integration-test-xmfc-n7xl4 reason: Succeeded&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Integration pipeline finishedsnapshotkonflux-demo-app-20260506-071204-000&#34;&#xA;&lt; Exit [It] should eventually complete successfully - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:493 @ 05/06/26 07:19:09.908 (5ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun completes successfully should lead to Snapshot CR being marked as passed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.005956955">
              <system-err>&gt; Enter [It] should lead to Snapshot CR being marked as passed - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:505 @ 05/06/26 07:19:09.908&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Snapshot to be marked as passedpipelineRunkonflux-demo-component-mihh-on-push-c7l9f&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Snapshot marked as passedsnapshotkonflux-demo-app-20260506-071204-000&#34;&#xA;&lt; Exit [It] should lead to Snapshot CR being marked as passed - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:505 @ 05/06/26 07:19:09.914 (6ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun completes successfully should trigger creation of Release CR [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.006357138">
              <system-err>&gt; Enter [It] should trigger creation of Release CR - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:518 @ 05/06/26 07:19:09.914&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Release CRsnapshotkonflux-demo-app-20260506-071204-000namespacekonflux-nqmn&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Release CR createdreleasekonflux-demo-app-20260506-071204-000-3769006-s4hc5&#34;&#xA;&lt; Exit [It] should trigger creation of Release CR - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:518 @ 05/06/26 07:19:09.921 (6ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release CR is created triggers creation of Release PipelineRun [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.075578478">
              <system-err>&gt; Enter [It] triggers creation of Release PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:533 @ 05/06/26 07:19:09.921&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Release PipelineRun to startreleasekonflux-demo-app-20260506-071204-000-3769006-s4hc5managedNamespacekonflux-nqmn-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Release PipelineRun startedpipelineRunmanaged-rjd6r&#34;&#xA;&lt; Exit [It] triggers creation of Release PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:533 @ 05/06/26 07:19:09.997 (75ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release PipelineRun is triggered should eventually succeed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.045109858">
              <system-err>&gt; Enter [It] should eventually succeed - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:552 @ 05/06/26 07:19:09.997&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Release PipelineRun to completereleasekonflux-demo-app-20260506-071204-000-3769006-s4hc5managedNamespacekonflux-nqmn-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Release PipelineRun succeededreleasekonflux-demo-app-20260506-071204-000-3769006-s4hc5&#34;&#xA;&lt; Exit [It] should eventually succeed - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:552 @ 05/06/26 07:19:10.042 (45ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release PipelineRun is completed should lead to Release CR being marked as succeeded [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="79.979868281">
              <system-err>&gt; Enter [It] should lead to Release CR being marked as succeeded - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:578 @ 05/06/26 07:19:10.042&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Release CR to be marked as releasedreleasekonflux-demo-app-20260506-071204-000-3769006-s4hc5namespacekonflux-nqmn&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Release CR marked as succeededreleasekonflux-demo-app-20260506-071204-000-3769006-s4hc5&#34;&#xA;&lt; Exit [It] should lead to Release CR being marked as succeeded - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:578 @ 05/06/26 07:19:10.07 (28ms)&#xA;&gt; Enter [AfterAll] Maven project - Default build - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:154 @ 05/06/26 07:19:10.07&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo AfterAll: cleaning up namespacesuserNamespacekonflux-nqmnmanagedNamespacekonflux-nqmn-managed&#34;&#xA;&#34;msg&#34;=&#34;Konflux demo AfterAll: failed to delete GitHub ref konflux-konflux-demo-component-mihh in repo hacbs-test-project-konflux-demo: DELETE https://api.github.com/repos/redhat-appstudio-qe/hacbs-test-project-konflux-demo/git/refs/heads/konflux-konflux-demo-component-mihh: 422 Reference does not exist []&#34; &#34;error&#34;=null&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo AfterAll: cleanup finishedcomponentRepositoryNamehacbs-test-project-konflux-demo&#34;&#xA;&lt; Exit [AfterAll] Maven project - Default build - /tmp/tmp.x1MqQ7KQDy/tests/konflux-demo/konflux-demo.go:154 @ 05/06/26 07:20:30.022 (1m19.952s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies the release CR is created [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies the multiarch release pipelinerun is running and succeeds [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies if the repository URL is valid [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="126.4357983">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:72 @ 05/06/26 07:02:05.859&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;gl-multi-component-parent-pfpc&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:72 @ 05/06/26 07:03:11.887 (1m6.028s)&#xA;&gt; Enter [It] creates component with nudges - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:235 @ 05/06/26 07:03:11.888&#xA;Image repository for component gl-multi-component-child-pfpc in namespace build-e2e-epcp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component gl-multi-component-child-pfpc in namespace build-e2e-epcp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component gl-multi-component-child-pfpc in namespace build-e2e-epcp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component gl-multi-component-child-pfpc in namespace build-e2e-epcp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component gl-multi-component-parent-pfpc in namespace build-e2e-epcp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component gl-multi-component-parent-pfpc in namespace build-e2e-epcp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;&lt; Exit [It] creates component with nudges - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:235 @ 05/06/26 07:04:12.295 (1m0.407s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:04:12.295&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:04:12.295 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="40.19865852">
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:259 @ 05/06/26 07:04:12.296&#xA;PipelineRun has not been created yet for the component build-e2e-epcp/gl-multi-component-parent-pfpc&#xA;PipelineRun has not been created yet for the component build-e2e-epcp/gl-multi-component-parent-pfpc&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:259 @ 05/06/26 07:04:52.494 (40.198s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:04:52.494&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:04:52.494 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="600.02495542">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:274 @ 05/06/26 07:04:52.494&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 found for Component build-e2e-epcp/gl-multi-component-parent-pfpc&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-pull-request-4xh65 reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:274 @ 05/06/26 07:14:52.519 (10m0.025s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:14:52.519&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:14:52.519 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="291.984890511">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:285 @ 05/06/26 07:14:52.52&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-26l6h found for Component build-e2e-epcp/gl-multi-component-child-pfpc&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-26l6h reason: Cancelled&#xA;attempt 1/3: PipelineRun &#34;gl-multi-component-child-pfpc-on-pull-request-26l6h&#34; failed: &#xA; pod: gl-multi-component-child-pfpc-on-pull-request-26l6h-init-pod | init container: prepare&#xA;2026/05/06 07:04:54 Entrypoint initialization&#xA;&#xA;pod: gl-multi-component-child-pfpc-on-pull-request-26l6h-init-pod | container step-init: &#xA;time=&#34;2026-05-06T07:04:57Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-06T07:04:57Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-06T07:04:57Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-06T07:04:57Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-06T07:04:57Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-06T07:04:57Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:04:57Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-06T07:04:57Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-06T07:04:57Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: gl-multi-component-child-pfpc-on-pull-request-6ng47-init-pod | init container: prepare&#xA;2026/05/06 07:06:31 Entrypoint initialization&#xA;&#xA;pod: gl-multi-component-child-pfpc-on-pull-request-6ng47-init-pod | container step-init: &#xA;time=&#34;2026-05-06T07:06:34Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-06T07:06:34Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-06T07:06:34Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-06T07:06:34Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-06T07:06:34Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-06T07:06:34Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:06:34Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-06T07:06:34Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-06T07:06:34Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gl-multi-component-child-pfpc-on-pull-request-6ng47 found after retrigger for component build-e2e-epcp/gl-multi-component-child-pfpc&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n found for Component build-e2e-epcp/gl-multi-component-child-pfpc&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Running&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Running&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Running&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Running&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Running&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Running&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Running&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Running&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Running&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Running&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Running&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Running&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Running&#xA;PipelineRun gl-multi-component-child-pfpc-on-pull-request-wtx8n reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:285 @ 05/06/26 07:19:44.504 (4m51.984s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:19:44.505&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:19:44.505 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="0.238533313">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:289 @ 05/06/26 07:19:44.505&#xA;&lt; Exit [It] should lead to a PaC PR creation for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:289 @ 05/06/26 07:19:44.743 (238ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:19:44.744&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:19:44.744 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="1.4103952149999999">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:307 @ 05/06/26 07:19:44.744&#xA;merged result sha: 1c07ce7f5033a5eb4b6355fa7e3ec38ca1460dd8 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:307 @ 05/06/26 07:19:46.154 (1.41s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:19:46.154&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:19:46.154 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="65.311923793">
              <system-err>&gt; Enter [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:318 @ 05/06/26 07:19:46.155&#xA;&lt; Exit [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:318 @ 05/06/26 07:20:51.467 (1m5.312s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:20:51.467&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:20:51.467 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="0.220793165">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:358 @ 05/06/26 07:20:51.467&#xA;&lt; Exit [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:358 @ 05/06/26 07:20:51.688 (220ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:20:51.688&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:20:51.688 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="1.230904809">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:375 @ 05/06/26 07:20:51.688&#xA;merged result sha: ef33ae3c0e7ae54ee5d484306b0b3e3c821c863f for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:375 @ 05/06/26 07:20:52.919 (1.231s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:20:52.919&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:20:52.919 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="20.04415289">
              <system-err>&gt; Enter [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:385 @ 05/06/26 07:20:52.92&#xA;Push PipelineRun has not been created yet for the component build-e2e-epcp/gl-multi-component-parent-pfpc&#xA;&lt; Exit [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:385 @ 05/06/26 07:21:12.964 (20.044s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:21:12.964&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:21:12.964 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="300.011600736">
              <system-err>&gt; Enter [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:401 @ 05/06/26 07:21:12.964&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n found for Component build-e2e-epcp/gl-multi-component-parent-pfpc&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Running&#xA;PipelineRun gl-multi-component-parent-pfpc-on-push-sxc4n reason: Succeeded&#xA;&lt; Exit [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:401 @ 05/06/26 07:26:12.976 (5m0.011s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:26:12.976&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:26:12.976 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="0.238250169">
              <system-err>&gt; Enter [It] should lead to a nudge PR creation for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:412 @ 05/06/26 07:26:12.977&#xA;&lt; Exit [It] should lead to a nudge PR creation for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:412 @ 05/06/26 07:26:13.215 (238ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:26:13.215&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:26:13.215 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="1.319428931">
              <system-err>&gt; Enter [It] merging the PR should be successful for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:429 @ 05/06/26 07:26:13.215&#xA;merged result sha: f5542a74228c834e228a281446729ccbd2057699 for PR #3&#xA;&lt; Exit [It] merging the PR should be successful for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:429 @ 05/06/26 07:26:14.535 (1.319s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:26:14.535&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:26:14.535 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="20.081276212">
              <system-err>&gt; Enter [It] Verify the nudge updated the contents - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:440 @ 05/06/26 07:26:14.535&#xA;Verifying Dockerfile.tmp updated to sha sha256:769aaf1ff2017adb758fa65ee53b2602ea3158e5b1c2c5f3a78df583b06c9399content: FROM quay.io/redhat-appstudio-qe/build-e2e-epcp/gl-multi-component-parent-pfpc@sha256:769aaf1ff2017adb758fa65ee53b2602ea3158e5b1c2c5f3a78df583b06c9399&#xA;RUN echo hello&#xA;&#xA;&lt; Exit [It] Verify the nudge updated the contents - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:440 @ 05/06/26 07:26:14.902 (367ms)&#xA;&gt; Enter [AfterAll] component update with renovate - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:214 @ 05/06/26 07:26:14.902&#xA;&lt; Exit [AfterAll] component update with renovate - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:214 @ 05/06/26 07:26:34.616 (19.714s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:26:34.616&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:26:34.616 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="105.378999723">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:54 @ 05/06/26 07:02:05.963&#xA;&lt; Exit [BeforeAll] PaC component build - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:54 @ 05/06/26 07:02:50.069 (44.107s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:117 @ 05/06/26 07:02:50.07&#xA;Image repository for component gl-test-custom-default-aosngx in namespace build-e2e-tlun do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component gl-test-custom-default-aosngx in namespace build-e2e-tlun do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:117 @ 05/06/26 07:03:20.105 (30.036s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:136 @ 05/06/26 07:03:20.106&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:136 @ 05/06/26 07:03:51.341 (31.235s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:51.341&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:51.341 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.010468735">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:153 @ 05/06/26 07:03:51.342&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:153 @ 05/06/26 07:03:51.352 (10ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:51.352&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:51.352 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.029178007">
              <system-err>&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:176 @ 05/06/26 07:03:51.353&#xA;PipelineRun has not been created yet for the component build-e2e-tlun/gl-test-custom-branch-kwkepl&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:176 @ 05/06/26 07:04:11.382 (20.029s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:11.382&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:11.382 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000245476">
              <system-err>&gt; Enter [It] build pipeline uses the correct serviceAccount - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:191 @ 05/06/26 07:04:11.382&#xA;&lt; Exit [It] build pipeline uses the correct serviceAccount - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:191 @ 05/06/26 07:04:11.382 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:11.382&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:11.382 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007460918">
              <system-err>&gt; Enter [It] component build status is set correctly - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:195 @ 05/06/26 07:04:11.383&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;enabled&#34;,&#34;merge-url&#34;:&#34;https://gitlab.com/konflux-qe/devfile-sample-hello-world-bquygh/-/merge_requests/1&#34;,&#34;configuration-time&#34;:&#34;Wed, 06 May 2026 07:03:49 UTC&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;state: enabled&#xA;mergeUrl: https://gitlab.com/konflux-qe/devfile-sample-hello-world-bquygh/-/merge_requests/1&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Wed, 06 May 2026 07:03:49 UTC&#xA;&lt; Exit [It] component build status is set correctly - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:195 @ 05/06/26 07:04:11.39 (7ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:11.39&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:11.39 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.933048124">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:225 @ 05/06/26 07:04:11.39&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:225 @ 05/06/26 07:04:12.323 (933ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:12.323&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:12.323 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.273655702">
              <system-err>&gt; Enter [It] created image repo is private - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:243 @ 05/06/26 07:04:12.324&#xA;&lt; Exit [It] created image repo is private - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:243 @ 05/06/26 07:04:12.597 (273ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:12.597&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:12.597 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="21.060406189">
              <system-err>&gt; Enter [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:249 @ 05/06/26 07:04:12.598&#xA;&lt; Exit [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:249 @ 05/06/26 07:04:33.658 (21.06s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:33.658&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:33.658 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.182831813">
              <system-err>&gt; Enter [It] PR branch should not exist in the repo - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:265 @ 05/06/26 07:04:33.659&#xA;&lt; Exit [It] PR branch should not exist in the repo - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:265 @ 05/06/26 07:04:33.841 (182ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:33.842&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:33.842 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.012934749">
              <system-err>&gt; Enter [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:278 @ 05/06/26 07:04:33.842&#xA;&lt; Exit [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:278 @ 05/06/26 07:04:34.854 (1.012s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:34.855&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:34.855 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="30.061942356">
              <system-err>&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:306 @ 05/06/26 07:04:34.856&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:306 @ 05/06/26 07:04:44.886 (10.03s)&#xA;&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:332 @ 05/06/26 07:04:44.886&#xA;PipelineRun has not been created yet for the component build-e2e-tlun/gl-test-custom-branch-kwkepl&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:332 @ 05/06/26 07:05:04.917 (20.031s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:05:04.917&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:05:04.917 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.271022574">
              <system-err>&gt; Enter [It] should lead to a PaC init PR creation - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:347 @ 05/06/26 07:05:04.918&#xA;&lt; Exit [It] should lead to a PaC init PR creation - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:347 @ 05/06/26 07:05:05.189 (271ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:05:05.189&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:05:05.189 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="531.153669897">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:365 @ 05/06/26 07:05:05.189&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-dffrr found for Component build-e2e-tlun/gl-test-custom-branch-kwkepl&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-dffrr reason: Cancelled&#xA;an error happened during storing pipelineRun log build-e2e-tlun:gl-test-custom-branch-kwkepl-on-pull-request-dffrr: container &#34;prepare&#34; in pod &#34;gl-test-custom-branch-kwkepl-on-pull-request-pmtwb-init-pod&#34; is waiting to start: PodInitializing&#xA;failed to get logs for PipelineRun build-e2e-tlun:gl-test-custom-branch-kwkepl-on-pull-request-dffrr: container &#34;prepare&#34; in pod &#34;gl-test-custom-branch-kwkepl-on-pull-request-pmtwb-init-pod&#34; is waiting to start: PodInitializing&#xA;attempt 1/3: PipelineRun &#34;gl-test-custom-branch-kwkepl-on-pull-request-dffrr&#34; failed: &#xA; pod: gl-test-custom-branch-kwkepl-on-pull-request-pmtwb-init-pod | init container: prepare&#xA;New PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk found after retrigger for component build-e2e-tlun/gl-test-custom-branch-kwkepl&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk found for Component build-e2e-tlun/gl-test-custom-branch-kwkepl&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-h2zzk reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:365 @ 05/06/26 07:13:56.343 (8m51.153s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:56.343&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:56.343 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.00750835">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:371 @ 05/06/26 07:13:56.343&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:371 @ 05/06/26 07:13:57.35 (1.007s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:57.351&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:57.351 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.288989189">
              <system-err>&gt; Enter [It] created image repo is public - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:390 @ 05/06/26 07:13:57.351&#xA;&lt; Exit [It] created image repo is public - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:390 @ 05/06/26 07:13:57.64 (289ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:57.64&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:57.64 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.335459619">
              <system-err>&gt; Enter [It] image tag is updated successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:396 @ 05/06/26 07:13:57.641&#xA;Image tag quay.io/redhat-appstudio-qe/build-e2e-tlun/gl-test-custom-branch-kwkepl:on-pr-994f526d1a356a4e5cbe347fadcc937539826f1a successfully found in Quay&#xA;&lt; Exit [It] image tag is updated successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:396 @ 05/06/26 07:13:57.976 (335ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:57.976&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:57.976 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.543496605">
              <system-err>&gt; Enter [It] should ensure pruning labels are set - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:425 @ 05/06/26 07:13:57.977&#xA;&lt; Exit [It] should ensure pruning labels are set - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:425 @ 05/06/26 07:13:58.52 (543ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:58.52&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:58.52 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="8.642714835">
              <system-err>&gt; Enter [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:439 @ 05/06/26 07:13:58.52&#xA;&lt; Exit [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:439 @ 05/06/26 07:14:07.056 (8.535s)&#xA;&gt; Enter [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:324 @ 05/06/26 07:14:07.056&#xA;&lt; Exit [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:324 @ 05/06/26 07:14:07.163 (107ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:14:07.163&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:14:07.163 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.955958215">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is updated - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:454 @ 05/06/26 07:14:07.163&#xA;created file sha: d631d01eeec9681668a5a1547deb9bfaa4914185&#xA;&lt; Exit [BeforeAll] when the PaC init branch is updated - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:454 @ 05/06/26 07:14:08.089 (926ms)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:464 @ 05/06/26 07:14:08.089&#xA;PipelineRun has not been created yet for the component build-e2e-tlun/gl-test-custom-branch-kwkepl&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:464 @ 05/06/26 07:14:28.119 (20.03s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:14:28.119&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:14:28.119 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.209346056">
              <system-err>&gt; Enter [It] should lead to a PaC init PR update - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:479 @ 05/06/26 07:14:28.12&#xA;&lt; Exit [It] should lead to a PaC init PR update - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:479 @ 05/06/26 07:14:28.329 (209ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:14:28.329&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:14:28.329 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="300.026251701">
              <system-err>&gt; Enter [It] PipelineRun should eventually finish - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:498 @ 05/06/26 07:14:28.33&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr found for Component build-e2e-tlun/gl-test-custom-branch-kwkepl&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-pull-request-7lgwr reason: Succeeded&#xA;&lt; Exit [It] PipelineRun should eventually finish - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:498 @ 05/06/26 07:19:28.355 (5m0.026s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:19:28.356&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:19:28.356 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.329437068">
              <system-err>&gt; Enter [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:504 @ 05/06/26 07:19:28.357&#xA;&lt; Exit [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:504 @ 05/06/26 07:19:28.685 (329ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:19:28.686&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:19:28.686 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="21.354552828">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is merged - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:520 @ 05/06/26 07:19:28.687&#xA;merged result sha: cb8115a776200aa9b1f08936eb3875dfaab386a8&#xA;&lt; Exit [BeforeAll] when the PaC init branch is merged - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:520 @ 05/06/26 07:19:29.927 (1.241s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:530 @ 05/06/26 07:19:29.928&#xA;PipelineRun has not been created yet for the component build-e2e-tlun/gl-test-custom-branch-kwkepl&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:530 @ 05/06/26 07:19:50.041 (20.113s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:19:50.041&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:19:50.041 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="300.019916267">
              <system-err>&gt; Enter [It] pipelineRun should eventually finish - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:546 @ 05/06/26 07:19:50.042&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn found for Component build-e2e-tlun/gl-test-custom-branch-kwkepl&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Running&#xA;PipelineRun gl-test-custom-branch-kwkepl-on-push-jrhwn reason: Succeeded&#xA;&lt; Exit [It] pipelineRun should eventually finish - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:546 @ 05/06/26 07:24:50.061 (5m0.02s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:24:50.061&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:24:50.061 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.347288132">
              <system-err>&gt; Enter [It] does not have expiration set - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:552 @ 05/06/26 07:24:50.062&#xA;&lt; Exit [It] does not have expiration set - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:552 @ 05/06/26 07:24:50.409 (347ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:24:50.409&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:24:50.409 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="121.050067691">
              <system-err>&gt; Enter [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:564 @ 05/06/26 07:24:50.41&#xA;waiting for one minute and expecting to not trigger a PipelineRun&#xA;&lt; Exit [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:564 @ 05/06/26 07:26:51.46 (2m1.05s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:26:51.46&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:26:51.46 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.27014595">
              <system-err>&gt; Enter [It] image repo is updated to private - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:595 @ 05/06/26 07:26:51.46&#xA;&lt; Exit [It] image repo is updated to private - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:595 @ 05/06/26 07:26:51.73 (270ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:26:51.73&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:26:51.73 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="7.249375811">
              <system-err>&gt; Enter [BeforeAll] when the component is removed - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:649 @ 05/06/26 07:26:51.731&#xA;&lt; Exit [BeforeAll] when the component is removed - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:649 @ 05/06/26 07:26:52.759 (1.027s)&#xA;&gt; Enter [It] related image repo and robot accounts deleted - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:661 @ 05/06/26 07:26:52.759&#xA;&lt; Exit [It] related image repo and robot accounts deleted - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:661 @ 05/06/26 07:26:58.98 (6.221s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:26:58.981&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:26:58.981 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="2.517701858">
              <system-err>&gt; Enter [It] purge PR is created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:679 @ 05/06/26 07:26:58.981&#xA;Found purge PR with id: 3&#xA;&lt; Exit [It] purge PR is created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:679 @ 05/06/26 07:26:59.17 (188ms)&#xA;&gt; Enter [AfterAll] PaC component build - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:101 @ 05/06/26 07:26:59.17&#xA;&lt; Exit [AfterAll] PaC component build - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:101 @ 05/06/26 07:27:01.498 (2.329s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:27:01.499&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:27:01.499 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="74.78158292">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:54 @ 05/06/26 07:02:05.962&#xA;&lt; Exit [BeforeAll] PaC component build - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:54 @ 05/06/26 07:02:23.716 (17.754s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:117 @ 05/06/26 07:02:23.717&#xA;Image repository for component gh-test-custom-default-rmvirc in namespace build-e2e-oogp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component gh-test-custom-default-rmvirc in namespace build-e2e-oogp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:117 @ 05/06/26 07:02:44.436 (20.72s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:136 @ 05/06/26 07:02:44.437&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:136 @ 05/06/26 07:03:20.743 (36.307s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:20.744&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:20.744 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.032352637">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:153 @ 05/06/26 07:03:20.745&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:153 @ 05/06/26 07:03:20.777 (32ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:20.777&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:20.777 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.087911136">
              <system-err>&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:176 @ 05/06/26 07:03:20.777&#xA;PipelineRun has not been created yet for the component build-e2e-oogp/gh-test-custom-branch-runxvv&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:176 @ 05/06/26 07:03:40.865 (20.088s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:40.865&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:40.865 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000437993">
              <system-err>&gt; Enter [It] build pipeline uses the correct serviceAccount - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:191 @ 05/06/26 07:03:40.866&#xA;&lt; Exit [It] build pipeline uses the correct serviceAccount - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:191 @ 05/06/26 07:03:40.866 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:40.866&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:40.866 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.029792736">
              <system-err>&gt; Enter [It] component build status is set correctly - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:195 @ 05/06/26 07:03:40.866&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;enabled&#34;,&#34;merge-url&#34;:&#34;https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vleold/pull/1&#34;,&#34;configuration-time&#34;:&#34;Wed, 06 May 2026 07:03:17 UTC&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;state: enabled&#xA;mergeUrl: https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vleold/pull/1&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Wed, 06 May 2026 07:03:17 UTC&#xA;&lt; Exit [It] component build status is set correctly - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:195 @ 05/06/26 07:03:40.896 (29ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:40.896&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:40.896 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.475347722">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:225 @ 05/06/26 07:03:40.897&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:225 @ 05/06/26 07:03:42.372 (1.475s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:42.372&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:42.372 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.283096958">
              <system-err>&gt; Enter [It] created image repo is private - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:243 @ 05/06/26 07:03:42.373&#xA;&lt; Exit [It] created image repo is private - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:243 @ 05/06/26 07:03:42.655 (283ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:42.655&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:42.655 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="7.092268446">
              <system-err>&gt; Enter [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:249 @ 05/06/26 07:03:42.656&#xA;&lt; Exit [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:249 @ 05/06/26 07:03:49.748 (7.092s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:49.748&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:49.748 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.125633161">
              <system-err>&gt; Enter [It] PR branch should not exist in the repo - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:265 @ 05/06/26 07:03:49.749&#xA;&lt; Exit [It] PR branch should not exist in the repo - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:265 @ 05/06/26 07:03:49.874 (125ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:49.874&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:03:49.874 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="15.48559327">
              <system-err>&gt; Enter [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:278 @ 05/06/26 07:03:49.875&#xA;&lt; Exit [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:278 @ 05/06/26 07:04:05.36 (15.485s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:05.36&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:05.36 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="40.120985469">
              <system-err>&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:306 @ 05/06/26 07:04:05.361&#xA;Image repository for component gh-test-custom-branch-runxvv in namespace build-e2e-oogp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component gh-test-custom-branch-runxvv in namespace build-e2e-oogp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:306 @ 05/06/26 07:04:25.446 (20.085s)&#xA;&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:332 @ 05/06/26 07:04:25.446&#xA;PipelineRun has not been created yet for the component build-e2e-oogp/gh-test-custom-branch-runxvv&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:332 @ 05/06/26 07:04:45.482 (20.036s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:45.482&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:45.482 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.268669471">
              <system-err>&gt; Enter [It] should lead to a PaC init PR creation - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:347 @ 05/06/26 07:04:45.483&#xA;&lt; Exit [It] should lead to a PaC init PR creation - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:347 @ 05/06/26 07:04:45.751 (268ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:45.751&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:04:45.751 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="540.01756707">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:365 @ 05/06/26 07:04:45.752&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 found for Component build-e2e-oogp/gh-test-custom-branch-runxvv&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-7pjz4 reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:365 @ 05/06/26 07:13:45.769 (9m0.017s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:45.769&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:45.769 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.509277859">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:371 @ 05/06/26 07:13:45.77&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:371 @ 05/06/26 07:13:47.278 (1.509s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:47.279&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:47.279 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.322161235">
              <system-err>&gt; Enter [It] created image repo is public - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:390 @ 05/06/26 07:13:47.279&#xA;&lt; Exit [It] created image repo is public - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:390 @ 05/06/26 07:13:47.601 (322ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:47.601&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:47.601 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.35995846">
              <system-err>&gt; Enter [It] image tag is updated successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:396 @ 05/06/26 07:13:47.602&#xA;Image tag quay.io/redhat-appstudio-qe/build-e2e-oogp/gh-test-custom-branch-runxvv:on-pr-68c71a27cf8c04591cebefa1a4af281195839284 successfully found in Quay&#xA;&lt; Exit [It] image tag is updated successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:396 @ 05/06/26 07:13:47.962 (360ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:47.962&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:47.962 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.553777926">
              <system-err>&gt; Enter [It] should ensure pruning labels are set - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:425 @ 05/06/26 07:13:47.962&#xA;&lt; Exit [It] should ensure pruning labels are set - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:425 @ 05/06/26 07:13:48.516 (553ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:48.516&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:48.516 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.501298166">
              <system-err>&gt; Enter [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:439 @ 05/06/26 07:13:48.516&#xA;&lt; Exit [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:439 @ 05/06/26 07:13:48.947 (430ms)&#xA;&gt; Enter [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:324 @ 05/06/26 07:13:48.947&#xA;&lt; Exit [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:324 @ 05/06/26 07:13:49.017 (70ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:49.018&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:13:49.018 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.803833717">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is updated - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:454 @ 05/06/26 07:13:49.018&#xA;created file sha: a00bbbdb0f95948790056777b5d94073af398fb4&#xA;&lt; Exit [BeforeAll] when the PaC init branch is updated - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:454 @ 05/06/26 07:13:49.802 (784ms)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:464 @ 05/06/26 07:13:49.802&#xA;PipelineRun has not been created yet for the component build-e2e-oogp/gh-test-custom-branch-runxvv&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:464 @ 05/06/26 07:14:09.822 (20.02s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:14:09.822&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:14:09.822 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.225533464">
              <system-err>&gt; Enter [It] should lead to a PaC init PR update - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:479 @ 05/06/26 07:14:09.822&#xA;&lt; Exit [It] should lead to a PaC init PR update - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:479 @ 05/06/26 07:14:10.047 (225ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:14:10.048&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:14:10.048 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="300.024620001">
              <system-err>&gt; Enter [It] PipelineRun should eventually finish - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:498 @ 05/06/26 07:14:10.048&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 found for Component build-e2e-oogp/gh-test-custom-branch-runxvv&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-pull-request-t4lk2 reason: Succeeded&#xA;&lt; Exit [It] PipelineRun should eventually finish - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:498 @ 05/06/26 07:19:10.073 (5m0.024s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:19:10.073&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:19:10.073 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.497387359">
              <system-err>&gt; Enter [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:504 @ 05/06/26 07:19:10.073&#xA;&lt; Exit [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:504 @ 05/06/26 07:19:10.57 (497ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:19:10.57&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:19:10.57 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="22.555546144">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is merged - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:520 @ 05/06/26 07:19:10.571&#xA;merged result sha: 67eaa06beb8eb2a4dc3b062ddfb14680faf65a20&#xA;&lt; Exit [BeforeAll] when the PaC init branch is merged - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:520 @ 05/06/26 07:19:13.088 (2.517s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:530 @ 05/06/26 07:19:13.088&#xA;PipelineRun has not been created yet for the component build-e2e-oogp/gh-test-custom-branch-runxvv&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:530 @ 05/06/26 07:19:33.126 (20.038s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:19:33.126&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:19:33.126 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="320.295973987">
              <system-err>&gt; Enter [It] pipelineRun should eventually finish - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:546 @ 05/06/26 07:19:33.127&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc found for Component build-e2e-oogp/gh-test-custom-branch-runxvv&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Running&#xA;PipelineRun gh-test-custom-branch-runxvv-on-push-rpjkc reason: Succeeded&#xA;&lt; Exit [It] pipelineRun should eventually finish - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:546 @ 05/06/26 07:24:53.423 (5m20.296s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:24:53.423&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:24:53.423 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.333168942">
              <system-err>&gt; Enter [It] does not have expiration set - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:552 @ 05/06/26 07:24:53.424&#xA;&lt; Exit [It] does not have expiration set - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:552 @ 05/06/26 07:24:53.756 (333ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:24:53.757&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:24:53.757 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="123.151796204">
              <system-err>&gt; Enter [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:564 @ 05/06/26 07:24:53.757&#xA;waiting for one minute and expecting to not trigger a PipelineRun&#xA;&lt; Exit [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:564 @ 05/06/26 07:26:56.909 (2m3.151s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:26:56.909&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:26:56.909 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.277503684">
              <system-err>&gt; Enter [It] image repo is updated to private - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:595 @ 05/06/26 07:26:56.909&#xA;&lt; Exit [It] image repo is updated to private - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:595 @ 05/06/26 07:26:57.187 (277ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:26:57.187&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:26:57.187 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="7.768624567">
              <system-err>&gt; Enter [BeforeAll] when the component is removed - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:649 @ 05/06/26 07:26:57.188&#xA;&lt; Exit [BeforeAll] when the component is removed - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:649 @ 05/06/26 07:26:58.221 (1.033s)&#xA;&gt; Enter [It] related image repo and robot accounts deleted - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:661 @ 05/06/26 07:26:58.221&#xA;&lt; Exit [It] related image repo and robot accounts deleted - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:661 @ 05/06/26 07:27:04.956 (6.735s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:27:04.956&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:27:04.956 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.155083567">
              <system-err>&gt; Enter [It] purge PR is created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:679 @ 05/06/26 07:27:04.957&#xA;Found purge PR with id: 3&#xA;&lt; Exit [It] purge PR is created successfully - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:679 @ 05/06/26 07:27:05.237 (280ms)&#xA;&gt; Enter [AfterAll] PaC component build - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:101 @ 05/06/26 07:27:05.237&#xA;&lt; Exit [AfterAll] PaC component build - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:101 @ 05/06/26 07:27:06.112 (875ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:27:06.112&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/pac_build.go:28 @ 05/06/26 07:27:06.112 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory go-component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="23.674047763">
              <system-err>&gt; Enter [BeforeAll] test pac with multiple components using same repository - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:40 @ 05/06/26 07:02:05.761&#xA;&lt; Exit [BeforeAll] test pac with multiple components using same repository - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:40 @ 05/06/26 07:02:19.398 (13.637s)&#xA;&gt; Enter [It] creates component with context directory go-component - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:106 @ 05/06/26 07:02:19.398&#xA;&lt; Exit [It] creates component with context directory go-component - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:106 @ 05/06/26 07:02:29.435 (10.036s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:02:29.435&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:02:29.435 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component go-component-xmjfha [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="40.045948854">
              <system-err>&gt; Enter [It] triggers a PipelineRun for component go-component-xmjfha - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:125 @ 05/06/26 07:02:29.436&#xA;PipelineRun has not been created yet for the component build-e2e-svpu/go-component-xmjfha&#xA;PipelineRun has not been created yet for the component build-e2e-svpu/go-component-xmjfha&#xA;&lt; Exit [It] triggers a PipelineRun for component go-component-xmjfha - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:125 @ 05/06/26 07:03:09.481 (40.046s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:03:09.481&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:03:09.481 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component go-component-xmjfha [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="0.442546382">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for component go-component-xmjfha - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:140 @ 05/06/26 07:03:09.482&#xA;&lt; Exit [It] should lead to a PaC PR creation for component go-component-xmjfha - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:140 @ 05/06/26 07:03:09.924 (442ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:03:09.924&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:03:09.924 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component go-component-xmjfha [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="1680.01258309">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for component go-component-xmjfha - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:159 @ 05/06/26 07:03:09.925&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt found for Component build-e2e-svpu/go-component-xmjfha&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: ResolvingTaskRef&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Running&#xA;PipelineRun go-component-xmjfha-on-pull-request-cz5gt reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for component go-component-xmjfha - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:159 @ 05/06/26 07:31:09.937 (28m0.012s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:31:09.937&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:31:09.937 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="1.97687561">
              <system-err>&gt; Enter [It] merging the PR should be successful - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:164 @ 05/06/26 07:31:09.938&#xA;merged result sha: ec76752de61822742169c18520774ce1329f711e for PR #32907&#xA;&lt; Exit [It] merging the PR should be successful - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:164 @ 05/06/26 07:31:11.914 (1.977s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:31:11.915&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:31:11.915 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="20.022569811">
              <system-err>&gt; Enter [It] leads to triggering on push PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:174 @ 05/06/26 07:31:11.915&#xA;Push PipelineRun has not been created yet for the component build-e2e-svpu/go-component-xmjfha&#xA;&lt; Exit [It] leads to triggering on push PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:174 @ 05/06/26 07:31:31.937 (20.022s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:31:31.938&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:31:31.938 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory python-component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="10.056669713">
              <system-err>&gt; Enter [It] creates component with context directory python-component - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:106 @ 05/06/26 07:31:31.938&#xA;&lt; Exit [It] creates component with context directory python-component - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:106 @ 05/06/26 07:31:41.995 (10.056s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:31:41.995&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:31:41.995 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component python-component-wdoqwb [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="20.02377092">
              <system-err>&gt; Enter [It] triggers a PipelineRun for component python-component-wdoqwb - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:125 @ 05/06/26 07:31:41.995&#xA;PipelineRun has not been created yet for the component build-e2e-svpu/python-component-wdoqwb&#xA;&lt; Exit [It] triggers a PipelineRun for component python-component-wdoqwb - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:125 @ 05/06/26 07:32:02.019 (20.023s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:32:02.019&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:32:02.019 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component python-component-wdoqwb [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="0.374881034">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for component python-component-wdoqwb - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:140 @ 05/06/26 07:32:02.02&#xA;&lt; Exit [It] should lead to a PaC PR creation for component python-component-wdoqwb - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:140 @ 05/06/26 07:32:02.394 (374ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:32:02.394&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:32:02.394 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component python-component-wdoqwb [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="380.018141161">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for component python-component-wdoqwb - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:159 @ 05/06/26 07:32:02.395&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx found for Component build-e2e-svpu/python-component-wdoqwb&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Running&#xA;PipelineRun python-component-wdoqwb-on-pull-request-prfbx reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for component python-component-wdoqwb - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:159 @ 05/06/26 07:38:22.413 (6m20.018s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:38:22.413&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:38:22.413 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="1.826262158">
              <system-err>&gt; Enter [It] merging the PR should be successful - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:164 @ 05/06/26 07:38:22.414&#xA;merged result sha: c282517481cb9c18458aec3ad205bb0042f9c570 for PR #32910&#xA;&lt; Exit [It] merging the PR should be successful - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:164 @ 05/06/26 07:38:24.24 (1.826s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:38:24.24&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:38:24.24 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="20.020531839">
              <system-err>&gt; Enter [It] leads to triggering on push PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:174 @ 05/06/26 07:38:24.241&#xA;Push PipelineRun has not been created yet for the component build-e2e-svpu/python-component-wdoqwb&#xA;&lt; Exit [It] leads to triggering on push PipelineRun - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:174 @ 05/06/26 07:38:44.261 (20.02s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:38:44.261&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:38:44.261 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only one component is changed [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="2.83102358">
              <system-err>&gt; Enter [It] only one component is changed - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:190 @ 05/06/26 07:38:44.262&#xA;PR #32913 got created with sha aa9e6940b586d05c6adbcaf1da9a090cc0bfb1b4&#xA;&lt; Exit [It] only one component is changed - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:190 @ 05/06/26 07:38:47.092 (2.831s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:38:47.093&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:38:47.093 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only related pipelinerun should be triggered [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="20.023891278">
              <system-err>&gt; Enter [It] only related pipelinerun should be triggered - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:205 @ 05/06/26 07:38:47.093&#xA;on pull PiplelineRun has not been created yet for the PR&#xA;&lt; Exit [It] only related pipelinerun should be triggered - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:205 @ 05/06/26 07:39:07.117 (20.024s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:39:07.117&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:39:07.117 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when a components is created with same git url in different namespace should fail to configure PaC for the component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="20.338472070999998">
              <system-err>&gt; Enter [BeforeAll] when a components is created with same git url in different namespace - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:223 @ 05/06/26 07:39:07.117&#xA;&lt; Exit [BeforeAll] when a components is created with same git url in different namespace - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:223 @ 05/06/26 07:39:19.292 (12.175s)&#xA;&gt; Enter [It] should fail to configure PaC for the component - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:264 @ 05/06/26 07:39:19.292&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;error&#34;,&#34;error-id&#34;:53,&#34;error-message&#34;:&#34;53: Git repository is already handled by Pipelines as Code&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;build status: &amp;{State:error MergeUrl: ConfigurationTime: ErrorInfo:{ErrId:53 ErrMessage:53: Git repository is already handled by Pipelines as Code}}&#xA;&lt; Exit [It] should fail to configure PaC for the component - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:264 @ 05/06/26 07:39:19.301 (9ms)&#xA;&gt; Enter [AfterAll] when a components is created with same git url in different namespace - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:253 @ 05/06/26 07:39:19.301&#xA;&lt; Exit [AfterAll] when a components is created with same git url in different namespace - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:253 @ 05/06/26 07:39:19.389 (88ms)&#xA;&gt; Enter [AfterAll] test pac with multiple components using same repository - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:68 @ 05/06/26 07:39:19.389&#xA;&lt; Exit [AfterAll] test pac with multiple components using same repository - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:68 @ 05/06/26 07:39:27.455 (8.067s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:39:27.456&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/multi_component.go:28 @ 05/06/26 07:39:27.456 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A creates the Component A successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="55.644285708">
              <system-err>&gt; Enter [BeforeAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:60 @ 05/06/26 07:02:05.866&#xA;Successfully acquired repository lock for namespace group-uztv&#xA;&lt; Exit [BeforeAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:60 @ 05/06/26 07:02:31.466 (25.599s)&#xA;&gt; Enter [It] creates the Component A successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:205 @ 05/06/26 07:02:31.466&#xA;Image repository for component go-component-dlsyll in namespace group-uztv do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component go-component-dlsyll in namespace group-uztv do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;&lt; Exit [It] creates the Component A successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:205 @ 05/06/26 07:03:01.51 (30.045s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:03:01.51&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:03:01.511 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A triggers a Build PipelineRun for componentA go-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="40.044943422">
              <system-err>&gt; Enter [It] triggers a Build PipelineRun for componentA go-component - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:213 @ 05/06/26 07:03:01.511&#xA;Build PipelineRun has not been created yet for the componentA group-uztv/go-component-dlsyll&#xA;Build PipelineRun has not been created yet for the componentA group-uztv/go-component-dlsyll&#xA;&lt; Exit [It] triggers a Build PipelineRun for componentA go-component - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:213 @ 05/06/26 07:03:41.555 (40.044s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:03:41.556&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:03:41.556 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000324479">
              <system-err>&gt; Enter [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:227 @ 05/06/26 07:03:41.557&#xA;&lt; Exit [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:227 @ 05/06/26 07:03:41.557 (0s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:03:41.557&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:03:41.557 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A should lead to build PipelineRunA finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="896.905646834">
              <system-err>&gt; Enter [It] should lead to build PipelineRunA finishing successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:231 @ 05/06/26 07:03:41.557&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 found for Component group-uztv/go-component-dlsyll&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: PipelineRunStopping&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: PipelineRunStopping&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: PipelineRunStopping&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: PipelineRunStopping&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: PipelineRunStopping&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: PipelineRunStopping&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: PipelineRunStopping&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: PipelineRunStopping&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: PipelineRunStopping&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: PipelineRunStopping&#xA;PipelineRun go-component-dlsyll-on-pull-request-j8lb7 reason: Failed&#xA;attempt 1/3: PipelineRun &#34;go-component-dlsyll-on-pull-request-j8lb7&#34; failed: &#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-apply-tags-pod | init container: prepare&#xA;2026/05/06 07:07:29 Entrypoint initialization&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-apply-tags-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-05-06T07:07:33Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#34;&#xA;time=&#34;2026-05-06T07:07:33Z&#34; level=info msg=&#34;[param] digest: sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#34;&#xA;time=&#34;2026-05-06T07:07:33Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-05-06T07:07:34Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-build-container-pod | init container: prepare&#xA;2026/05/06 07:04:24 Entrypoint initialization&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-build-container-pod | init container: place-scripts&#xA;2026/05/06 07:04:25 Decoded script /tekton/scripts/script-0-qx2w7&#xA;2026/05/06 07:04:25 Decoded script /tekton/scripts/script-1-4fwjt&#xA;2026/05/06 07:04:25 Decoded script /tekton/scripts/script-2-4pnv4&#xA;2026/05/06 07:04:25 Decoded script /tekton/scripts/script-3-88dr7&#xA;2026/05/06 07:04:25 Decoded script /tekton/scripts/script-4-pj94w&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-build-container-pod | init container: working-dir-initializer&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-build-container-pod | container step-build: &#xA;[2026-05-06T07:04:48,741050750+00:00] Validate context path&#xA;[2026-05-06T07:04:48,744384080+00:00] Update CA trust&#xA;[2026-05-06T07:04:48,745466996+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-06T07:04:50,826205149+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-06T07:04:50,832586533+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-06T07:04:51,005323489+00:00] Setup prefetched&#xA;Trying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14...&#xA;Getting image source signatures&#xA;Checking if image destination supports signatures&#xA;Copying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4&#xA;Copying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3&#xA;Copying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09&#xA;Copying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83&#xA;Copying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301&#xA;Writing manifest to image destination&#xA;Storing signatures&#xA;[2026-05-06T07:05:33,886531865+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-06T07:04:51Z&#34;,&#xA;  &#34;com.redhat.component&#34;: &#34;go-toolset-container&#34;,&#xA;  &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;  &#34;description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;  &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;  &#34;io.k8s.description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;  &#34;io.k8s.display-name&#34;: &#34;Go 1.18.9&#34;,&#xA;  &#34;io.openshift.expose-services&#34;: &#34;&#34;,&#xA;  &#34;io.openshift.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;io.openshift.tags&#34;: &#34;builder,golang,golang118,rh-golang118,go&#34;,&#xA;  &#34;io.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;maintainer&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;name&#34;: &#34;rhel9/go-toolset&#34;,&#xA;  &#34;release&#34;: &#34;14&#34;,&#xA;  &#34;summary&#34;: &#34;Platform for building and running Go Applications&#34;,&#xA;  &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/rhel9/go-toolset/images/1.18.9-14&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;a5839952a803695473c9db1daaf20da0c2f5d74b&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;version&#34;: &#34;1.18.9&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;a5839952a803695473c9db1daaf20da0c2f5d74b&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/group-snapshot-multi-component&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;6h&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-06T07:04:51Z&#34;&#xA;}&#xA;[2026-05-06T07:05:33,932890978+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-06T07:05:33,936102719+00:00] Add secrets&#xA;[2026-05-06T07:05:33,943273237+00:00] Run buildah build&#xA;[2026-05-06T07:05:33,944300836+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=a5839952a803695473c9db1daaf20da0c2f5d74b --label org.opencontainers.image.revision=a5839952a803695473c9db1daaf20da0c2f5d74b --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/group-snapshot-multi-component --label quay.expires-after=6h --label build-date=2026-05-06T07:04:51Z --label org.opencontainers.image.created=2026-05-06T07:04:51Z --annotation org.opencontainers.image.revision=a5839952a803695473c9db1daaf20da0c2f5d74b --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/group-snapshot-multi-component --annotation org.opencontainers.image.created=2026-05-06T07:04:51Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.LG1zFp -t quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b . &#xA;STEP 1/10: FROM registry.access.redhat.com/ubi9/go-toolset:1.18.9-14&#xA;STEP 2/10: COPY . .&#xA;STEP 3/10: RUN go mod download&#xA;go: no module dependencies to download&#xA;STEP 4/10: RUN go build -o ./main&#xA;STEP 5/10: ENV PORT 8081&#xA;STEP 6/10: EXPOSE 8081&#xA;STEP 7/10: CMD [ &#34;./main&#34; ]&#xA;STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;a5839952a803695473c9db1daaf20da0c2f5d74b&#34; &#34;org.opencontainers.image.revision&#34;=&#34;a5839952a803695473c9db1daaf20da0c2f5d74b&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/group-snapshot-multi-component&#34; &#34;quay.expires-after&#34;=&#34;6h&#34; &#34;build-date&#34;=&#34;2026-05-06T07:04:51Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-06T07:04:51Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#xA;--&gt; b8f9381c0577&#xA;Successfully tagged quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#xA;b8f9381c05776cbf31c5baab8faf58bdc3d217edd13e9c6f593571aa7233b214&#xA;[2026-05-06T07:05:37,718864370+00:00] Unsetting proxy&#xA;[2026-05-06T07:05:37,720063460+00:00] Add metadata&#xA;Recording base image digests used&#xA;registry.access.redhat.com/ubi9/go-toolset:1.18.9-14 registry.access.redhat.com/ubi9/go-toolset:1.18.9-14@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51&#xA;Getting image source signatures&#xA;Copying blob sha256:f7673829dcd9e303cb63e80eef1ec0fb946f4c0baff605fb7c3180cd0d6c4277&#xA;Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;Copying config sha256:b8f9381c05776cbf31c5baab8faf58bdc3d217edd13e9c6f593571aa7233b214&#xA;Writing manifest to image destination&#xA;[2026-05-06T07:05:44,753424521+00:00] End build&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-build-container-pod | container step-push: &#xA;[2026-05-06T07:05:44,857893630+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-06T07:05:46,855189703+00:00] Convert image&#xA;[2026-05-06T07:05:46,856213107+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:go-component-dlsyll-on-pull-request-j8lb7-build-container&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b docker://quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:go-component-dlsyll-on-pull-request-j8lb7-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:f7673829dcd9e303cb63e80eef1ec0fb946f4c0baff605fb7c3180cd0d6c4277&#xA;Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;Copying config sha256:b8f9381c05776cbf31c5baab8faf58bdc3d217edd13e9c6f593571aa7233b214&#xA;Writing manifest to image destination&#xA;[2026-05-06T07:06:00,774243442+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /workspace/source/image-digest quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b docker://quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#xA;Getting image source signatures&#xA;Copying blob sha256:f7673829dcd9e303cb63e80eef1ec0fb946f4c0baff605fb7c3180cd0d6c4277&#xA;Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;Copying config sha256:b8f9381c05776cbf31c5baab8faf58bdc3d217edd13e9c6f593571aa7233b214&#xA;Writing manifest to image destination&#xA;sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631dquay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-05-06T07:06:01,576322403+00:00] End push&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-build-container-pod | container step-sbom-syft-generate: &#xA;[2026-05-06T07:06:01,911840150+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-05-06T07:06:22,978643480+00:00] End sbom-syft-generate&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-build-container-pod | container step-prepare-sboms: &#xA;[2026-05-06T07:06:23,179885689+00:00] Prepare SBOM&#xA;[2026-05-06T07:06:23,183584581+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-05-06 07:06:24,273 [INFO] mobster.log: Logging level set to 20&#xA;2026-05-06 07:06:24,702 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi9/go-toolset@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51&#xA;2026-05-06 07:06:25,338 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:25,470 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:25,772 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:25,905 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:26,256 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:26,373 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:26,766 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:26,929 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-06 07:06:26,929 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-05-06 07:06:26,929 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-05-06 07:06:26,931 [INFO] mobster.log: Contextual workflow completed in 2.33s&#xA;2026-05-06 07:06:27,071 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-05-06T07:06:27,149678612+00:00] End prepare-sboms&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-build-container-pod | container step-upload-sbom: &#xA;[2026-05-06T07:06:27,253907946+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b@sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll@sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d] to [quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:sha256-c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll@sha256:1534bb91dff0511621b27c11ef324d5a6631e91ad97da1897c1a80a94dd9f70d&#xA;[2026-05-06T07:06:30,977514090+00:00] End upload-sbom&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-build-image-index-pod | init container: prepare&#xA;2026/05/06 07:06:32 Entrypoint initialization&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-build-image-index-pod | init container: place-scripts&#xA;2026/05/06 07:06:33 Decoded script /tekton/scripts/script-0-d2hfv&#xA;2026/05/06 07:06:33 Decoded script /tekton/scripts/script-1-kc2nb&#xA;2026/05/06 07:06:33 Decoded script /tekton/scripts/script-2-fjv46&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-build-image-index-pod | container step-build: &#xA;[2026-05-06T07:07:20,426575020+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Running konflux-build-cli&#xA;time=&#34;2026-05-06T07:07:23Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#34;&#xA;time=&#34;2026-05-06T07:07:23Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b@sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d]&#34;&#xA;time=&#34;2026-05-06T07:07:23Z&#34; level=info msg=&#34;[param] buildah-format: docker&#34;&#xA;time=&#34;2026-05-06T07:07:23Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;time=&#34;2026-05-06T07:07:23Z&#34; level=info msg=&#34;[param] additional-tags: [go-component-dlsyll-on-pull-request-j8lb7-build-image-index]&#34;&#xA;time=&#34;2026-05-06T07:07:23Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;time=&#34;2026-05-06T07:07:23Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;time=&#34;2026-05-06T07:07:23Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;time=&#34;2026-05-06T07:07:23Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-06T07:07:23Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;time=&#34;2026-05-06T07:07:23Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#34;&#xA;time=&#34;2026-05-06T07:07:23Z&#34; level=info msg=&#34;buildah [stdout] 0015b58d5263160e1aff6c0c47dcaa5a3256a22f5d706fda881fdd9b72cdc073&#34; logger=CliExecutor&#xA;time=&#34;2026-05-06T07:07:23Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;{&#34;image_digest&#34;:&#34;sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll@sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll@sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#34;}&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-build-image-index-pod | container step-create-sbom: &#xA;The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-build-image-index-pod | container step-upload-sbom: &#xA;[2026-05-06T07:07:23,955701001+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-clair-scan-pod | init container: prepare&#xA;2026/05/06 07:08:44 Entrypoint initialization&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-clair-scan-pod | init container: place-scripts&#xA;2026/05/06 07:08:45 Decoded script /tekton/scripts/script-0-mmhp7&#xA;2026/05/06 07:08:45 Decoded script /tekton/scripts/script-1-mlrr8&#xA;2026/05/06 07:08:45 Decoded script /tekton/scripts/script-2-mh64f&#xA;2026/05/06 07:08:45 Decoded script /tekton/scripts/script-3-tcvnv&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-clair-scan-pod | container step-get-image-manifests: &#xA;Inspecting raw image manifest quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll@sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d.&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-clair-scan-pod | container step-get-vulnerabilities: &#xA;Running clair-action on amd64 image manifest...&#xA;�[90m2026-05-06T07:10:23Z�[0m �[32mINF�[0m �[1mmatchers created�[0m �[36mcomponent=�[0mlibvuln/New �[36mmatchers=�[0m[{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ruby&#34;,&#34;name&#34;:&#34;ruby-gem&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu&#34;,&#34;name&#34;:&#34;ubuntu-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel&#34;,&#34;name&#34;:&#34;rhel&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/aws&#34;,&#34;name&#34;:&#34;aws-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/photon&#34;,&#34;name&#34;:&#34;photon&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc&#34;,&#34;name&#34;:&#34;rhel-container-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/suse&#34;,&#34;name&#34;:&#34;suse&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/alpine&#34;,&#34;name&#34;:&#34;alpine-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/gobin&#34;,&#34;name&#34;:&#34;gobin&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/java&#34;,&#34;name&#34;:&#34;java-maven&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/oracle&#34;,&#34;name&#34;:&#34;oracle&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/debian&#34;,&#34;name&#34;:&#34;debian-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/python&#34;,&#34;name&#34;:&#34;python&#34;}]&#xA;�[90m2026-05-06T07:10:23Z�[0m �[32mINF�[0m �[1mlibvuln initialized�[0m �[36mcomponent=�[0mlibvuln/New&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mregistered configured scanners�[0m �[36mcomponent=�[0mlibindex/New&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mNewLayerScanner: constructing a new layer-scanner�[0m �[36mcomponent=�[0mindexer.NewLayerScanner&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mindex request start�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mstarting scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mmanifest to be scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d �[36mstate=�[0mCheckManifest&#xA;�[90m2026-05-06T07:10:25Z�[0m �[32mINF�[0m �[1mlayers fetch start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d �[36mstate=�[0mFetchLayers&#xA;�[90m2026-05-06T07:10:30Z�[0m �[32mINF�[0m �[1mlayers fetch success�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d �[36mstate=�[0mFetchLayers&#xA;�[90m2026-05-06T07:10:30Z�[0m �[32mINF�[0m �[1mlayers fetch done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d �[36mstate=�[0mFetchLayers&#xA;�[90m2026-05-06T07:10:30Z�[0m �[32mINF�[0m �[1mlayers scan start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d �[36mstate=�[0mScanLayers&#xA;�[90m2026-05-06T07:10:30Z�[0m �[32mINF�[0m �[1mfound buildinfo Dockerfile�[0m �[36mcomponent=�[0mrhel/rhcc/scanner.Scan �[36mkind=�[0mpackage �[36mlayer=�[0msha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991 �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d �[36mpath=�[0mroot/buildinfo/Dockerfile-ubi9-9.1.0-1782 �[36mscanner=�[0mrhel_containerscanner �[36mstate=�[0mScanLayers&#xA;�[90m2026-05-06T07:10:30Z�[0m �[32mINF�[0m �[1mfound buildinfo Dockerfile�[0m �[36mcomponent=�[0mrhel/rhcc/scanner.Scan �[36mkind=�[0mpackage �[36mlayer=�[0msha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975 �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d �[36mpath=�[0mroot/buildinfo/Dockerfile-ubi9-s2i-core-1-394 �[36mscanner=�[0mrhel_containerscanner �[36mstate=�[0mScanLayers&#xA;�[90m2026-05-06T07:10:30Z�[0m �[32mINF�[0m �[1mfound buildinfo Dockerfile�[0m �[36mcomponent=�[0mrhel/rhcc/scanner.Scan �[36mkind=�[0mpackage �[36mlayer=�[0msha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581 �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d �[36mpath=�[0mroot/buildinfo/Dockerfile-ubi9-s2i-base-1-421 �[36mscanner=�[0mrhel_containerscanner �[36mstate=�[0mScanLayers&#xA;�[90m2026-05-06T07:10:30Z�[0m �[32mINF�[0m �[1mfound buildinfo Dockerfile�[0m �[36mcomponent=�[0mrhel/rhcc/scanner.Scan �[36mkind=�[0mpackage �[36mlayer=�[0msha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670 �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d �[36mpath=�[0mroot/buildinfo/Dockerfile-rhel9-go-toolset-1.18.9-14 �[36mscanner=�[0mrhel_containerscanner �[36mstate=�[0mScanLayers&#xA;�[90m2026-05-06T07:10:32Z�[0m �[32mINF�[0m �[1mlayers scan done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d �[36mstate=�[0mScanLayers&#xA;�[90m2026-05-06T07:10:32Z�[0m �[32mINF�[0m �[1mstarting index manifest�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d �[36mstate=�[0mIndexManifest&#xA;�[90m2026-05-06T07:10:32Z�[0m �[32mINF�[0m �[1mfinishing scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d �[36mstate=�[0mIndexFinished&#xA;�[90m2026-05-06T07:10:32Z�[0m �[32mINF�[0m �[1mmanifest successfully scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d �[36mstate=�[0mIndexFinished&#xA;�[90m2026-05-06T07:10:33Z�[0m �[32mINF�[0m �[1mindex request done�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#xA;{&#xA;  &#34;manifest_hash&#34;: &#34;sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#34;,&#xA;  &#34;packages&#34;: {&#xA;    &#34;++K+RsmgWfVk2mj1+hzWKA==&#34;: {&#xA;      &#34;id&#34;: &#34;++K+RsmgWfVk2mj1+hzWKA==&#34;,&#xA;      &#34;name&#34;: &#34;zlib-devel&#34;,&#xA;      &#34;version&#34;: &#34;1.2.11-35.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;1.2.11-35.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+8O7w8gnK983LoZMdgIWhQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+8O7w8gnK983LoZMdgIWhQ==&#34;,&#xA;      &#34;name&#34;: &#34;kernel-headers&#34;,&#xA;      &#34;version&#34;: &#34;5.14.0-162.18.1.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;kernel&#34;,&#xA;        &#34;version&#34;: &#34;5.14.0-162.18.1.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;,&#xA;      &#34;name&#34;: &#34;libidn2&#34;,&#xA;      &#34;version&#34;: &#34;2.3.0-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libidn2&#34;,&#xA;        &#34;version&#34;: &#34;2.3.0-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+B22ALb6YCnXu+3s6afaLg==&#34;: {&#xA;      &#34;id&#34;: &#34;+B22ALb6YCnXu+3s6afaLg==&#34;,&#xA;      &#34;name&#34;: &#34;python3-decorator&#34;,&#xA;      &#34;version&#34;: &#34;4.4.2-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-decorator&#34;,&#xA;        &#34;version&#34;: &#34;4.4.2-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+LQ46YAn9giMKDZRMCUpfg==&#34;: {&#xA;      &#34;id&#34;: &#34;+LQ46YAn9giMKDZRMCUpfg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-lib&#34;,&#xA;      &#34;version&#34;: &#34;0.65-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+Mkqc/Y23wK8i6e0RDbi0w==&#34;: {&#xA;      &#34;id&#34;: &#34;+Mkqc/Y23wK8i6e0RDbi0w==&#34;,&#xA;      &#34;name&#34;: &#34;libstdc++&#34;,&#xA;      &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+jCn1wujuDa5B1uNvCdVnw==&#34;: {&#xA;      &#34;id&#34;: &#34;+jCn1wujuDa5B1uNvCdVnw==&#34;,&#xA;      &#34;name&#34;: &#34;device-mapper-libs&#34;,&#xA;      &#34;version&#34;: &#34;9:1.02.185-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lvm2&#34;,&#xA;        &#34;version&#34;: &#34;2.03.16-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+yIdH2Pb8SGFuXnry3uK/A==&#34;: {&#xA;      &#34;id&#34;: &#34;+yIdH2Pb8SGFuXnry3uK/A==&#34;,&#xA;      &#34;name&#34;: &#34;gdb&#34;,&#xA;      &#34;version&#34;: &#34;10.2-10.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;10.2-10.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/FMjm+UzO0PTaS3Td0lhkw==&#34;: {&#xA;      &#34;id&#34;: &#34;/FMjm+UzO0PTaS3Td0lhkw==&#34;,&#xA;      &#34;name&#34;: &#34;pkgconf-pkg-config&#34;,&#xA;      &#34;version&#34;: &#34;1.7.3-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pkgconf&#34;,&#xA;        &#34;version&#34;: &#34;1.7.3-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;,&#xA;      &#34;name&#34;: &#34;xz-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz&#34;,&#xA;        &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/dbWc/LExxt1O7duWFf9og==&#34;: {&#xA;      &#34;id&#34;: &#34;/dbWc/LExxt1O7duWFf9og==&#34;,&#xA;      &#34;name&#34;: &#34;libtirpc&#34;,&#xA;      &#34;version&#34;: &#34;1.3.3-0.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtirpc&#34;,&#xA;        &#34;version&#34;: &#34;1.3.3-0.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/t0e+LuglIbDcO/k67Hr2A==&#34;: {&#xA;      &#34;id&#34;: &#34;/t0e+LuglIbDcO/k67Hr2A==&#34;,&#xA;      &#34;name&#34;: &#34;elfutils-libs&#34;,&#xA;      &#34;version&#34;: &#34;0.187-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;elfutils&#34;,&#xA;        &#34;version&#34;: &#34;0.187-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/th8aUKrkgR3Sw9KSBM+CA==&#34;: {&#xA;      &#34;id&#34;: &#34;/th8aUKrkgR3Sw9KSBM+CA==&#34;,&#xA;      &#34;name&#34;: &#34;python3-subscription-manager-rhsm&#34;,&#xA;      &#34;version&#34;: &#34;1.29.30.1-1.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;subscription-manager&#34;,&#xA;        &#34;version&#34;: &#34;1.29.30.1-1.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;09fH92fqoWDOaYEpwQ9p2g==&#34;: {&#xA;      &#34;id&#34;: &#34;09fH92fqoWDOaYEpwQ9p2g==&#34;,&#xA;      &#34;name&#34;: &#34;ed&#34;,&#xA;      &#34;version&#34;: &#34;1.14.2-12.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ed&#34;,&#xA;        &#34;version&#34;: &#34;1.14.2-12.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0N0D43vK8KV4kQOq2LQn7g==&#34;: {&#xA;      &#34;id&#34;: &#34;0N0D43vK8KV4kQOq2LQn7g==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;      &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0QIby1L00NbGeIw8oxRQWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0QIby1L00NbGeIw8oxRQWQ==&#34;,&#xA;      &#34;name&#34;: &#34;zip&#34;,&#xA;      &#34;version&#34;: &#34;3.0-33.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zip&#34;,&#xA;        &#34;version&#34;: &#34;3.0-33.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0Yvc2+M8FAry625wuL4S5A==&#34;: {&#xA;      &#34;id&#34;: &#34;0Yvc2+M8FAry625wuL4S5A==&#34;,&#xA;      &#34;name&#34;: &#34;less&#34;,&#xA;      &#34;version&#34;: &#34;590-1.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;less&#34;,&#xA;        &#34;version&#34;: &#34;590-1.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0wIoN0pFyBSc9eVtRdIOWA==&#34;: {&#xA;      &#34;id&#34;: &#34;0wIoN0pFyBSc9eVtRdIOWA==&#34;,&#xA;      &#34;name&#34;: &#34;python3&#34;,&#xA;      &#34;version&#34;: &#34;3.9.14-1.el9_1.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;3.9.14-1.el9_1.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;13/XvLtRK2RDQlcsZc1BtQ==&#34;: {&#xA;      &#34;id&#34;: &#34;13/XvLtRK2RDQlcsZc1BtQ==&#34;,&#xA;      &#34;name&#34;: &#34;gdb-gdbserver&#34;,&#xA;      &#34;version&#34;: &#34;10.2-10.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;10.2-10.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;13i0QoQ6Q4yBI5RUf20lXA==&#34;: {&#xA;      &#34;id&#34;: &#34;13i0QoQ6Q4yBI5RUf20lXA==&#34;,&#xA;      &#34;name&#34;: &#34;libwebp-devel&#34;,&#xA;      &#34;version&#34;: &#34;1.2.0-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libwebp&#34;,&#xA;        &#34;version&#34;: &#34;1.2.0-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1GZ5tdSeZY3Wi3x9/AVQ2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;1GZ5tdSeZY3Wi3x9/AVQ2Q==&#34;,&#xA;      &#34;name&#34;: &#34;binutils-gold&#34;,&#xA;      &#34;version&#34;: &#34;2.35.2-24.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;2.35.2-24.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1T7WJ83NrIa0U7DlD1BR4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;1T7WJ83NrIa0U7DlD1BR4Q==&#34;,&#xA;      &#34;name&#34;: &#34;python-srpm-macros&#34;,&#xA;      &#34;version&#34;: &#34;3.9-52.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;3.9-52.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1XXuvf69/0I2dNHaU2UndQ==&#34;: {&#xA;      &#34;id&#34;: &#34;1XXuvf69/0I2dNHaU2UndQ==&#34;,&#xA;      &#34;name&#34;: &#34;patch&#34;,&#xA;      &#34;version&#34;: &#34;2.7.6-16.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;patch&#34;,&#xA;        &#34;version&#34;: &#34;2.7.6-16.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1dO83wB64hDLki3A4eA/Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;1dO83wB64hDLki3A4eA/Pg==&#34;,&#xA;      &#34;name&#34;: &#34;sqlite&#34;,&#xA;      &#34;version&#34;: &#34;3.34.1-6.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;3.34.1-6.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1h9uHE0QiXBO/zpJrT0VjA==&#34;: {&#xA;      &#34;id&#34;: &#34;1h9uHE0QiXBO/zpJrT0VjA==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;      &#34;version&#34;: &#34;6.2-8.20210508.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2-8.20210508.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1iUaGpv40BOJQUks5I0iYg==&#34;: {&#xA;      &#34;id&#34;: &#34;1iUaGpv40BOJQUks5I0iYg==&#34;,&#xA;      &#34;name&#34;: &#34;libicu&#34;,&#xA;      &#34;version&#34;: &#34;67.1-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;icu&#34;,&#xA;        &#34;version&#34;: &#34;67.1-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1m9sKqHTfU4F/K4fidg9cg==&#34;: {&#xA;      &#34;id&#34;: &#34;1m9sKqHTfU4F/K4fidg9cg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Exporter&#34;,&#xA;      &#34;version&#34;: &#34;5.74-461.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Exporter&#34;,&#xA;        &#34;version&#34;: &#34;5.74-461.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2REYKadw7TKFiuC+OnoHmA==&#34;: {&#xA;      &#34;id&#34;: &#34;2REYKadw7TKFiuC+OnoHmA==&#34;,&#xA;      &#34;name&#34;: &#34;rpm-build-libs&#34;,&#xA;      &#34;version&#34;: &#34;4.16.1.3-19.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;4.16.1.3-19.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2fg1ZRYCSPKKOgCxCcA36w==&#34;: {&#xA;      &#34;id&#34;: &#34;2fg1ZRYCSPKKOgCxCcA36w==&#34;,&#xA;      &#34;name&#34;: &#34;bzip2-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.0.8-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2&#34;,&#xA;        &#34;version&#34;: &#34;1.0.8-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2w8qE/d9mqIY/9+1qBBrPg==&#34;: {&#xA;      &#34;id&#34;: &#34;2w8qE/d9mqIY/9+1qBBrPg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-IO-Socket-IP&#34;,&#xA;      &#34;version&#34;: &#34;0.41-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-IO-Socket-IP&#34;,&#xA;        &#34;version&#34;: &#34;0.41-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3688bXyK/nwHthXLLVH24g==&#34;: {&#xA;      &#34;id&#34;: &#34;3688bXyK/nwHthXLLVH24g==&#34;,&#xA;      &#34;name&#34;: &#34;perl-overloading&#34;,&#xA;      &#34;version&#34;: &#34;0.02-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3DTA/XNFCCDFf6sfX96bGg==&#34;: {&#xA;      &#34;id&#34;: &#34;3DTA/XNFCCDFf6sfX96bGg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Errno&#34;,&#xA;      &#34;version&#34;: &#34;1.30-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3RQKCmep11B4hkfn96QJTA==&#34;: {&#xA;      &#34;id&#34;: &#34;3RQKCmep11B4hkfn96QJTA==&#34;,&#xA;      &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;      &#34;version&#34;: &#34;2:4.9-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;        &#34;version&#34;: &#34;4.9-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3iIPR0bjuCPQ2+48pSdeHg==&#34;: {&#xA;      &#34;id&#34;: &#34;3iIPR0bjuCPQ2+48pSdeHg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-IO&#34;,&#xA;      &#34;version&#34;: &#34;1.43-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4Aph2Qer6+KdCecFsU0TXg==&#34;: {&#xA;      &#34;id&#34;: &#34;4Aph2Qer6+KdCecFsU0TXg==&#34;,&#xA;      &#34;name&#34;: &#34;systemd-rpm-macros&#34;,&#xA;      &#34;version&#34;: &#34;250-12.el9_1.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;250-12.el9_1.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4DM2GB9KLL7/xWypPdz7vA==&#34;: {&#xA;      &#34;id&#34;: &#34;4DM2GB9KLL7/xWypPdz7vA==&#34;,&#xA;      &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;      &#34;version&#34;: &#34;2.31.1-3.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;2.31.1-3.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4ImdKzJ7uZoaviIayzuoUg==&#34;: {&#xA;      &#34;id&#34;: &#34;4ImdKzJ7uZoaviIayzuoUg==&#34;,&#xA;      &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;      &#34;version&#34;: &#34;1:16.18.1-3.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;16.18.1-3.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4Kw/w2gH7CYCOCv19cdYYA==&#34;: {&#xA;      &#34;id&#34;: &#34;4Kw/w2gH7CYCOCv19cdYYA==&#34;,&#xA;      &#34;name&#34;: &#34;perl-File-Path&#34;,&#xA;      &#34;version&#34;: &#34;2.18-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-File-Path&#34;,&#xA;        &#34;version&#34;: &#34;2.18-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;582nBqlxZXz0sTRmkFvU4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;582nBqlxZXz0sTRmkFvU4Q==&#34;,&#xA;      &#34;name&#34;: &#34;libxcb&#34;,&#xA;      &#34;version&#34;: &#34;1.13.1-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxcb&#34;,&#xA;        &#34;version&#34;: &#34;1.13.1-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5EpVrCQ4OYKiPYYEOuUcmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5EpVrCQ4OYKiPYYEOuUcmQ==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Scalar-List-Utils&#34;,&#xA;      &#34;version&#34;: &#34;4:1.56-461.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Scalar-List-Utils&#34;,&#xA;        &#34;version&#34;: &#34;1.56-461.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5JeNH+bHiuiK9wwBZqH10A==&#34;: {&#xA;      &#34;id&#34;: &#34;5JeNH+bHiuiK9wwBZqH10A==&#34;,&#xA;      &#34;name&#34;: &#34;libeconf&#34;,&#xA;      &#34;version&#34;: &#34;0.4.1-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libeconf&#34;,&#xA;        &#34;version&#34;: &#34;0.4.1-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5NZNFErDrBiBoorV+igTjg==&#34;: {&#xA;      &#34;id&#34;: &#34;5NZNFErDrBiBoorV+igTjg==&#34;,&#xA;      &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;      &#34;version&#34;: &#34;4.4.0-5.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;4.4.0-5.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5mmSudfrCeEmVSPweWmcVQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5mmSudfrCeEmVSPweWmcVQ==&#34;,&#xA;      &#34;name&#34;: &#34;librhsm&#34;,&#xA;      &#34;version&#34;: &#34;0.0.3-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;librhsm&#34;,&#xA;        &#34;version&#34;: &#34;0.0.3-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5oq4jjwqdEJHokHmXZ7fFA==&#34;: {&#xA;      &#34;id&#34;: &#34;5oq4jjwqdEJHokHmXZ7fFA==&#34;,&#xA;      &#34;name&#34;: &#34;dwz&#34;,&#xA;      &#34;version&#34;: &#34;0.14-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dwz&#34;,&#xA;        &#34;version&#34;: &#34;0.14-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5uy1J7qi/MafOdYJgaQeGw==&#34;: {&#xA;      &#34;id&#34;: &#34;5uy1J7qi/MafOdYJgaQeGw==&#34;,&#xA;      &#34;name&#34;: &#34;virt-what&#34;,&#xA;      &#34;version&#34;: &#34;1.25-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;virt-what&#34;,&#xA;        &#34;version&#34;: &#34;1.25-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;60b1mOIk+ncF/benyKWfug==&#34;: {&#xA;      &#34;id&#34;: &#34;60b1mOIk+ncF/benyKWfug==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Data-Dumper&#34;,&#xA;      &#34;version&#34;: &#34;2.174-462.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Data-Dumper&#34;,&#xA;        &#34;version&#34;: &#34;2.174-462.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;68hxwX7t9VVTsdLs/0iJBA==&#34;: {&#xA;      &#34;id&#34;: &#34;68hxwX7t9VVTsdLs/0iJBA==&#34;,&#xA;      &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;      &#34;version&#34;: &#34;20220815-1.git0fbe86f.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;        &#34;version&#34;: &#34;20220815-1.git0fbe86f.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;695zXUDPsaaAbh1PGloHag==&#34;: {&#xA;      &#34;id&#34;: &#34;695zXUDPsaaAbh1PGloHag==&#34;,&#xA;      &#34;name&#34;: &#34;environment-modules&#34;,&#xA;      &#34;version&#34;: &#34;5.0.1-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;environment-modules&#34;,&#xA;        &#34;version&#34;: &#34;5.0.1-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6AYt+NWt55432RGa/HxiQg==&#34;: {&#xA;      &#34;id&#34;: &#34;6AYt+NWt55432RGa/HxiQg==&#34;,&#xA;      &#34;name&#34;: &#34;libXt&#34;,&#xA;      &#34;version&#34;: &#34;1.2.0-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libXt&#34;,&#xA;        &#34;version&#34;: &#34;1.2.0-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6COiLlB/V7UlOwfuFJy77w==&#34;: {&#xA;      &#34;id&#34;: &#34;6COiLlB/V7UlOwfuFJy77w==&#34;,&#xA;      &#34;name&#34;: &#34;unzip&#34;,&#xA;      &#34;version&#34;: &#34;6.0-56.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;unzip&#34;,&#xA;        &#34;version&#34;: &#34;6.0-56.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6G1ytjIPgX0NNsVwuPQKkQ==&#34;: {&#xA;      &#34;id&#34;: &#34;6G1ytjIPgX0NNsVwuPQKkQ==&#34;,&#xA;      &#34;name&#34;: &#34;python3-gpg&#34;,&#xA;      &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gpgme&#34;,&#xA;        &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6G4wapu2zP6UYfTP+Ip2pA==&#34;: {&#xA;      &#34;id&#34;: &#34;6G4wapu2zP6UYfTP+Ip2pA==&#34;,&#xA;      &#34;name&#34;: &#34;gdb-headless&#34;,&#xA;      &#34;version&#34;: &#34;10.2-10.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;10.2-10.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6HUC1/dPziZpbtWEymw0nQ==&#34;: {&#xA;      &#34;id&#34;: &#34;6HUC1/dPziZpbtWEymw0nQ==&#34;,&#xA;      &#34;name&#34;: &#34;gzip&#34;,&#xA;      &#34;version&#34;: &#34;1.12-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gzip&#34;,&#xA;        &#34;version&#34;: &#34;1.12-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6LVRZKaAJH97OKCXsJMDDw==&#34;: {&#xA;      &#34;id&#34;: &#34;6LVRZKaAJH97OKCXsJMDDw==&#34;,&#xA;      &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;      &#34;version&#34;: &#34;2022.2.54-90.2.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;        &#34;version&#34;: &#34;2022.2.54-90.2.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6MFxZDjn6ZxVQspQib4VSA==&#34;: {&#xA;      &#34;id&#34;: &#34;6MFxZDjn6ZxVQspQib4VSA==&#34;,&#xA;      &#34;name&#34;: &#34;libXau&#34;,&#xA;      &#34;version&#34;: &#34;1.0.9-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libXau&#34;,&#xA;        &#34;version&#34;: &#34;1.0.9-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6RxnMs+9yIqzJpLgR7I3zA==&#34;: {&#xA;      &#34;id&#34;: &#34;6RxnMs+9yIqzJpLgR7I3zA==&#34;,&#xA;      &#34;name&#34;: &#34;audit-libs&#34;,&#xA;      &#34;version&#34;: &#34;3.0.7-103.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;audit&#34;,&#xA;        &#34;version&#34;: &#34;3.0.7-103.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6VAQWTpZhN9PW7YCmVhxsw==&#34;: {&#xA;      &#34;id&#34;: &#34;6VAQWTpZhN9PW7YCmVhxsw==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;      &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6camihNRcGvFSo3XinEWFg==&#34;: {&#xA;      &#34;id&#34;: &#34;6camihNRcGvFSo3XinEWFg==&#34;,&#xA;      &#34;name&#34;: &#34;libacl&#34;,&#xA;      &#34;version&#34;: &#34;2.3.1-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;acl&#34;,&#xA;        &#34;version&#34;: &#34;2.3.1-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6f28+Af9kIn0OSp9f9j14Q==&#34;: {&#xA;      &#34;id&#34;: &#34;6f28+Af9kIn0OSp9f9j14Q==&#34;,&#xA;      &#34;name&#34;: &#34;ubi9/s2i-base&#34;,&#xA;      &#34;version&#34;: &#34;1-421&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;yRjjypPMZa7QJg+DLoMumw==&#34;,&#xA;        &#34;name&#34;: &#34;s2i-base-container&#34;,&#xA;        &#34;version&#34;: &#34;1-421&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;source&#34;: {&#xA;          &#34;id&#34;: &#34;&#34;,&#xA;          &#34;name&#34;: &#34;&#34;,&#xA;          &#34;version&#34;: &#34;&#34;,&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;normalized_version&#34;: &#34;rhctag:1.0.0.0.0.0.0.0.0.0&#34;,&#xA;        &#34;arch&#34;: &#34;x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;rhctag:1.0.0.0.0.0.0.0.0.0&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;74+EW3adzZwX9DbUU0vOdA==&#34;: {&#xA;      &#34;id&#34;: &#34;74+EW3adzZwX9DbUU0vOdA==&#34;,&#xA;      &#34;name&#34;: &#34;which&#34;,&#xA;      &#34;version&#34;: &#34;2.21-28.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;which&#34;,&#xA;        &#34;version&#34;: &#34;2.21-28.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7JHS+mBQfJeJoy73lvm4lw==&#34;: {&#xA;      &#34;id&#34;: &#34;7JHS+mBQfJeJoy73lvm4lw==&#34;,&#xA;      &#34;name&#34;: &#34;npm&#34;,&#xA;      &#34;version&#34;: &#34;1:8.19.2-1.16.18.1.3.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;16.18.1-3.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7Lf3UXydabzw8g7HGZER+w==&#34;: {&#xA;      &#34;id&#34;: &#34;7Lf3UXydabzw8g7HGZER+w==&#34;,&#xA;      &#34;name&#34;: &#34;ubi9/s2i-core&#34;,&#xA;      &#34;version&#34;: &#34;1-394&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;Lm5zHfIH4SjtxMBhECD0OQ==&#34;,&#xA;        &#34;name&#34;: &#34;s2i-core-container&#34;,&#xA;        &#34;version&#34;: &#34;1-394&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;source&#34;: {&#xA;          &#34;id&#34;: &#34;&#34;,&#xA;          &#34;name&#34;: &#34;&#34;,&#xA;          &#34;version&#34;: &#34;&#34;,&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;normalized_version&#34;: &#34;rhctag:1.0.0.0.0.0.0.0.0.0&#34;,&#xA;        &#34;arch&#34;: &#34;x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;rhctag:1.0.0.0.0.0.0.0.0.0&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7ZWYFE98hi9HyU5Q68Jgsw==&#34;: {&#xA;      &#34;id&#34;: &#34;7ZWYFE98hi9HyU5Q68Jgsw==&#34;,&#xA;      &#34;name&#34;: &#34;libX11-devel&#34;,&#xA;      &#34;version&#34;: &#34;1.7.0-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11&#34;,&#xA;        &#34;version&#34;: &#34;1.7.0-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7qAMBOvJ2FYxpK9n05pI7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;7qAMBOvJ2FYxpK9n05pI7Q==&#34;,&#xA;      &#34;name&#34;: &#34;libpng&#34;,&#xA;      &#34;version&#34;: &#34;2:1.6.37-12.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;1.6.37-12.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7yB5oIQve4tWIMlUmHbdQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7yB5oIQve4tWIMlUmHbdQQ==&#34;,&#xA;      &#34;name&#34;: &#34;graphite2&#34;,&#xA;      &#34;version&#34;: &#34;1.3.14-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;graphite2&#34;,&#xA;        &#34;version&#34;: &#34;1.3.14-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;84WodsWNE9m9GIrBiKl02g==&#34;: {&#xA;      &#34;id&#34;: &#34;84WodsWNE9m9GIrBiKl02g==&#34;,&#xA;      &#34;name&#34;: &#34;python3-cloud-what&#34;,&#xA;      &#34;version&#34;: &#34;1.29.30.1-1.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;subscription-manager&#34;,&#xA;        &#34;version&#34;: &#34;1.29.30.1-1.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;88jYB91M4ddvxo2XjMJKmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;88jYB91M4ddvxo2XjMJKmQ==&#34;,&#xA;      &#34;name&#34;: &#34;libmpc&#34;,&#xA;      &#34;version&#34;: &#34;1.2.1-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmpc&#34;,&#xA;        &#34;version&#34;: &#34;1.2.1-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8Gh2hioTt5BFisg9eNKeEg==&#34;: {&#xA;      &#34;id&#34;: &#34;8Gh2hioTt5BFisg9eNKeEg==&#34;,&#xA;      &#34;name&#34;: &#34;python3-librepo&#34;,&#xA;      &#34;version&#34;: &#34;1.14.2-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;librepo&#34;,&#xA;        &#34;version&#34;: &#34;1.14.2-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8I3zEJ4sFSgk47ZaRLgtDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8I3zEJ4sFSgk47ZaRLgtDQ==&#34;,&#xA;      &#34;name&#34;: &#34;annobin&#34;,&#xA;      &#34;version&#34;: &#34;10.73-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;annobin&#34;,&#xA;        &#34;version&#34;: &#34;10.73-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8Ky53YwzOPM2pkEIVuuuBg==&#34;: {&#xA;      &#34;id&#34;: &#34;8Ky53YwzOPM2pkEIVuuuBg==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;      &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8Q+4qMpgUhvMDCe2QUBIuQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8Q+4qMpgUhvMDCe2QUBIuQ==&#34;,&#xA;      &#34;name&#34;: &#34;dbus&#34;,&#xA;      &#34;version&#34;: &#34;1:1.12.20-7.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus&#34;,&#xA;        &#34;version&#34;: &#34;1.12.20-7.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8gpmX0NZa9MMhcqi6FUGtg==&#34;: {&#xA;      &#34;id&#34;: &#34;8gpmX0NZa9MMhcqi6FUGtg==&#34;,&#xA;      &#34;name&#34;: &#34;python3-gobject-base&#34;,&#xA;      &#34;version&#34;: &#34;3.40.1-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pygobject3&#34;,&#xA;        &#34;version&#34;: &#34;3.40.1-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8tmJEWGia0UWhhPJb3EyAw==&#34;: {&#xA;      &#34;id&#34;: &#34;8tmJEWGia0UWhhPJb3EyAw==&#34;,&#xA;      &#34;name&#34;: &#34;redhat-release&#34;,&#xA;      &#34;version&#34;: &#34;9.1-1.9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;redhat-release&#34;,&#xA;        &#34;version&#34;: &#34;9.1-1.9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9AmKs/wDQFsVMVHWnqbu+g==&#34;: {&#xA;      &#34;id&#34;: &#34;9AmKs/wDQFsVMVHWnqbu+g==&#34;,&#xA;      &#34;name&#34;: &#34;ubi9-container&#34;,&#xA;      &#34;version&#34;: &#34;9.1.0-1782&#34;,&#xA;      &#34;kind&#34;: &#34;source&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;rhctag:9.1.0.0.0.0.0.0.0.0&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9Fy0bRr3ZMu3q8UNrhlOSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9Fy0bRr3ZMu3q8UNrhlOSQ==&#34;,&#xA;      &#34;name&#34;: &#34;man-db&#34;,&#xA;      &#34;version&#34;: &#34;2.9.3-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;man-db&#34;,&#xA;        &#34;version&#34;: &#34;2.9.3-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9HjCH3SeUwgItfYZysNlOw==&#34;: {&#xA;      &#34;id&#34;: &#34;9HjCH3SeUwgItfYZysNlOw==&#34;,&#xA;      &#34;name&#34;: &#34;mariadb-connector-c-config&#34;,&#xA;      &#34;version&#34;: &#34;3.2.6-1.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;mariadb-connector-c&#34;,&#xA;        &#34;version&#34;: &#34;3.2.6-1.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9WzsXAqqRoLidXM4HaB8/w==&#34;: {&#xA;      &#34;id&#34;: &#34;9WzsXAqqRoLidXM4HaB8/w==&#34;,&#xA;      &#34;name&#34;: &#34;delve&#34;,&#xA;      &#34;version&#34;: &#34;1.8.3-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;delve&#34;,&#xA;        &#34;version&#34;: &#34;1.8.3-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9bMXqD09C2r4s8P+HNy2uw==&#34;: {&#xA;      &#34;id&#34;: &#34;9bMXqD09C2r4s8P+HNy2uw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Pod-Perldoc&#34;,&#xA;      &#34;version&#34;: &#34;3.28.01-461.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Pod-Perldoc&#34;,&#xA;        &#34;version&#34;: &#34;3.28.01-461.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9hWn3VgLVkzmMJln7S0UCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9hWn3VgLVkzmMJln7S0UCQ==&#34;,&#xA;      &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;      &#34;version&#34;: &#34;7.76.1-19.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;7.76.1-19.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9sAM/NqMLlsG3N88/yD1Vg==&#34;: {&#xA;      &#34;id&#34;: &#34;9sAM/NqMLlsG3N88/yD1Vg==&#34;,&#xA;      &#34;name&#34;: &#34;python3-libdnf&#34;,&#xA;      &#34;version&#34;: &#34;0.67.0-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libdnf&#34;,&#xA;        &#34;version&#34;: &#34;0.67.0-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ACNA1cjsRpihwLsZYxMiYQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ACNA1cjsRpihwLsZYxMiYQ==&#34;,&#xA;      &#34;name&#34;: &#34;libXrender&#34;,&#xA;      &#34;version&#34;: &#34;0.9.10-16.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libXrender&#34;,&#xA;        &#34;version&#34;: &#34;0.9.10-16.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AOquy/6bQ9axg0KRp6hMjg==&#34;: {&#xA;      &#34;id&#34;: &#34;AOquy/6bQ9axg0KRp6hMjg==&#34;,&#xA;      &#34;name&#34;: &#34;libbrotli&#34;,&#xA;      &#34;version&#34;: &#34;1.0.9-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;brotli&#34;,&#xA;        &#34;version&#34;: &#34;1.0.9-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ARxZCHzD7KB2Pu4aHl7POw==&#34;: {&#xA;      &#34;id&#34;: &#34;ARxZCHzD7KB2Pu4aHl7POw==&#34;,&#xA;      &#34;name&#34;: &#34;python3-libs&#34;,&#xA;      &#34;version&#34;: &#34;3.9.14-1.el9_1.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;3.9.14-1.el9_1.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AZwLZmqkel2BzSMgQsIVGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;AZwLZmqkel2BzSMgQsIVGQ==&#34;,&#xA;      &#34;name&#34;: &#34;libselinux&#34;,&#xA;      &#34;version&#34;: &#34;3.4-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libselinux&#34;,&#xA;        &#34;version&#34;: &#34;3.4-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AbW1lRpGUjSEKNnr/Toz6A==&#34;: {&#xA;      &#34;id&#34;: &#34;AbW1lRpGUjSEKNnr/Toz6A==&#34;,&#xA;      &#34;name&#34;: &#34;jbigkit-libs&#34;,&#xA;      &#34;version&#34;: &#34;2.1-23.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;jbigkit&#34;,&#xA;        &#34;version&#34;: &#34;2.1-23.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AdRs6lk9yzTM3HvjeEThKA==&#34;: {&#xA;      &#34;id&#34;: &#34;AdRs6lk9yzTM3HvjeEThKA==&#34;,&#xA;      &#34;name&#34;: &#34;systemd&#34;,&#xA;      &#34;version&#34;: &#34;250-12.el9_1.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;250-12.el9_1.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AnHvlYoTKSxzg0JMVMiJkg==&#34;: {&#xA;      &#34;id&#34;: &#34;AnHvlYoTKSxzg0JMVMiJkg==&#34;,&#xA;      &#34;name&#34;: &#34;openldap-compat&#34;,&#xA;      &#34;version&#34;: &#34;2.6.2-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openldap&#34;,&#xA;        &#34;version&#34;: &#34;2.6.2-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AxTxyAHzdLVnUL9t8+ZYmg==&#34;: {&#xA;      &#34;id&#34;: &#34;AxTxyAHzdLVnUL9t8+ZYmg==&#34;,&#xA;      &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;      &#34;version&#34;: &#34;7.76.1-19.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;7.76.1-19.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;: {&#xA;      &#34;id&#34;: &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;,&#xA;      &#34;name&#34;: &#34;libassuan&#34;,&#xA;      &#34;version&#34;: &#34;2.5.5-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libassuan&#34;,&#xA;        &#34;version&#34;: &#34;2.5.5-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BX+oelClu2v6UOl6tluOEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;BX+oelClu2v6UOl6tluOEQ==&#34;,&#xA;      &#34;name&#34;: &#34;crypto-policies-scripts&#34;,&#xA;      &#34;version&#34;: &#34;20220815-1.git0fbe86f.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;        &#34;version&#34;: &#34;20220815-1.git0fbe86f.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;C3QbGupU53FFTX0pkfNLrA==&#34;: {&#xA;      &#34;id&#34;: &#34;C3QbGupU53FFTX0pkfNLrA==&#34;,&#xA;      &#34;name&#34;: &#34;util-linux&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;C7VGVckK0YZj4RiVmStEsA==&#34;: {&#xA;      &#34;id&#34;: &#34;C7VGVckK0YZj4RiVmStEsA==&#34;,&#xA;      &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;      &#34;version&#34;: &#34;3.34.1-6.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;3.34.1-6.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CXRheoFIylTt2C0ZN4qu3w==&#34;: {&#xA;      &#34;id&#34;: &#34;CXRheoFIylTt2C0ZN4qu3w==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Net-SSLeay&#34;,&#xA;      &#34;version&#34;: &#34;1.92-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Net-SSLeay&#34;,&#xA;        &#34;version&#34;: &#34;1.92-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CjFzfz4zBZj7fcwIrVHCRA==&#34;: {&#xA;      &#34;id&#34;: &#34;CjFzfz4zBZj7fcwIrVHCRA==&#34;,&#xA;      &#34;name&#34;: &#34;perl-IPC-Open3&#34;,&#xA;      &#34;version&#34;: &#34;1.21-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CpC5etTxiNuDvBGQesJNDg==&#34;: {&#xA;      &#34;id&#34;: &#34;CpC5etTxiNuDvBGQesJNDg==&#34;,&#xA;      &#34;name&#34;: &#34;libmount&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ct/46Ed7Asmqt98kLc0FLw==&#34;: {&#xA;      &#34;id&#34;: &#34;Ct/46Ed7Asmqt98kLc0FLw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Symbol&#34;,&#xA;      &#34;version&#34;: &#34;1.08-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Cwut2mrMMUaIvKenvO1qWw==&#34;: {&#xA;      &#34;id&#34;: &#34;Cwut2mrMMUaIvKenvO1qWw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Socket&#34;,&#xA;      &#34;version&#34;: &#34;4:2.031-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Socket&#34;,&#xA;        &#34;version&#34;: &#34;2.031-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;D/XNnExpupd1bO9ZIJIE9w==&#34;: {&#xA;      &#34;id&#34;: &#34;D/XNnExpupd1bO9ZIJIE9w==&#34;,&#xA;      &#34;name&#34;: &#34;perl-AutoLoader&#34;,&#xA;      &#34;version&#34;: &#34;5.74-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;D0GGDit/UxegO+/A5R03SA==&#34;: {&#xA;      &#34;id&#34;: &#34;D0GGDit/UxegO+/A5R03SA==&#34;,&#xA;      &#34;name&#34;: &#34;elfutils-default-yama-scope&#34;,&#xA;      &#34;version&#34;: &#34;0.187-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;elfutils&#34;,&#xA;        &#34;version&#34;: &#34;0.187-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DGqCqs+yrHvXs9qsPgn58g==&#34;: {&#xA;      &#34;id&#34;: &#34;DGqCqs+yrHvXs9qsPgn58g==&#34;,&#xA;      &#34;name&#34;: &#34;github.com/devfile-samples/devfile-sample-go-basic&#34;,&#xA;      &#34;version&#34;: &#34;(devel)&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DK0d2bPQCX0xz6Lec7u1cg==&#34;: {&#xA;      &#34;id&#34;: &#34;DK0d2bPQCX0xz6Lec7u1cg==&#34;,&#xA;      &#34;name&#34;: &#34;info&#34;,&#xA;      &#34;version&#34;: &#34;6.7-15.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;texinfo&#34;,&#xA;        &#34;version&#34;: &#34;6.7-15.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DMchAI2VcGSa4n8bdw5YkA==&#34;: {&#xA;      &#34;id&#34;: &#34;DMchAI2VcGSa4n8bdw5YkA==&#34;,&#xA;      &#34;name&#34;: &#34;xorg-x11-proto-devel&#34;,&#xA;      &#34;version&#34;: &#34;2021.4-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xorg-x11-proto-devel&#34;,&#xA;        &#34;version&#34;: &#34;2021.4-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DSiKsVzdOYp1aJo/8T0A5A==&#34;: {&#xA;      &#34;id&#34;: &#34;DSiKsVzdOYp1aJo/8T0A5A==&#34;,&#xA;      &#34;name&#34;: &#34;pcre&#34;,&#xA;      &#34;version&#34;: &#34;8.44-3.el9.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre&#34;,&#xA;        &#34;version&#34;: &#34;8.44-3.el9.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;,&#xA;      &#34;name&#34;: &#34;libverto&#34;,&#xA;      &#34;version&#34;: &#34;0.3.2-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libverto&#34;,&#xA;        &#34;version&#34;: &#34;0.3.2-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;E2+Fh4utKcr7Wyiwzh2bYw==&#34;: {&#xA;      &#34;id&#34;: &#34;E2+Fh4utKcr7Wyiwzh2bYw==&#34;,&#xA;      &#34;name&#34;: &#34;gnutls&#34;,&#xA;      &#34;version&#34;: &#34;3.7.6-12.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;3.7.6-12.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;E7ikPxWehuEw+6yIZODYlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;E7ikPxWehuEw+6yIZODYlQ==&#34;,&#xA;      &#34;name&#34;: &#34;golang&#34;,&#xA;      &#34;version&#34;: &#34;1.18.9-1.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;1.18.9-1.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ED0/IlCpWWQwBBKR2YT9sw==&#34;: {&#xA;      &#34;id&#34;: &#34;ED0/IlCpWWQwBBKR2YT9sw==&#34;,&#xA;      &#34;name&#34;: &#34;libnl3&#34;,&#xA;      &#34;version&#34;: &#34;3.7.0-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libnl3&#34;,&#xA;        &#34;version&#34;: &#34;3.7.0-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EEcEMKhGMvXAfnMhboIpqw==&#34;: {&#xA;      &#34;id&#34;: &#34;EEcEMKhGMvXAfnMhboIpqw==&#34;,&#xA;      &#34;name&#34;: &#34;publicsuffix-list-dafsa&#34;,&#xA;      &#34;version&#34;: &#34;20210518-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;publicsuffix-list&#34;,&#xA;        &#34;version&#34;: &#34;20210518-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EgjLGZKjPtqIaFVLlFAAPg==&#34;: {&#xA;      &#34;id&#34;: &#34;EgjLGZKjPtqIaFVLlFAAPg==&#34;,&#xA;      &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;      &#34;version&#34;: &#34;8.7p1-24.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;8.7p1-24.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EuqqL3yIFMd5VRAfuufJgg==&#34;: {&#xA;      &#34;id&#34;: &#34;EuqqL3yIFMd5VRAfuufJgg==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-common&#34;,&#xA;      &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Exv8+xTp+7Y4AfuM+ph47Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Exv8+xTp+7Y4AfuM+ph47Q==&#34;,&#xA;      &#34;name&#34;: &#34;perl-parent&#34;,&#xA;      &#34;version&#34;: &#34;1:0.238-460.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-parent&#34;,&#xA;        &#34;version&#34;: &#34;0.238-460.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FEF27h+V5TzrUeQsFddapA==&#34;: {&#xA;      &#34;id&#34;: &#34;FEF27h+V5TzrUeQsFddapA==&#34;,&#xA;      &#34;name&#34;: &#34;libSM&#34;,&#xA;      &#34;version&#34;: &#34;1.2.3-10.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libSM&#34;,&#xA;        &#34;version&#34;: &#34;1.2.3-10.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FFSNe661VBElA1asGZ7k3g==&#34;: {&#xA;      &#34;id&#34;: &#34;FFSNe661VBElA1asGZ7k3g==&#34;,&#xA;      &#34;name&#34;: &#34;rust-srpm-macros&#34;,&#xA;      &#34;version&#34;: &#34;17-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rust-srpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;17-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FKD/ouYSWOOZHy4i43SaxA==&#34;: {&#xA;      &#34;id&#34;: &#34;FKD/ouYSWOOZHy4i43SaxA==&#34;,&#xA;      &#34;name&#34;: &#34;perl-TermReadKey&#34;,&#xA;      &#34;version&#34;: &#34;2.38-11.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-TermReadKey&#34;,&#xA;        &#34;version&#34;: &#34;2.38-11.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FMrR4PbDeEhmMEh2juuVnw==&#34;: {&#xA;      &#34;id&#34;: &#34;FMrR4PbDeEhmMEh2juuVnw==&#34;,&#xA;      &#34;name&#34;: &#34;wget&#34;,&#xA;      &#34;version&#34;: &#34;1.21.1-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;wget&#34;,&#xA;        &#34;version&#34;: &#34;1.21.1-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FVL6ljas6Mq4jYoOr1b6Hw==&#34;: {&#xA;      &#34;id&#34;: &#34;FVL6ljas6Mq4jYoOr1b6Hw==&#34;,&#xA;      &#34;name&#34;: &#34;tpm2-tss&#34;,&#xA;      &#34;version&#34;: &#34;3.0.3-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tpm2-tss&#34;,&#xA;        &#34;version&#34;: &#34;3.0.3-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FW8ByCOP6ljvNWDQolahwg==&#34;: {&#xA;      &#34;id&#34;: &#34;FW8ByCOP6ljvNWDQolahwg==&#34;,&#xA;      &#34;name&#34;: &#34;sysprof-capture-devel&#34;,&#xA;      &#34;version&#34;: &#34;3.40.1-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sysprof&#34;,&#xA;        &#34;version&#34;: &#34;3.40.1-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FaNO6QWs1mWPp40PrBiBUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;FaNO6QWs1mWPp40PrBiBUQ==&#34;,&#xA;      &#34;name&#34;: &#34;libseccomp&#34;,&#xA;      &#34;version&#34;: &#34;2.5.2-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libseccomp&#34;,&#xA;        &#34;version&#34;: &#34;2.5.2-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Fy3bplraTnRnJlV5RewauA==&#34;: {&#xA;      &#34;id&#34;: &#34;Fy3bplraTnRnJlV5RewauA==&#34;,&#xA;      &#34;name&#34;: &#34;libxslt-devel&#34;,&#xA;      &#34;version&#34;: &#34;1.1.34-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxslt&#34;,&#xA;        &#34;version&#34;: &#34;1.1.34-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G1YDEd7+V95Qa+PMxB8sJw==&#34;: {&#xA;      &#34;id&#34;: &#34;G1YDEd7+V95Qa+PMxB8sJw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Digest&#34;,&#xA;      &#34;version&#34;: &#34;1.19-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Digest&#34;,&#xA;        &#34;version&#34;: &#34;1.19-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G61ZL2SOHR2qgvQfi118gw==&#34;: {&#xA;      &#34;id&#34;: &#34;G61ZL2SOHR2qgvQfi118gw==&#34;,&#xA;      &#34;name&#34;: &#34;dejavu-sans-fonts&#34;,&#xA;      &#34;version&#34;: &#34;2.37-18.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dejavu-fonts&#34;,&#xA;        &#34;version&#34;: &#34;2.37-18.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GIScmMWQrnoFNoEgq3fg2w==&#34;: {&#xA;      &#34;id&#34;: &#34;GIScmMWQrnoFNoEgq3fg2w==&#34;,&#xA;      &#34;name&#34;: &#34;python3-dbus&#34;,&#xA;      &#34;version&#34;: &#34;1.2.18-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus-python&#34;,&#xA;        &#34;version&#34;: &#34;1.2.18-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GSkR2SOuqWQN8NtOvU4cgw==&#34;: {&#xA;      &#34;id&#34;: &#34;GSkR2SOuqWQN8NtOvU4cgw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Thread-Queue&#34;,&#xA;      &#34;version&#34;: &#34;3.14-460.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Thread-Queue&#34;,&#xA;        &#34;version&#34;: &#34;3.14-460.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GVmxmNcJqT3ovg+RwjJg1A==&#34;: {&#xA;      &#34;id&#34;: &#34;GVmxmNcJqT3ovg+RwjJg1A==&#34;,&#xA;      &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;      &#34;version&#34;: &#34;1:16.18.1-3.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;16.18.1-3.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GXm2fCeoaq1FqYmMTmMmhQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GXm2fCeoaq1FqYmMTmMmhQ==&#34;,&#xA;      &#34;name&#34;: &#34;go-toolset-container&#34;,&#xA;      &#34;version&#34;: &#34;1.18.9-14&#34;,&#xA;      &#34;kind&#34;: &#34;source&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;rhctag:1.18.0.0.0.0.0.0.0.0&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;H+zLNGeS4JMpmfP42mEhnA==&#34;: {&#xA;      &#34;id&#34;: &#34;H+zLNGeS4JMpmfP42mEhnA==&#34;,&#xA;      &#34;name&#34;: &#34;scl-utils&#34;,&#xA;      &#34;version&#34;: &#34;1:2.0.3-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;scl-utils&#34;,&#xA;        &#34;version&#34;: &#34;2.0.3-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;H3zfV58LzeEUiNQbZbZb2A==&#34;: {&#xA;      &#34;id&#34;: &#34;H3zfV58LzeEUiNQbZbZb2A==&#34;,&#xA;      &#34;name&#34;: &#34;perl-File-Temp&#34;,&#xA;      &#34;version&#34;: &#34;1:0.231.100-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-File-Temp&#34;,&#xA;        &#34;version&#34;: &#34;0.231.100-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HRtVOTg/Y7Pvd6wqcX24fA==&#34;: {&#xA;      &#34;id&#34;: &#34;HRtVOTg/Y7Pvd6wqcX24fA==&#34;,&#xA;      &#34;name&#34;: &#34;python3-requests&#34;,&#xA;      &#34;version&#34;: &#34;2.25.1-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-requests&#34;,&#xA;        &#34;version&#34;: &#34;2.25.1-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HbglDdnV9yne0i8jQL30HA==&#34;: {&#xA;      &#34;id&#34;: &#34;HbglDdnV9yne0i8jQL30HA==&#34;,&#xA;      &#34;name&#34;: &#34;libtasn1&#34;,&#xA;      &#34;version&#34;: &#34;4.16.0-8.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;4.16.0-8.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;I16VSEydeiRYB1TSf5694A==&#34;: {&#xA;      &#34;id&#34;: &#34;I16VSEydeiRYB1TSf5694A==&#34;,&#xA;      &#34;name&#34;: &#34;libreport-filesystem&#34;,&#xA;      &#34;version&#34;: &#34;2.15.2-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libreport&#34;,&#xA;        &#34;version&#34;: &#34;2.15.2-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IDaB7M+//88qbPppM+LpUw==&#34;: {&#xA;      &#34;id&#34;: &#34;IDaB7M+//88qbPppM+LpUw==&#34;,&#xA;      &#34;name&#34;: &#34;cracklib&#34;,&#xA;      &#34;version&#34;: &#34;2.9.6-27.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cracklib&#34;,&#xA;        &#34;version&#34;: &#34;2.9.6-27.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IN2DA8X4LYRmUb07gLqapg==&#34;: {&#xA;      &#34;id&#34;: &#34;IN2DA8X4LYRmUb07gLqapg==&#34;,&#xA;      &#34;name&#34;: &#34;dnf-data&#34;,&#xA;      &#34;version&#34;: &#34;4.12.0-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dnf&#34;,&#xA;        &#34;version&#34;: &#34;4.12.0-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IOb5jo+s7DgjzeK/LoVNig==&#34;: {&#xA;      &#34;id&#34;: &#34;IOb5jo+s7DgjzeK/LoVNig==&#34;,&#xA;      &#34;name&#34;: &#34;libdb&#34;,&#xA;      &#34;version&#34;: &#34;5.3.28-53.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libdb&#34;,&#xA;        &#34;version&#34;: &#34;5.3.28-53.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;J0HrVYoM3raELvTfJ82QMA==&#34;: {&#xA;      &#34;id&#34;: &#34;J0HrVYoM3raELvTfJ82QMA==&#34;,&#xA;      &#34;name&#34;: &#34;perl-vars&#34;,&#xA;      &#34;version&#34;: &#34;1.05-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JHQdC8JdSGipvO0sCig0cQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JHQdC8JdSGipvO0sCig0cQ==&#34;,&#xA;      &#34;name&#34;: &#34;systemd-pam&#34;,&#xA;      &#34;version&#34;: &#34;250-12.el9_1.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;250-12.el9_1.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JI92axWONkD2XCTUAeCtuQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JI92axWONkD2XCTUAeCtuQ==&#34;,&#xA;      &#34;name&#34;: &#34;autoconf&#34;,&#xA;      &#34;version&#34;: &#34;2.69-38.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;autoconf&#34;,&#xA;        &#34;version&#34;: &#34;2.69-38.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;,&#xA;      &#34;name&#34;: &#34;langpacks-core-font-en&#34;,&#xA;      &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;langpacks&#34;,&#xA;        &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JaDqP2PIekJ4FuDfyPDUKA==&#34;: {&#xA;      &#34;id&#34;: &#34;JaDqP2PIekJ4FuDfyPDUKA==&#34;,&#xA;      &#34;name&#34;: &#34;dmidecode&#34;,&#xA;      &#34;version&#34;: &#34;1:3.3-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dmidecode&#34;,&#xA;        &#34;version&#34;: &#34;3.3-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JrBk+FMgyv4RrG6esVBCIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JrBk+FMgyv4RrG6esVBCIQ==&#34;,&#xA;      &#34;name&#34;: &#34;cryptsetup-libs&#34;,&#xA;      &#34;version&#34;: &#34;2.4.3-5.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cryptsetup&#34;,&#xA;        &#34;version&#34;: &#34;2.4.3-5.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Jt5/Qd9oxegZwQjsNbUyYA==&#34;: {&#xA;      &#34;id&#34;: &#34;Jt5/Qd9oxegZwQjsNbUyYA==&#34;,&#xA;      &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;      &#34;version&#34;: &#34;1:27.2-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs&#34;,&#xA;        &#34;version&#34;: &#34;27.2-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;K04omiWBsTnRCbFVZLmRKw==&#34;: {&#xA;      &#34;id&#34;: &#34;K04omiWBsTnRCbFVZLmRKw==&#34;,&#xA;      &#34;name&#34;: &#34;python3-ethtool&#34;,&#xA;      &#34;version&#34;: &#34;0.15-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-ethtool&#34;,&#xA;        &#34;version&#34;: &#34;0.15-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;K5U87AYLwYDq48YpniD72A==&#34;: {&#xA;      &#34;id&#34;: &#34;K5U87AYLwYDq48YpniD72A==&#34;,&#xA;      &#34;name&#34;: &#34;libffi&#34;,&#xA;      &#34;version&#34;: &#34;3.4.2-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libffi&#34;,&#xA;        &#34;version&#34;: &#34;3.4.2-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;,&#xA;      &#34;name&#34;: &#34;json-glib&#34;,&#xA;      &#34;version&#34;: &#34;1.6.6-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;json-glib&#34;,&#xA;        &#34;version&#34;: &#34;1.6.6-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KH0/KbRUi7KL6UvWa8i6Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;KH0/KbRUi7KL6UvWa8i6Pg==&#34;,&#xA;      &#34;name&#34;: &#34;python3-inotify&#34;,&#xA;      &#34;version&#34;: &#34;0.9.6-25.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-inotify&#34;,&#xA;        &#34;version&#34;: &#34;0.9.6-25.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KSobT+LH4PXsCiP04HOhbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;KSobT+LH4PXsCiP04HOhbQ==&#34;,&#xA;      &#34;name&#34;: &#34;gdbm-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:1.19-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdbm&#34;,&#xA;        &#34;version&#34;: &#34;1.19-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KcftiMkhTw4x89HNJI8NNg==&#34;: {&#xA;      &#34;id&#34;: &#34;KcftiMkhTw4x89HNJI8NNg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Text-ParseWords&#34;,&#xA;      &#34;version&#34;: &#34;3.30-460.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Text-ParseWords&#34;,&#xA;        &#34;version&#34;: &#34;3.30-460.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KlSRCTMecbL63Kg+FZjUdQ==&#34;: {&#xA;      &#34;id&#34;: &#34;KlSRCTMecbL63Kg+FZjUdQ==&#34;,&#xA;      &#34;name&#34;: &#34;libicu-devel&#34;,&#xA;      &#34;version&#34;: &#34;67.1-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;icu&#34;,&#xA;        &#34;version&#34;: &#34;67.1-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KyRw1LumZrRo6AKKkHgP7w==&#34;: {&#xA;      &#34;id&#34;: &#34;KyRw1LumZrRo6AKKkHgP7w==&#34;,&#xA;      &#34;name&#34;: &#34;libXext&#34;,&#xA;      &#34;version&#34;: &#34;1.3.4-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libXext&#34;,&#xA;        &#34;version&#34;: &#34;1.3.4-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;L1wl5gEz2lzyNJbirzPmpQ==&#34;: {&#xA;      &#34;id&#34;: &#34;L1wl5gEz2lzyNJbirzPmpQ==&#34;,&#xA;      &#34;name&#34;: &#34;pcre2-utf32&#34;,&#xA;      &#34;version&#34;: &#34;10.40-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.40-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;L2RUW2Fm5EOgoqwyitY3bg==&#34;: {&#xA;      &#34;id&#34;: &#34;L2RUW2Fm5EOgoqwyitY3bg==&#34;,&#xA;      &#34;name&#34;: &#34;dbus-broker&#34;,&#xA;      &#34;version&#34;: &#34;28-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus-broker&#34;,&#xA;        &#34;version&#34;: &#34;28-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;L4diUjusARli24fy/u9lAw==&#34;: {&#xA;      &#34;id&#34;: &#34;L4diUjusARli24fy/u9lAw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-NDBM_File&#34;,&#xA;      &#34;version&#34;: &#34;1.15-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LD9yEwGtdZJl2S96EO58PQ==&#34;: {&#xA;      &#34;id&#34;: &#34;LD9yEwGtdZJl2S96EO58PQ==&#34;,&#xA;      &#34;name&#34;: &#34;file-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.39-10.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file&#34;,&#xA;        &#34;version&#34;: &#34;5.39-10.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LDIMlzOywHz1+CG5FwjKdQ==&#34;: {&#xA;      &#34;id&#34;: &#34;LDIMlzOywHz1+CG5FwjKdQ==&#34;,&#xA;      &#34;name&#34;: &#34;subscription-manager-rhsm-certificates&#34;,&#xA;      &#34;version&#34;: &#34;20220623-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;subscription-manager-rhsm-certificates&#34;,&#xA;        &#34;version&#34;: &#34;20220623-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LEyuwSco7tb1WIyWy42H8g==&#34;: {&#xA;      &#34;id&#34;: &#34;LEyuwSco7tb1WIyWy42H8g==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Storable&#34;,&#xA;      &#34;version&#34;: &#34;1:3.21-460.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Storable&#34;,&#xA;        &#34;version&#34;: &#34;3.21-460.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LR+S3JloJQ5YEViBpmcLkA==&#34;: {&#xA;      &#34;id&#34;: &#34;LR+S3JloJQ5YEViBpmcLkA==&#34;,&#xA;      &#34;name&#34;: &#34;pam&#34;,&#xA;      &#34;version&#34;: &#34;1.5.1-12.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.5.1-12.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LZYaKh1MnXoGX4fHzghRTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;LZYaKh1MnXoGX4fHzghRTQ==&#34;,&#xA;      &#34;name&#34;: &#34;usermode&#34;,&#xA;      &#34;version&#34;: &#34;1.114-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;usermode&#34;,&#xA;        &#34;version&#34;: &#34;1.114-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Leh3RdsGa1oyRcl5Dz4SdA==&#34;: {&#xA;      &#34;id&#34;: &#34;Leh3RdsGa1oyRcl5Dz4SdA==&#34;,&#xA;      &#34;name&#34;: &#34;gd-devel&#34;,&#xA;      &#34;version&#34;: &#34;2.3.2-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gd&#34;,&#xA;        &#34;version&#34;: &#34;2.3.2-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LjtOegR/S/Y0KwJeOuSl/w==&#34;: {&#xA;      &#34;id&#34;: &#34;LjtOegR/S/Y0KwJeOuSl/w==&#34;,&#xA;      &#34;name&#34;: &#34;perl-podlators&#34;,&#xA;      &#34;version&#34;: &#34;1:4.14-460.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-podlators&#34;,&#xA;        &#34;version&#34;: &#34;4.14-460.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Lm5zHfIH4SjtxMBhECD0OQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Lm5zHfIH4SjtxMBhECD0OQ==&#34;,&#xA;      &#34;name&#34;: &#34;s2i-core-container&#34;,&#xA;      &#34;version&#34;: &#34;1-394&#34;,&#xA;      &#34;kind&#34;: &#34;source&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;rhctag:1.0.0.0.0.0.0.0.0.0&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Lwqn0aweLQLZmo12VvYcog==&#34;: {&#xA;      &#34;id&#34;: &#34;Lwqn0aweLQLZmo12VvYcog==&#34;,&#xA;      &#34;name&#34;: &#34;popt&#34;,&#xA;      &#34;version&#34;: &#34;1.18-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;popt&#34;,&#xA;        &#34;version&#34;: &#34;1.18-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;M2qdPAOOvb+CWXJwouP4Rw==&#34;: {&#xA;      &#34;id&#34;: &#34;M2qdPAOOvb+CWXJwouP4Rw==&#34;,&#xA;      &#34;name&#34;: &#34;mariadb-connector-c-devel&#34;,&#xA;      &#34;version&#34;: &#34;3.2.6-1.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;mariadb-connector-c&#34;,&#xA;        &#34;version&#34;: &#34;3.2.6-1.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;: {&#xA;      &#34;id&#34;: &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;,&#xA;      &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;      &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;        &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MJmw8vClC4VAn/J4MfhK2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;MJmw8vClC4VAn/J4MfhK2Q==&#34;,&#xA;      &#34;name&#34;: &#34;python3-setuptools-wheel&#34;,&#xA;      &#34;version&#34;: &#34;53.0.0-10.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-setuptools&#34;,&#xA;        &#34;version&#34;: &#34;53.0.0-10.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MORX6hW9ZLZCt/52w71zTg==&#34;: {&#xA;      &#34;id&#34;: &#34;MORX6hW9ZLZCt/52w71zTg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-PathTools&#34;,&#xA;      &#34;version&#34;: &#34;3.78-461.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-PathTools&#34;,&#xA;        &#34;version&#34;: &#34;3.78-461.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MXR26wvfFq4/JiRamdOfsA==&#34;: {&#xA;      &#34;id&#34;: &#34;MXR26wvfFq4/JiRamdOfsA==&#34;,&#xA;      &#34;name&#34;: &#34;pixman&#34;,&#xA;      &#34;version&#34;: &#34;0.40.0-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pixman&#34;,&#xA;        &#34;version&#34;: &#34;0.40.0-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ma5Vpx57SAZOCC5w2EPQYw==&#34;: {&#xA;      &#34;id&#34;: &#34;Ma5Vpx57SAZOCC5w2EPQYw==&#34;,&#xA;      &#34;name&#34;: &#34;libksba&#34;,&#xA;      &#34;version&#34;: &#34;1.5.1-6.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libksba&#34;,&#xA;        &#34;version&#34;: &#34;1.5.1-6.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MdGkZ055CI+TZYqVm7FIPg==&#34;: {&#xA;      &#34;id&#34;: &#34;MdGkZ055CI+TZYqVm7FIPg==&#34;,&#xA;      &#34;name&#34;: &#34;libcbor&#34;,&#xA;      &#34;version&#34;: &#34;0.7.0-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcbor&#34;,&#xA;        &#34;version&#34;: &#34;0.7.0-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Mp61fGpK3II0W8dIQgk3hA==&#34;: {&#xA;      &#34;id&#34;: &#34;Mp61fGpK3II0W8dIQgk3hA==&#34;,&#xA;      &#34;name&#34;: &#34;libpipeline&#34;,&#xA;      &#34;version&#34;: &#34;1.5.3-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpipeline&#34;,&#xA;        &#34;version&#34;: &#34;1.5.3-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MvJE7slPeyMPjzl+J8UH7w==&#34;: {&#xA;      &#34;id&#34;: &#34;MvJE7slPeyMPjzl+J8UH7w==&#34;,&#xA;      &#34;name&#34;: &#34;make&#34;,&#xA;      &#34;version&#34;: &#34;1:4.3-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;make&#34;,&#xA;        &#34;version&#34;: &#34;4.3-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MxYp6jmrNGPG4EUMxgtsIw==&#34;: {&#xA;      &#34;id&#34;: &#34;MxYp6jmrNGPG4EUMxgtsIw==&#34;,&#xA;      &#34;name&#34;: &#34;qt5-srpm-macros&#34;,&#xA;      &#34;version&#34;: &#34;5.15.3-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;qt5&#34;,&#xA;        &#34;version&#34;: &#34;5.15.3-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;N4dB55YYjGYeXRj+vLBatg==&#34;: {&#xA;      &#34;id&#34;: &#34;N4dB55YYjGYeXRj+vLBatg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Class-Struct&#34;,&#xA;      &#34;version&#34;: &#34;0.66-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;N9SQ1VZ/1zaqG0gdsMW91g==&#34;: {&#xA;      &#34;id&#34;: &#34;N9SQ1VZ/1zaqG0gdsMW91g==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Term-ANSIColor&#34;,&#xA;      &#34;version&#34;: &#34;5.01-461.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Term-ANSIColor&#34;,&#xA;        &#34;version&#34;: &#34;5.01-461.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NQAINik1AG7Zn8OB8pLDpA==&#34;: {&#xA;      &#34;id&#34;: &#34;NQAINik1AG7Zn8OB8pLDpA==&#34;,&#xA;      &#34;name&#34;: &#34;libedit&#34;,&#xA;      &#34;version&#34;: &#34;3.1-37.20210216cvs.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libedit&#34;,&#xA;        &#34;version&#34;: &#34;3.1-37.20210216cvs.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Nak/NGhCYVubG4CsEbHhug==&#34;: {&#xA;      &#34;id&#34;: &#34;Nak/NGhCYVubG4CsEbHhug==&#34;,&#xA;      &#34;name&#34;: &#34;graphite2-devel&#34;,&#xA;      &#34;version&#34;: &#34;1.3.14-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;graphite2&#34;,&#xA;        &#34;version&#34;: &#34;1.3.14-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NdCY2/S+syamLH224R4hug==&#34;: {&#xA;      &#34;id&#34;: &#34;NdCY2/S+syamLH224R4hug==&#34;,&#xA;      &#34;name&#34;: &#34;langpacks-en&#34;,&#xA;      &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;langpacks&#34;,&#xA;        &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;O2SZ5NZewmkamADtmBGMpw==&#34;: {&#xA;      &#34;id&#34;: &#34;O2SZ5NZewmkamADtmBGMpw==&#34;,&#xA;      &#34;name&#34;: &#34;setup&#34;,&#xA;      &#34;version&#34;: &#34;2.13.7-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setup&#34;,&#xA;        &#34;version&#34;: &#34;2.13.7-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OLwWa8SuQNJHUBFuTxkKKA==&#34;: {&#xA;      &#34;id&#34;: &#34;OLwWa8SuQNJHUBFuTxkKKA==&#34;,&#xA;      &#34;name&#34;: &#34;cyrus-sasl-lib&#34;,&#xA;      &#34;version&#34;: &#34;2.1.27-20.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cyrus-sasl&#34;,&#xA;        &#34;version&#34;: &#34;2.1.27-20.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;: {&#xA;      &#34;id&#34;: &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;,&#xA;      &#34;name&#34;: &#34;npth&#34;,&#xA;      &#34;version&#34;: &#34;1.6-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npth&#34;,&#xA;        &#34;version&#34;: &#34;1.6-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OkY4XBjh2jDTkYhGjNkrUA==&#34;: {&#xA;      &#34;id&#34;: &#34;OkY4XBjh2jDTkYhGjNkrUA==&#34;,&#xA;      &#34;name&#34;: &#34;mariadb-connector-c&#34;,&#xA;      &#34;version&#34;: &#34;3.2.6-1.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;mariadb-connector-c&#34;,&#xA;        &#34;version&#34;: &#34;3.2.6-1.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;On+NX4Yr+KIGVwagqPDWcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;On+NX4Yr+KIGVwagqPDWcQ==&#34;,&#xA;      &#34;name&#34;: &#34;pcre2-utf16&#34;,&#xA;      &#34;version&#34;: &#34;10.40-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.40-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OvOSK0YS4U6j2gyFBATNXg==&#34;: {&#xA;      &#34;id&#34;: &#34;OvOSK0YS4U6j2gyFBATNXg==&#34;,&#xA;      &#34;name&#34;: &#34;xz&#34;,&#xA;      &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz&#34;,&#xA;        &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PHkBez1UE90U9LJepncOKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;PHkBez1UE90U9LJepncOKQ==&#34;,&#xA;      &#34;name&#34;: &#34;perl-mro&#34;,&#xA;      &#34;version&#34;: &#34;1.23-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Pstkjkz7Io1S30t7a9lp4w==&#34;: {&#xA;      &#34;id&#34;: &#34;Pstkjkz7Io1S30t7a9lp4w==&#34;,&#xA;      &#34;name&#34;: &#34;source-highlight&#34;,&#xA;      &#34;version&#34;: &#34;3.1.9-11.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;source-highlight&#34;,&#xA;        &#34;version&#34;: &#34;3.1.9-11.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Q+exKQZH61PI/8YfpN472w==&#34;: {&#xA;      &#34;id&#34;: &#34;Q+exKQZH61PI/8YfpN472w==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;      &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QCZyKHG3XZk9MlIs9ZFBuA==&#34;: {&#xA;      &#34;id&#34;: &#34;QCZyKHG3XZk9MlIs9ZFBuA==&#34;,&#xA;      &#34;name&#34;: &#34;llvm-libs&#34;,&#xA;      &#34;version&#34;: &#34;14.0.6-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;llvm&#34;,&#xA;        &#34;version&#34;: &#34;14.0.6-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QcnepR4WKBdAhWdMUPrAWA==&#34;: {&#xA;      &#34;id&#34;: &#34;QcnepR4WKBdAhWdMUPrAWA==&#34;,&#xA;      &#34;name&#34;: &#34;python3-hawkey&#34;,&#xA;      &#34;version&#34;: &#34;0.67.0-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libdnf&#34;,&#xA;        &#34;version&#34;: &#34;0.67.0-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QwKK6TG/JtcCly9jntVf+w==&#34;: {&#xA;      &#34;id&#34;: &#34;QwKK6TG/JtcCly9jntVf+w==&#34;,&#xA;      &#34;name&#34;: &#34;vim-filesystem&#34;,&#xA;      &#34;version&#34;: &#34;2:8.2.2637-20.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;8.2.2637-20.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;R7K6A/Ve75xrYpD+6H0Z8w==&#34;: {&#xA;      &#34;id&#34;: &#34;R7K6A/Ve75xrYpD+6H0Z8w==&#34;,&#xA;      &#34;name&#34;: &#34;file&#34;,&#xA;      &#34;version&#34;: &#34;5.39-10.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file&#34;,&#xA;        &#34;version&#34;: &#34;5.39-10.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;R9sC7SuM6vJmJZYq/bMHWw==&#34;: {&#xA;      &#34;id&#34;: &#34;R9sC7SuM6vJmJZYq/bMHWw==&#34;,&#xA;      &#34;name&#34;: &#34;m4&#34;,&#xA;      &#34;version&#34;: &#34;1.4.19-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;m4&#34;,&#xA;        &#34;version&#34;: &#34;1.4.19-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RRIjgvJwJW9jZT+h6lhzrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;RRIjgvJwJW9jZT+h6lhzrQ==&#34;,&#xA;      &#34;name&#34;: &#34;nodejs&#34;,&#xA;      &#34;version&#34;: &#34;1:16.18.1-3.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;16.18.1-3.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RgUn0rRy/i742s4qQGGoNw==&#34;: {&#xA;      &#34;id&#34;: &#34;RgUn0rRy/i742s4qQGGoNw==&#34;,&#xA;      &#34;name&#34;: &#34;libcom_err&#34;,&#xA;      &#34;version&#34;: &#34;1.46.5-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.5-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RhNJQyxUHoA1z70UtgAC4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;RhNJQyxUHoA1z70UtgAC4Q==&#34;,&#xA;      &#34;name&#34;: &#34;perl-File-stat&#34;,&#xA;      &#34;version&#34;: &#34;1.09-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RjsHhFfoWvmQBIu8lxYZjw==&#34;: {&#xA;      &#34;id&#34;: &#34;RjsHhFfoWvmQBIu8lxYZjw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-SelectSaver&#34;,&#xA;      &#34;version&#34;: &#34;1.02-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RnnkgzrsHA8d297AfaWbPg==&#34;: {&#xA;      &#34;id&#34;: &#34;RnnkgzrsHA8d297AfaWbPg==&#34;,&#xA;      &#34;name&#34;: &#34;bash&#34;,&#xA;      &#34;version&#34;: &#34;5.1.8-6.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;5.1.8-6.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Rx4ZYvIz7JT5wbghBsjOTA==&#34;: {&#xA;      &#34;id&#34;: &#34;Rx4ZYvIz7JT5wbghBsjOTA==&#34;,&#xA;      &#34;name&#34;: &#34;libsemanage&#34;,&#xA;      &#34;version&#34;: &#34;3.4-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsemanage&#34;,&#xA;        &#34;version&#34;: &#34;3.4-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SRyGVMCI95+oD0l3+3YStw==&#34;: {&#xA;      &#34;id&#34;: &#34;SRyGVMCI95+oD0l3+3YStw==&#34;,&#xA;      &#34;name&#34;: &#34;dnf&#34;,&#xA;      &#34;version&#34;: &#34;4.12.0-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dnf&#34;,&#xA;        &#34;version&#34;: &#34;4.12.0-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SSFXEK4vNCR4s9ImWtXtgA==&#34;: {&#xA;      &#34;id&#34;: &#34;SSFXEK4vNCR4s9ImWtXtgA==&#34;,&#xA;      &#34;name&#34;: &#34;gnupg2&#34;,&#xA;      &#34;version&#34;: &#34;2.3.3-2.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;2.3.3-2.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SSnnOPGZCl33DlmR57wC7w==&#34;: {&#xA;      &#34;id&#34;: &#34;SSnnOPGZCl33DlmR57wC7w==&#34;,&#xA;      &#34;name&#34;: &#34;python3-dnf-plugins-core&#34;,&#xA;      &#34;version&#34;: &#34;4.1.0-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dnf-plugins-core&#34;,&#xA;        &#34;version&#34;: &#34;4.1.0-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SV9uo4F9Li9vAHBKYcAlZA==&#34;: {&#xA;      &#34;id&#34;: &#34;SV9uo4F9Li9vAHBKYcAlZA==&#34;,&#xA;      &#34;name&#34;: &#34;binutils&#34;,&#xA;      &#34;version&#34;: &#34;2.35.2-24.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;2.35.2-24.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SZllfeGD2yJm0VL0H7onLg==&#34;: {&#xA;      &#34;id&#34;: &#34;SZllfeGD2yJm0VL0H7onLg==&#34;,&#xA;      &#34;name&#34;: &#34;libxcb-devel&#34;,&#xA;      &#34;version&#34;: &#34;1.13.1-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxcb&#34;,&#xA;        &#34;version&#34;: &#34;1.13.1-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SdI1Am/qHph5dG2ZoOeUIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SdI1Am/qHph5dG2ZoOeUIQ==&#34;,&#xA;      &#34;name&#34;: &#34;libevent&#34;,&#xA;      &#34;version&#34;: &#34;2.1.12-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libevent&#34;,&#xA;        &#34;version&#34;: &#34;2.1.12-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TANtf1h6RhI5yVQQhHFTbg==&#34;: {&#xA;      &#34;id&#34;: &#34;TANtf1h6RhI5yVQQhHFTbg==&#34;,&#xA;      &#34;name&#34;: &#34;libstdc++-devel&#34;,&#xA;      &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;THoW7icQ9Ts4hZAkh5A/WQ==&#34;: {&#xA;      &#34;id&#34;: &#34;THoW7icQ9Ts4hZAkh5A/WQ==&#34;,&#xA;      &#34;name&#34;: &#34;perl-if&#34;,&#xA;      &#34;version&#34;: &#34;0.60.800-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;: {&#xA;      &#34;id&#34;: &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;,&#xA;      &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;      &#34;version&#34;: &#34;0.8.2-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;        &#34;version&#34;: &#34;0.8.2-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Tl6ebomp9GQLN9svWzKp+w==&#34;: {&#xA;      &#34;id&#34;: &#34;Tl6ebomp9GQLN9svWzKp+w==&#34;,&#xA;      &#34;name&#34;: &#34;libcap&#34;,&#xA;      &#34;version&#34;: &#34;2.48-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;2.48-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;: {&#xA;      &#34;id&#34;: &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;,&#xA;      &#34;name&#34;: &#34;gpgme&#34;,&#xA;      &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gpgme&#34;,&#xA;        &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Tob5YtKxleVTQzw2GCmwGg==&#34;: {&#xA;      &#34;id&#34;: &#34;Tob5YtKxleVTQzw2GCmwGg==&#34;,&#xA;      &#34;name&#34;: &#34;libpq-devel&#34;,&#xA;      &#34;version&#34;: &#34;13.5-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpq&#34;,&#xA;        &#34;version&#34;: &#34;13.5-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TzNyp6yTJ3m0O8xeeDKC3A==&#34;: {&#xA;      &#34;id&#34;: &#34;TzNyp6yTJ3m0O8xeeDKC3A==&#34;,&#xA;      &#34;name&#34;: &#34;libpq&#34;,&#xA;      &#34;version&#34;: &#34;13.5-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpq&#34;,&#xA;        &#34;version&#34;: &#34;13.5-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TzT9ayOh2hZShfYtipxZEw==&#34;: {&#xA;      &#34;id&#34;: &#34;TzT9ayOh2hZShfYtipxZEw==&#34;,&#xA;      &#34;name&#34;: &#34;harfbuzz-icu&#34;,&#xA;      &#34;version&#34;: &#34;2.7.4-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;harfbuzz&#34;,&#xA;        &#34;version&#34;: &#34;2.7.4-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;U0P0dNPn1iUcw6b33AAKUg==&#34;: {&#xA;      &#34;id&#34;: &#34;U0P0dNPn1iUcw6b33AAKUg==&#34;,&#xA;      &#34;name&#34;: &#34;sqlite-devel&#34;,&#xA;      &#34;version&#34;: &#34;3.34.1-6.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;3.34.1-6.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ud9PNLLJ6v7hTpAYdO825w==&#34;: {&#xA;      &#34;id&#34;: &#34;Ud9PNLLJ6v7hTpAYdO825w==&#34;,&#xA;      &#34;name&#34;: &#34;pcre-utf16&#34;,&#xA;      &#34;version&#34;: &#34;8.44-3.el9.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre&#34;,&#xA;        &#34;version&#34;: &#34;8.44-3.el9.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Uui1iXuECCOB7NgLQMsJpg==&#34;: {&#xA;      &#34;id&#34;: &#34;Uui1iXuECCOB7NgLQMsJpg==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;      &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UyCrdfN88WUEEECLCIw93w==&#34;: {&#xA;      &#34;id&#34;: &#34;UyCrdfN88WUEEECLCIw93w==&#34;,&#xA;      &#34;name&#34;: &#34;keyutils-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.6.1-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;keyutils&#34;,&#xA;        &#34;version&#34;: &#34;1.6.1-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;V/3oHP6E5IRlfgZZHK72RA==&#34;: {&#xA;      &#34;id&#34;: &#34;V/3oHP6E5IRlfgZZHK72RA==&#34;,&#xA;      &#34;name&#34;: &#34;p11-kit-trust&#34;,&#xA;      &#34;version&#34;: &#34;0.24.1-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.24.1-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VDWxBVhhJMCCBIlvmorheA==&#34;: {&#xA;      &#34;id&#34;: &#34;VDWxBVhhJMCCBIlvmorheA==&#34;,&#xA;      &#34;name&#34;: &#34;libfido2&#34;,&#xA;      &#34;version&#34;: &#34;1.6.0-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libfido2&#34;,&#xA;        &#34;version&#34;: &#34;1.6.0-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VFldiAD+rTFuce+kutFUuA==&#34;: {&#xA;      &#34;id&#34;: &#34;VFldiAD+rTFuce+kutFUuA==&#34;,&#xA;      &#34;name&#34;: &#34;openssl&#34;,&#xA;      &#34;version&#34;: &#34;1:3.0.1-47.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;3.0.1-47.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VKbklzwNVEem7m1iQRERDg==&#34;: {&#xA;      &#34;id&#34;: &#34;VKbklzwNVEem7m1iQRERDg==&#34;,&#xA;      &#34;name&#34;: &#34;stdlib&#34;,&#xA;      &#34;version&#34;: &#34;1.18.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;semver:0.1.18.1.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VLOqRGIR4aQvFfvVrpLyIg==&#34;: {&#xA;      &#34;id&#34;: &#34;VLOqRGIR4aQvFfvVrpLyIg==&#34;,&#xA;      &#34;name&#34;: &#34;pcre-cpp&#34;,&#xA;      &#34;version&#34;: &#34;8.44-3.el9.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre&#34;,&#xA;        &#34;version&#34;: &#34;8.44-3.el9.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;: {&#xA;      &#34;id&#34;: &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;,&#xA;      &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;      &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;        &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VhjrPOGZ9XGEFgLnQWc+KQ==&#34;: {&#xA;      &#34;id&#34;: &#34;VhjrPOGZ9XGEFgLnQWc+KQ==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Text-Tabs+Wrap&#34;,&#xA;      &#34;version&#34;: &#34;2013.0523-460.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Text-Tabs+Wrap&#34;,&#xA;        &#34;version&#34;: &#34;2013.0523-460.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;W+js148eF9SSUbrTSIRvOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;W+js148eF9SSUbrTSIRvOQ==&#34;,&#xA;      &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;      &#34;version&#34;: &#34;7.76.1-19.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;7.76.1-19.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;W4amAY83CsyR7zQ0GM7zsg==&#34;: {&#xA;      &#34;id&#34;: &#34;W4amAY83CsyR7zQ0GM7zsg==&#34;,&#xA;      &#34;name&#34;: &#34;pcre2-syntax&#34;,&#xA;      &#34;version&#34;: &#34;10.40-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.40-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WCNTEGU4JEqQUNwdkKkP0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;WCNTEGU4JEqQUNwdkKkP0Q==&#34;,&#xA;      &#34;name&#34;: &#34;perl-interpreter&#34;,&#xA;      &#34;version&#34;: &#34;4:5.32.1-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WIBkwuKReD+vnev0WY88mA==&#34;: {&#xA;      &#34;id&#34;: &#34;WIBkwuKReD+vnev0WY88mA==&#34;,&#xA;      &#34;name&#34;: &#34;go-srpm-macros&#34;,&#xA;      &#34;version&#34;: &#34;3.0.9-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;3.0.9-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WM43f6rBXkL3dY9fUi8CGw==&#34;: {&#xA;      &#34;id&#34;: &#34;WM43f6rBXkL3dY9fUi8CGw==&#34;,&#xA;      &#34;name&#34;: &#34;boost-regex&#34;,&#xA;      &#34;version&#34;: &#34;1.75.0-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;boost&#34;,&#xA;        &#34;version&#34;: &#34;1.75.0-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WN9YKonIBKVWuMNAg76vrA==&#34;: {&#xA;      &#34;id&#34;: &#34;WN9YKonIBKVWuMNAg76vrA==&#34;,&#xA;      &#34;name&#34;: &#34;libXpm-devel&#34;,&#xA;      &#34;version&#34;: &#34;3.5.13-8.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libXpm&#34;,&#xA;        &#34;version&#34;: &#34;3.5.13-8.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WXfnWfq5UvDl4B0hS+0enw==&#34;: {&#xA;      &#34;id&#34;: &#34;WXfnWfq5UvDl4B0hS+0enw==&#34;,&#xA;      &#34;name&#34;: &#34;elfutils-debuginfod-client&#34;,&#xA;      &#34;version&#34;: &#34;0.187-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;elfutils&#34;,&#xA;        &#34;version&#34;: &#34;0.187-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WgTBt6b85L1bF7WXV5bQRA==&#34;: {&#xA;      &#34;id&#34;: &#34;WgTBt6b85L1bF7WXV5bQRA==&#34;,&#xA;      &#34;name&#34;: &#34;perl-File-Compare&#34;,&#xA;      &#34;version&#34;: &#34;1.100.600-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WifWl02dLM2pp5urxOSuNg==&#34;: {&#xA;      &#34;id&#34;: &#34;WifWl02dLM2pp5urxOSuNg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-URI&#34;,&#xA;      &#34;version&#34;: &#34;5.09-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-URI&#34;,&#xA;        &#34;version&#34;: &#34;5.09-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WuHt6bav9qTQn9+qCLLu3w==&#34;: {&#xA;      &#34;id&#34;: &#34;WuHt6bav9qTQn9+qCLLu3w==&#34;,&#xA;      &#34;name&#34;: &#34;python3-rpm&#34;,&#xA;      &#34;version&#34;: &#34;4.16.1.3-19.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;4.16.1.3-19.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XD0JiZBKTweysL9d3sIzpw==&#34;: {&#xA;      &#34;id&#34;: &#34;XD0JiZBKTweysL9d3sIzpw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-subs&#34;,&#xA;      &#34;version&#34;: &#34;1.03-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XMI2bnJZdxdcHnKc3zgCUA==&#34;: {&#xA;      &#34;id&#34;: &#34;XMI2bnJZdxdcHnKc3zgCUA==&#34;,&#xA;      &#34;name&#34;: &#34;ghc-srpm-macros&#34;,&#xA;      &#34;version&#34;: &#34;1.5.0-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ghc-srpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;1.5.0-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XMPq7+46c92RSax5sZ9PZw==&#34;: {&#xA;      &#34;id&#34;: &#34;XMPq7+46c92RSax5sZ9PZw==&#34;,&#xA;      &#34;name&#34;: &#34;libxml2&#34;,&#xA;      &#34;version&#34;: &#34;2.9.13-3.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;2.9.13-3.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XPJI1FEhwhWF1vzFJI8S6g==&#34;: {&#xA;      &#34;id&#34;: &#34;XPJI1FEhwhWF1vzFJI8S6g==&#34;,&#xA;      &#34;name&#34;: &#34;libsolv&#34;,&#xA;      &#34;version&#34;: &#34;0.7.22-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsolv&#34;,&#xA;        &#34;version&#34;: &#34;0.7.22-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XVUHqTgxrtHVNbQOLA/oQA==&#34;: {&#xA;      &#34;id&#34;: &#34;XVUHqTgxrtHVNbQOLA/oQA==&#34;,&#xA;      &#34;name&#34;: &#34;librepo&#34;,&#xA;      &#34;version&#34;: &#34;1.14.2-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;librepo&#34;,&#xA;        &#34;version&#34;: &#34;1.14.2-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XX1gx35T8rMzed7p4qESdA==&#34;: {&#xA;      &#34;id&#34;: &#34;XX1gx35T8rMzed7p4qESdA==&#34;,&#xA;      &#34;name&#34;: &#34;harfbuzz-devel&#34;,&#xA;      &#34;version&#34;: &#34;2.7.4-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;harfbuzz&#34;,&#xA;        &#34;version&#34;: &#34;2.7.4-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XliA1VgMzM5VjjSZdnmlQw==&#34;: {&#xA;      &#34;id&#34;: &#34;XliA1VgMzM5VjjSZdnmlQw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Getopt-Long&#34;,&#xA;      &#34;version&#34;: &#34;1:2.52-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Getopt-Long&#34;,&#xA;        &#34;version&#34;: &#34;2.52-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XmQjRyagIacphhV3vVNJUg==&#34;: {&#xA;      &#34;id&#34;: &#34;XmQjRyagIacphhV3vVNJUg==&#34;,&#xA;      &#34;name&#34;: &#34;libuser&#34;,&#xA;      &#34;version&#34;: &#34;0.63-11.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libuser&#34;,&#xA;        &#34;version&#34;: &#34;0.63-11.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Xs0UZDLX+3bz2vT+iSJz7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Xs0UZDLX+3bz2vT+iSJz7Q==&#34;,&#xA;      &#34;name&#34;: &#34;glib2&#34;,&#xA;      &#34;version&#34;: &#34;2.68.4-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;2.68.4-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;: {&#xA;      &#34;id&#34;: &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;,&#xA;      &#34;name&#34;: &#34;readline&#34;,&#xA;      &#34;version&#34;: &#34;8.1-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;readline&#34;,&#xA;        &#34;version&#34;: &#34;8.1-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Y2WVn7YbALZNiKrMVF83bA==&#34;: {&#xA;      &#34;id&#34;: &#34;Y2WVn7YbALZNiKrMVF83bA==&#34;,&#xA;      &#34;name&#34;: &#34;bsdtar&#34;,&#xA;      &#34;version&#34;: &#34;3.5.3-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;3.5.3-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Y35yrxWjtTUkUbNtS9+p6g==&#34;: {&#xA;      &#34;id&#34;: &#34;Y35yrxWjtTUkUbNtS9+p6g==&#34;,&#xA;      &#34;name&#34;: &#34;python3-six&#34;,&#xA;      &#34;version&#34;: &#34;1.15.0-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-six&#34;,&#xA;        &#34;version&#34;: &#34;1.15.0-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YRfO+WACNVQDTEO1DaRoPw==&#34;: {&#xA;      &#34;id&#34;: &#34;YRfO+WACNVQDTEO1DaRoPw==&#34;,&#xA;      &#34;name&#34;: &#34;libarchive&#34;,&#xA;      &#34;version&#34;: &#34;3.5.3-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;3.5.3-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZEh/5caJmj5WMgoK5/jyfw==&#34;: {&#xA;      &#34;id&#34;: &#34;ZEh/5caJmj5WMgoK5/jyfw==&#34;,&#xA;      &#34;name&#34;: &#34;libjpeg-turbo&#34;,&#xA;      &#34;version&#34;: &#34;2.0.90-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libjpeg-turbo&#34;,&#xA;        &#34;version&#34;: &#34;2.0.90-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZX4vKkXsoMfQ2HH9oPb0TA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZX4vKkXsoMfQ2HH9oPb0TA==&#34;,&#xA;      &#34;name&#34;: &#34;libXau-devel&#34;,&#xA;      &#34;version&#34;: &#34;1.0.9-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libXau&#34;,&#xA;        &#34;version&#34;: &#34;1.0.9-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Znd6oNA8HDVHwd3abR/PEg==&#34;: {&#xA;      &#34;id&#34;: &#34;Znd6oNA8HDVHwd3abR/PEg==&#34;,&#xA;      &#34;name&#34;: &#34;libblkid-devel&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;a0GQ0ecdg5PXNSF9I+cGHw==&#34;: {&#xA;      &#34;id&#34;: &#34;a0GQ0ecdg5PXNSF9I+cGHw==&#34;,&#xA;      &#34;name&#34;: &#34;libX11&#34;,&#xA;      &#34;version&#34;: &#34;1.7.0-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11&#34;,&#xA;        &#34;version&#34;: &#34;1.7.0-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aW0vfCmvp3ku6dMkvaoZGw==&#34;: {&#xA;      &#34;id&#34;: &#34;aW0vfCmvp3ku6dMkvaoZGw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-base&#34;,&#xA;      &#34;version&#34;: &#34;2.27-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ao0mLJHwgqEhua26lzg6gQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ao0mLJHwgqEhua26lzg6gQ==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;      &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;arzS3GnLPLKzM8xRPFnUzw==&#34;: {&#xA;      &#34;id&#34;: &#34;arzS3GnLPLKzM8xRPFnUzw==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses&#34;,&#xA;      &#34;version&#34;: &#34;6.2-8.20210508.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2-8.20210508.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ax5YZqtoTsGSLh5YAOUDAA==&#34;: {&#xA;      &#34;id&#34;: &#34;ax5YZqtoTsGSLh5YAOUDAA==&#34;,&#xA;      &#34;name&#34;: &#34;dbus-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:1.12.20-7.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus&#34;,&#xA;        &#34;version&#34;: &#34;1.12.20-7.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;b/fX+2E3Kw/VrXP3Viej5w==&#34;: {&#xA;      &#34;id&#34;: &#34;b/fX+2E3Kw/VrXP3Viej5w==&#34;,&#xA;      &#34;name&#34;: &#34;acl&#34;,&#xA;      &#34;version&#34;: &#34;2.3.1-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;acl&#34;,&#xA;        &#34;version&#34;: &#34;2.3.1-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bEsPytE/ZdCMbfuAgQc9AA==&#34;: {&#xA;      &#34;id&#34;: &#34;bEsPytE/ZdCMbfuAgQc9AA==&#34;,&#xA;      &#34;name&#34;: &#34;perl-srpm-macros&#34;,&#xA;      &#34;version&#34;: &#34;1-41.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-srpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;1-41.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;: {&#xA;      &#34;id&#34;: &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;,&#xA;      &#34;name&#34;: &#34;grep&#34;,&#xA;      &#34;version&#34;: &#34;3.6-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;grep&#34;,&#xA;        &#34;version&#34;: &#34;3.6-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bQK0gSM91Pq8oi5kJ9072Q==&#34;: {&#xA;      &#34;id&#34;: &#34;bQK0gSM91Pq8oi5kJ9072Q==&#34;,&#xA;      &#34;name&#34;: &#34;gettext-libs&#34;,&#xA;      &#34;version&#34;: &#34;0.21-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gettext&#34;,&#xA;        &#34;version&#34;: &#34;0.21-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bbOmNWQZu2GtbHRNTT5LbA==&#34;: {&#xA;      &#34;id&#34;: &#34;bbOmNWQZu2GtbHRNTT5LbA==&#34;,&#xA;      &#34;name&#34;: &#34;pcre2&#34;,&#xA;      &#34;version&#34;: &#34;10.40-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.40-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bp0rUgZ5FkIYAX2aEVd/VA==&#34;: {&#xA;      &#34;id&#34;: &#34;bp0rUgZ5FkIYAX2aEVd/VA==&#34;,&#xA;      &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;      &#34;version&#34;: &#34;2:8.2.2637-20.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;8.2.2637-20.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;byfHs8LLvbAc+YzK8+QmXA==&#34;: {&#xA;      &#34;id&#34;: &#34;byfHs8LLvbAc+YzK8+QmXA==&#34;,&#xA;      &#34;name&#34;: &#34;glibc&#34;,&#xA;      &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-40.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;c+W6x4Mcea6sasJQFpayfg==&#34;: {&#xA;      &#34;id&#34;: &#34;c+W6x4Mcea6sasJQFpayfg==&#34;,&#xA;      &#34;name&#34;: &#34;libwebp&#34;,&#xA;      &#34;version&#34;: &#34;1.2.0-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libwebp&#34;,&#xA;        &#34;version&#34;: &#34;1.2.0-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;c4cAHnbL6QvzxTWvSxwSUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;c4cAHnbL6QvzxTWvSxwSUQ==&#34;,&#xA;      &#34;name&#34;: &#34;golang-bin&#34;,&#xA;      &#34;version&#34;: &#34;1.18.9-1.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;1.18.9-1.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;c6MW06Rtj8J56gSpVtmC/w==&#34;: {&#xA;      &#34;id&#34;: &#34;c6MW06Rtj8J56gSpVtmC/w==&#34;,&#xA;      &#34;name&#34;: &#34;libselinux-devel&#34;,&#xA;      &#34;version&#34;: &#34;3.4-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libselinux&#34;,&#xA;        &#34;version&#34;: &#34;3.4-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cGWkJkC9Qm+QCP4f8vmD+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;cGWkJkC9Qm+QCP4f8vmD+Q==&#34;,&#xA;      &#34;name&#34;: &#34;libX11-xcb&#34;,&#xA;      &#34;version&#34;: &#34;1.7.0-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11&#34;,&#xA;        &#34;version&#34;: &#34;1.7.0-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cPPALpm8EZ1p7Fe1on0nPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;cPPALpm8EZ1p7Fe1on0nPQ==&#34;,&#xA;      &#34;name&#34;: &#34;diffutils&#34;,&#xA;      &#34;version&#34;: &#34;3.7-12.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;diffutils&#34;,&#xA;        &#34;version&#34;: &#34;3.7-12.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;caF9WsICRhpk2jJBTv5OsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;caF9WsICRhpk2jJBTv5OsQ==&#34;,&#xA;      &#34;name&#34;: &#34;perl-File-Basename&#34;,&#xA;      &#34;version&#34;: &#34;2.85-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cj0M8yBzJA8j5tTGHOqDIw==&#34;: {&#xA;      &#34;id&#34;: &#34;cj0M8yBzJA8j5tTGHOqDIw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Fcntl&#34;,&#xA;      &#34;version&#34;: &#34;1.13-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ckYokpjDEx3hfGxpdtbM6A==&#34;: {&#xA;      &#34;id&#34;: &#34;ckYokpjDEx3hfGxpdtbM6A==&#34;,&#xA;      &#34;name&#34;: &#34;dnf-plugins-core&#34;,&#xA;      &#34;version&#34;: &#34;4.1.0-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dnf-plugins-core&#34;,&#xA;        &#34;version&#34;: &#34;4.1.0-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;clGQ5Kq/RKZZziBln/4BLA==&#34;: {&#xA;      &#34;id&#34;: &#34;clGQ5Kq/RKZZziBln/4BLA==&#34;,&#xA;      &#34;name&#34;: &#34;perl-DynaLoader&#34;,&#xA;      &#34;version&#34;: &#34;1.47-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ct/ndQfSB+G17YP34ufDBA==&#34;: {&#xA;      &#34;id&#34;: &#34;ct/ndQfSB+G17YP34ufDBA==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Digest-MD5&#34;,&#xA;      &#34;version&#34;: &#34;2.58-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Digest-MD5&#34;,&#xA;        &#34;version&#34;: &#34;2.58-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dC9CoYt17eaqinGSVCfCxw==&#34;: {&#xA;      &#34;id&#34;: &#34;dC9CoYt17eaqinGSVCfCxw==&#34;,&#xA;      &#34;name&#34;: &#34;libattr&#34;,&#xA;      &#34;version&#34;: &#34;2.5.1-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;attr&#34;,&#xA;        &#34;version&#34;: &#34;2.5.1-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dMY7Qly4vcBOdARECvhzxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dMY7Qly4vcBOdARECvhzxQ==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-libs&#34;,&#xA;      &#34;version&#34;: &#34;6.2-8.20210508.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2-8.20210508.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dStYvdO33sly7EacpHOqeA==&#34;: {&#xA;      &#34;id&#34;: &#34;dStYvdO33sly7EacpHOqeA==&#34;,&#xA;      &#34;name&#34;: &#34;rootfiles&#34;,&#xA;      &#34;version&#34;: &#34;8.1-31.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rootfiles&#34;,&#xA;        &#34;version&#34;: &#34;8.1-31.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dYr9tK7XM6aISNKJAtl5ZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dYr9tK7XM6aISNKJAtl5ZQ==&#34;,&#xA;      &#34;name&#34;: &#34;pcre-utf32&#34;,&#xA;      &#34;version&#34;: &#34;8.44-3.el9.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre&#34;,&#xA;        &#34;version&#34;: &#34;8.44-3.el9.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dnA+092RxSVxmYLtbm4n5w==&#34;: {&#xA;      &#34;id&#34;: &#34;dnA+092RxSVxmYLtbm4n5w==&#34;,&#xA;      &#34;name&#34;: &#34;libmount-devel&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;      &#34;version&#34;: &#34;2.13-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;        &#34;version&#34;: &#34;2.13-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dt/eA+h8BqXPeZvbQ4xjlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dt/eA+h8BqXPeZvbQ4xjlQ==&#34;,&#xA;      &#34;name&#34;: &#34;openssh&#34;,&#xA;      &#34;version&#34;: &#34;8.7p1-24.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;8.7p1-24.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;e7W78NrdwYaVEcBcXhDv5Q==&#34;: {&#xA;      &#34;id&#34;: &#34;e7W78NrdwYaVEcBcXhDv5Q==&#34;,&#xA;      &#34;name&#34;: &#34;libcomps&#34;,&#xA;      &#34;version&#34;: &#34;0.1.18-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcomps&#34;,&#xA;        &#34;version&#34;: &#34;0.1.18-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eEjpOxWkwvzzJN5kkeVUcg==&#34;: {&#xA;      &#34;id&#34;: &#34;eEjpOxWkwvzzJN5kkeVUcg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Encode&#34;,&#xA;      &#34;version&#34;: &#34;4:3.08-462.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Encode&#34;,&#xA;        &#34;version&#34;: &#34;3.08-462.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eJ5VkZHE2z3KyF5sFEKj8g==&#34;: {&#xA;      &#34;id&#34;: &#34;eJ5VkZHE2z3KyF5sFEKj8g==&#34;,&#xA;      &#34;name&#34;: &#34;cmake-filesystem&#34;,&#xA;      &#34;version&#34;: &#34;3.20.2-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cmake&#34;,&#xA;        &#34;version&#34;: &#34;3.20.2-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eMk3cpR3xfyfnR/IUeON3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;eMk3cpR3xfyfnR/IUeON3Q==&#34;,&#xA;      &#34;name&#34;: &#34;command-line-arguments&#34;,&#xA;      &#34;version&#34;: &#34;(devel)&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eUjbBBk9e6ukjdxq7Ysc5Q==&#34;: {&#xA;      &#34;id&#34;: &#34;eUjbBBk9e6ukjdxq7Ysc5Q==&#34;,&#xA;      &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.19.1-24.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.19.1-24.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eckWZv7IBjaLZNS/vZ1gWg==&#34;: {&#xA;      &#34;id&#34;: &#34;eckWZv7IBjaLZNS/vZ1gWg==&#34;,&#xA;      &#34;name&#34;: &#34;procps-ng&#34;,&#xA;      &#34;version&#34;: &#34;3.3.17-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;procps-ng&#34;,&#xA;        &#34;version&#34;: &#34;3.3.17-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ey7Cn3NmMZ6qorZvUccGqA==&#34;: {&#xA;      &#34;id&#34;: &#34;ey7Cn3NmMZ6qorZvUccGqA==&#34;,&#xA;      &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:16.18.1-3.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;16.18.1-3.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;f2GhXCi0MGW6C5vh1ih8XQ==&#34;: {&#xA;      &#34;id&#34;: &#34;f2GhXCi0MGW6C5vh1ih8XQ==&#34;,&#xA;      &#34;name&#34;: &#34;perl-threads&#34;,&#xA;      &#34;version&#34;: &#34;1:2.25-460.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-threads&#34;,&#xA;        &#34;version&#34;: &#34;2.25-460.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fTz/BbdjDg+PD+HvcMlQ3A==&#34;: {&#xA;      &#34;id&#34;: &#34;fTz/BbdjDg+PD+HvcMlQ3A==&#34;,&#xA;      &#34;name&#34;: &#34;go-toolset&#34;,&#xA;      &#34;version&#34;: &#34;1.18.9-1.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;1.18.9-1.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ffBZQco1wXO0fddcwHstSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ffBZQco1wXO0fddcwHstSQ==&#34;,&#xA;      &#34;name&#34;: &#34;redhat-rpm-config&#34;,&#xA;      &#34;version&#34;: &#34;196-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;redhat-rpm-config&#34;,&#xA;        &#34;version&#34;: &#34;196-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gBWlSWdEA8U1+Ep4A/+M2g==&#34;: {&#xA;      &#34;id&#34;: &#34;gBWlSWdEA8U1+Ep4A/+M2g==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Error&#34;,&#xA;      &#34;version&#34;: &#34;1:0.17029-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Error&#34;,&#xA;        &#34;version&#34;: &#34;0.17029-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gJHwCqer7Rl9ijGK6wpg4A==&#34;: {&#xA;      &#34;id&#34;: &#34;gJHwCqer7Rl9ijGK6wpg4A==&#34;,&#xA;      &#34;name&#34;: &#34;libICE&#34;,&#xA;      &#34;version&#34;: &#34;1.0.10-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libICE&#34;,&#xA;        &#34;version&#34;: &#34;1.0.10-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gngAZQYf0zy4+w3GwgpLmw==&#34;: {&#xA;      &#34;id&#34;: &#34;gngAZQYf0zy4+w3GwgpLmw==&#34;,&#xA;      &#34;name&#34;: &#34;python3-libcomps&#34;,&#xA;      &#34;version&#34;: &#34;0.1.18-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcomps&#34;,&#xA;        &#34;version&#34;: &#34;0.1.18-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gsdYiUdG+fMtG/M0X1EkAg==&#34;: {&#xA;      &#34;id&#34;: &#34;gsdYiUdG+fMtG/M0X1EkAg==&#34;,&#xA;      &#34;name&#34;: &#34;filesystem&#34;,&#xA;      &#34;version&#34;: &#34;3.16-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;filesystem&#34;,&#xA;        &#34;version&#34;: &#34;3.16-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hGxLNL3q3tYYzz2uKfKB4A==&#34;: {&#xA;      &#34;id&#34;: &#34;hGxLNL3q3tYYzz2uKfKB4A==&#34;,&#xA;      &#34;name&#34;: &#34;expat&#34;,&#xA;      &#34;version&#34;: &#34;2.4.9-1.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;2.4.9-1.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hHL/OokyETnopazrev0shg==&#34;: {&#xA;      &#34;id&#34;: &#34;hHL/OokyETnopazrev0shg==&#34;,&#xA;      &#34;name&#34;: &#34;lua-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.4.4-2.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lua&#34;,&#xA;        &#34;version&#34;: &#34;5.4.4-2.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hKJ3xmpaes4B2vxd2C5M1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;hKJ3xmpaes4B2vxd2C5M1Q==&#34;,&#xA;      &#34;name&#34;: &#34;ocaml-srpm-macros&#34;,&#xA;      &#34;version&#34;: &#34;6-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ocaml-srpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;6-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hNv7ol5w6PGaZXktwlRWPg==&#34;: {&#xA;      &#34;id&#34;: &#34;hNv7ol5w6PGaZXktwlRWPg==&#34;,&#xA;      &#34;name&#34;: &#34;libblkid&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;: {&#xA;      &#34;id&#34;: &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;,&#xA;      &#34;name&#34;: &#34;lz4-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.9.3-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lz4&#34;,&#xA;        &#34;version&#34;: &#34;1.9.3-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hasHd85qN7fkJeIIqjjDow==&#34;: {&#xA;      &#34;id&#34;: &#34;hasHd85qN7fkJeIIqjjDow==&#34;,&#xA;      &#34;name&#34;: &#34;gcc&#34;,&#xA;      &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;heXcDkpDDTJ/ac/FHrXYvg==&#34;: {&#xA;      &#34;id&#34;: &#34;heXcDkpDDTJ/ac/FHrXYvg==&#34;,&#xA;      &#34;name&#34;: &#34;efi-srpm-macros&#34;,&#xA;      &#34;version&#34;: &#34;6-2.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;efi-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;6-2.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hgr5TOXgV4U9LXyKt2w6gA==&#34;: {&#xA;      &#34;id&#34;: &#34;hgr5TOXgV4U9LXyKt2w6gA==&#34;,&#xA;      &#34;name&#34;: &#34;libffi-devel&#34;,&#xA;      &#34;version&#34;: &#34;3.4.2-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libffi&#34;,&#xA;        &#34;version&#34;: &#34;3.4.2-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hjikQWtnmVPaWts63wYw4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;hjikQWtnmVPaWts63wYw4Q==&#34;,&#xA;      &#34;name&#34;: &#34;passwd&#34;,&#xA;      &#34;version&#34;: &#34;0.80-12.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;passwd&#34;,&#xA;        &#34;version&#34;: &#34;0.80-12.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hrY/5TRUmBt6d/EoQ9M7aw==&#34;: {&#xA;      &#34;id&#34;: &#34;hrY/5TRUmBt6d/EoQ9M7aw==&#34;,&#xA;      &#34;name&#34;: &#34;python3-dateutil&#34;,&#xA;      &#34;version&#34;: &#34;1:2.8.1-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-dateutil&#34;,&#xA;        &#34;version&#34;: &#34;2.8.1-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hvKbzRSMjrg1f3y/PRzGwg==&#34;: {&#xA;      &#34;id&#34;: &#34;hvKbzRSMjrg1f3y/PRzGwg==&#34;,&#xA;      &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;      &#34;version&#34;: &#34;1:3.0.1-47.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;3.0.1-47.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hyds1mrD8GWUXo+lv53Rag==&#34;: {&#xA;      &#34;id&#34;: &#34;hyds1mrD8GWUXo+lv53Rag==&#34;,&#xA;      &#34;name&#34;: &#34;findutils&#34;,&#xA;      &#34;version&#34;: &#34;1:4.8.0-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;findutils&#34;,&#xA;        &#34;version&#34;: &#34;4.8.0-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;i1yNGcAdCbK2SnebCgMUqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;i1yNGcAdCbK2SnebCgMUqQ==&#34;,&#xA;      &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;      &#34;version&#34;: &#34;250-12.el9_1.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;250-12.el9_1.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iBA/JBMmSIEGbBZDQlcuUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;iBA/JBMmSIEGbBZDQlcuUQ==&#34;,&#xA;      &#34;name&#34;: &#34;bzip2-devel&#34;,&#xA;      &#34;version&#34;: &#34;1.0.8-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2&#34;,&#xA;        &#34;version&#34;: &#34;1.0.8-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iG10xBRfLLoRP3qlluI7NQ==&#34;: {&#xA;      &#34;id&#34;: &#34;iG10xBRfLLoRP3qlluI7NQ==&#34;,&#xA;      &#34;name&#34;: &#34;automake&#34;,&#xA;      &#34;version&#34;: &#34;1.16.2-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;automake&#34;,&#xA;        &#34;version&#34;: &#34;1.16.2-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iMLMqCcRXnm6QslpJnCS7w==&#34;: {&#xA;      &#34;id&#34;: &#34;iMLMqCcRXnm6QslpJnCS7w==&#34;,&#xA;      &#34;name&#34;: &#34;cairo&#34;,&#xA;      &#34;version&#34;: &#34;1.17.4-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cairo&#34;,&#xA;        &#34;version&#34;: &#34;1.17.4-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iQByZpdRXgW/fl3SoDuoAA==&#34;: {&#xA;      &#34;id&#34;: &#34;iQByZpdRXgW/fl3SoDuoAA==&#34;,&#xA;      &#34;name&#34;: &#34;libipt&#34;,&#xA;      &#34;version&#34;: &#34;2.0.4-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libipt&#34;,&#xA;        &#34;version&#34;: &#34;2.0.4-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iQnKl0+RxymKc9bhVdyuyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;iQnKl0+RxymKc9bhVdyuyQ==&#34;,&#xA;      &#34;name&#34;: &#34;perl-B&#34;,&#xA;      &#34;version&#34;: &#34;1.80-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iTjyL8AL9avw3YnaeFgLEg==&#34;: {&#xA;      &#34;id&#34;: &#34;iTjyL8AL9avw3YnaeFgLEg==&#34;,&#xA;      &#34;name&#34;: &#34;gettext&#34;,&#xA;      &#34;version&#34;: &#34;0.21-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gettext&#34;,&#xA;        &#34;version&#34;: &#34;0.21-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iswhVSntR4QnIsTAyM6ydQ==&#34;: {&#xA;      &#34;id&#34;: &#34;iswhVSntR4QnIsTAyM6ydQ==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Pod-Escapes&#34;,&#xA;      &#34;version&#34;: &#34;1:1.07-460.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Pod-Escapes&#34;,&#xA;        &#34;version&#34;: &#34;1.07-460.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ix3lD4/Nn7qLbcpDm0AIhg==&#34;: {&#xA;      &#34;id&#34;: &#34;ix3lD4/Nn7qLbcpDm0AIhg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-constant&#34;,&#xA;      &#34;version&#34;: &#34;1.33-461.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-constant&#34;,&#xA;        &#34;version&#34;: &#34;1.33-461.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;j3oHbOmfE09xNAzoTXpcSg==&#34;: {&#xA;      &#34;id&#34;: &#34;j3oHbOmfE09xNAzoTXpcSg==&#34;,&#xA;      &#34;name&#34;: &#34;libsepol&#34;,&#xA;      &#34;version&#34;: &#34;3.4-1.1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;3.4-1.1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jADxtb7PiatU9dihVhjp/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;jADxtb7PiatU9dihVhjp/Q==&#34;,&#xA;      &#34;name&#34;: &#34;elfutils-libelf&#34;,&#xA;      &#34;version&#34;: &#34;0.187-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;elfutils&#34;,&#xA;        &#34;version&#34;: &#34;0.187-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jDIVpAdvhjPN/gmOBNQuag==&#34;: {&#xA;      &#34;id&#34;: &#34;jDIVpAdvhjPN/gmOBNQuag==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Time-Local&#34;,&#xA;      &#34;version&#34;: &#34;2:1.300-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Time-Local&#34;,&#xA;        &#34;version&#34;: &#34;1.300-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jH43ZEoPP2TpNiUJXUizMw==&#34;: {&#xA;      &#34;id&#34;: &#34;jH43ZEoPP2TpNiUJXUizMw==&#34;,&#xA;      &#34;name&#34;: &#34;libutempter&#34;,&#xA;      &#34;version&#34;: &#34;1.2.1-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libutempter&#34;,&#xA;        &#34;version&#34;: &#34;1.2.1-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jSOT/FBECA7xUY+Zv/Ps+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;jSOT/FBECA7xUY+Zv/Ps+Q==&#34;,&#xA;      &#34;name&#34;: &#34;rpm&#34;,&#xA;      &#34;version&#34;: &#34;4.16.1.3-19.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;4.16.1.3-19.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jXo3rXdhdYGkiXYZpQxZ3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;jXo3rXdhdYGkiXYZpQxZ3Q==&#34;,&#xA;      &#34;name&#34;: &#34;python3-chardet&#34;,&#xA;      &#34;version&#34;: &#34;4.0.0-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-chardet&#34;,&#xA;        &#34;version&#34;: &#34;4.0.0-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kAc8BYCjeCgQR9YdLeGx9w==&#34;: {&#xA;      &#34;id&#34;: &#34;kAc8BYCjeCgQR9YdLeGx9w==&#34;,&#xA;      &#34;name&#34;: &#34;python3-urllib3&#34;,&#xA;      &#34;version&#34;: &#34;1.26.5-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-urllib3&#34;,&#xA;        &#34;version&#34;: &#34;1.26.5-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kDzRHkg3txncDWuyd5771g==&#34;: {&#xA;      &#34;id&#34;: &#34;kDzRHkg3txncDWuyd5771g==&#34;,&#xA;      &#34;name&#34;: &#34;fontconfig&#34;,&#xA;      &#34;version&#34;: &#34;2.14.0-2.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;fontconfig&#34;,&#xA;        &#34;version&#34;: &#34;2.14.0-2.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kMrprdB/TspYL2Dyt9hBfw==&#34;: {&#xA;      &#34;id&#34;: &#34;kMrprdB/TspYL2Dyt9hBfw==&#34;,&#xA;      &#34;name&#34;: &#34;libgomp&#34;,&#xA;      &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kdml4TiffKDDUHJjP7R1Tg==&#34;: {&#xA;      &#34;id&#34;: &#34;kdml4TiffKDDUHJjP7R1Tg==&#34;,&#xA;      &#34;name&#34;: &#34;openldap&#34;,&#xA;      &#34;version&#34;: &#34;2.6.2-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openldap&#34;,&#xA;        &#34;version&#34;: &#34;2.6.2-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ki6pd/LsWsx2BY6b+Np6dQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ki6pd/LsWsx2BY6b+Np6dQ==&#34;,&#xA;      &#34;name&#34;: &#34;cpp&#34;,&#xA;      &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;,&#xA;      &#34;name&#34;: &#34;basesystem&#34;,&#xA;      &#34;version&#34;: &#34;11-13.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;basesystem&#34;,&#xA;        &#34;version&#34;: &#34;11-13.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ktHjHCegyaFGFLaqVjqkVA==&#34;: {&#xA;      &#34;id&#34;: &#34;ktHjHCegyaFGFLaqVjqkVA==&#34;,&#xA;      &#34;name&#34;: &#34;libX11-common&#34;,&#xA;      &#34;version&#34;: &#34;1.7.0-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11&#34;,&#xA;        &#34;version&#34;: &#34;1.7.0-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kzHnWWgcRX/Do32aQ8TMBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kzHnWWgcRX/Do32aQ8TMBQ==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Git&#34;,&#xA;      &#34;version&#34;: &#34;2.31.1-3.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;2.31.1-3.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lITnNJqHTfcVQiCGHjWozA==&#34;: {&#xA;      &#34;id&#34;: &#34;lITnNJqHTfcVQiCGHjWozA==&#34;,&#xA;      &#34;name&#34;: &#34;python3-pip-wheel&#34;,&#xA;      &#34;version&#34;: &#34;21.2.3-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;21.2.3-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lwkb5oxxrG7ZgPYzSyvcZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lwkb5oxxrG7ZgPYzSyvcZQ==&#34;,&#xA;      &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;      &#34;version&#34;: &#34;2.9.13-3.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;2.9.13-3.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lxyER9sFQyH/cLua8fAlfw==&#34;: {&#xA;      &#34;id&#34;: &#34;lxyER9sFQyH/cLua8fAlfw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-File-Find&#34;,&#xA;      &#34;version&#34;: &#34;1.37-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ly9SmBBH7WsYXh1oG69XaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ly9SmBBH7WsYXh1oG69XaQ==&#34;,&#xA;      &#34;name&#34;: &#34;perl-HTTP-Tiny&#34;,&#xA;      &#34;version&#34;: &#34;0.076-460.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-HTTP-Tiny&#34;,&#xA;        &#34;version&#34;: &#34;0.076-460.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;m7hOFCjo7x6PMvux7htFOg==&#34;: {&#xA;      &#34;id&#34;: &#34;m7hOFCjo7x6PMvux7htFOg==&#34;,&#xA;      &#34;name&#34;: &#34;cracklib-dicts&#34;,&#xA;      &#34;version&#34;: &#34;2.9.6-27.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cracklib&#34;,&#xA;        &#34;version&#34;: &#34;2.9.6-27.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mK/FUfODp3MR7WS2xegPsw==&#34;: {&#xA;      &#34;id&#34;: &#34;mK/FUfODp3MR7WS2xegPsw==&#34;,&#xA;      &#34;name&#34;: &#34;langpacks-core-en&#34;,&#xA;      &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;langpacks&#34;,&#xA;        &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mLZQEF4KLS62c+8BB/jz0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;mLZQEF4KLS62c+8BB/jz0Q==&#34;,&#xA;      &#34;name&#34;: &#34;libxslt&#34;,&#xA;      &#34;version&#34;: &#34;1.1.34-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxslt&#34;,&#xA;        &#34;version&#34;: &#34;1.1.34-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mLtyJkgiain09bfdUDF0tA==&#34;: {&#xA;      &#34;id&#34;: &#34;mLtyJkgiain09bfdUDF0tA==&#34;,&#xA;      &#34;name&#34;: &#34;python3-idna&#34;,&#xA;      &#34;version&#34;: &#34;2.10-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-idna&#34;,&#xA;        &#34;version&#34;: &#34;2.10-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;: {&#xA;      &#34;id&#34;: &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;,&#xA;      &#34;name&#34;: &#34;libyaml&#34;,&#xA;      &#34;version&#34;: &#34;0.2.5-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libyaml&#34;,&#xA;        &#34;version&#34;: &#34;0.2.5-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mRRefE/Wm2s5CZDmwUJ8jg==&#34;: {&#xA;      &#34;id&#34;: &#34;mRRefE/Wm2s5CZDmwUJ8jg==&#34;,&#xA;      &#34;name&#34;: &#34;zlib&#34;,&#xA;      &#34;version&#34;: &#34;1.2.11-35.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;1.2.11-35.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mS/mU0XqXurt5b2cC0G2wA==&#34;: {&#xA;      &#34;id&#34;: &#34;mS/mU0XqXurt5b2cC0G2wA==&#34;,&#xA;      &#34;name&#34;: &#34;libXpm&#34;,&#xA;      &#34;version&#34;: &#34;3.5.13-8.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libXpm&#34;,&#xA;        &#34;version&#34;: &#34;3.5.13-8.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;me8N6gnEhOLccvD/431aCw==&#34;: {&#xA;      &#34;id&#34;: &#34;me8N6gnEhOLccvD/431aCw==&#34;,&#xA;      &#34;name&#34;: &#34;libgcc&#34;,&#xA;      &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mqd6XOc7hJ7OKe7FI62YlA==&#34;: {&#xA;      &#34;id&#34;: &#34;mqd6XOc7hJ7OKe7FI62YlA==&#34;,&#xA;      &#34;name&#34;: &#34;python3-setuptools&#34;,&#xA;      &#34;version&#34;: &#34;53.0.0-10.el9_1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-setuptools&#34;,&#xA;        &#34;version&#34;: &#34;53.0.0-10.el9_1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ms1/Dytf/YQgRgubY3EyyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ms1/Dytf/YQgRgubY3EyyQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsepol-devel&#34;,&#xA;      &#34;version&#34;: &#34;3.4-1.1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;3.4-1.1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;n2BikwI3Mg2dIr4kYK8New==&#34;: {&#xA;      &#34;id&#34;: &#34;n2BikwI3Mg2dIr4kYK8New==&#34;,&#xA;      &#34;name&#34;: &#34;pkgconf-m4&#34;,&#xA;      &#34;version&#34;: &#34;1.7.3-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pkgconf&#34;,&#xA;        &#34;version&#34;: &#34;1.7.3-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nC22unSxVi1R4g6taYLM9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;nC22unSxVi1R4g6taYLM9Q==&#34;,&#xA;      &#34;name&#34;: &#34;brotli-devel&#34;,&#xA;      &#34;version&#34;: &#34;1.0.9-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;brotli&#34;,&#xA;        &#34;version&#34;: &#34;1.0.9-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nRx5HCyZ2M4L1LvJSclibw==&#34;: {&#xA;      &#34;id&#34;: &#34;nRx5HCyZ2M4L1LvJSclibw==&#34;,&#xA;      &#34;name&#34;: &#34;rsync&#34;,&#xA;      &#34;version&#34;: &#34;3.2.3-18.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;3.2.3-18.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nUBBsXgA+QSl6Tx9eXi6Mw==&#34;: {&#xA;      &#34;id&#34;: &#34;nUBBsXgA+QSl6Tx9eXi6Mw==&#34;,&#xA;      &#34;name&#34;: &#34;dbus-common&#34;,&#xA;      &#34;version&#34;: &#34;1:1.12.20-7.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus&#34;,&#xA;        &#34;version&#34;: &#34;1.12.20-7.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;na4ojyfFHL07xf5Yr8wxsg==&#34;: {&#xA;      &#34;id&#34;: &#34;na4ojyfFHL07xf5Yr8wxsg==&#34;,&#xA;      &#34;name&#34;: &#34;libgpg-error-devel&#34;,&#xA;      &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;        &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;noZz3cbDBX3Q1ohSWIKe1g==&#34;: {&#xA;      &#34;id&#34;: &#34;noZz3cbDBX3Q1ohSWIKe1g==&#34;,&#xA;      &#34;name&#34;: &#34;libtiff&#34;,&#xA;      &#34;version&#34;: &#34;4.4.0-5.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;4.4.0-5.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nqniqNEVhrfub8cS+os87A==&#34;: {&#xA;      &#34;id&#34;: &#34;nqniqNEVhrfub8cS+os87A==&#34;,&#xA;      &#34;name&#34;: &#34;fonts-srpm-macros&#34;,&#xA;      &#34;version&#34;: &#34;1:2.0.5-7.el9.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;fonts-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;2.0.5-7.el9.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nwgNWiqPWTP9jQpHdB8CFA==&#34;: {&#xA;      &#34;id&#34;: &#34;nwgNWiqPWTP9jQpHdB8CFA==&#34;,&#xA;      &#34;name&#34;: &#34;subscription-manager&#34;,&#xA;      &#34;version&#34;: &#34;1.29.30.1-1.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;subscription-manager&#34;,&#xA;        &#34;version&#34;: &#34;1.29.30.1-1.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;o0sNxhdrQvn3LtgSlydcdw==&#34;: {&#xA;      &#34;id&#34;: &#34;o0sNxhdrQvn3LtgSlydcdw==&#34;,&#xA;      &#34;name&#34;: &#34;pcre2-devel&#34;,&#xA;      &#34;version&#34;: &#34;10.40-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.40-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;o3loazzxvm2hQ5N1QRaYvg==&#34;: {&#xA;      &#34;id&#34;: &#34;o3loazzxvm2hQ5N1QRaYvg==&#34;,&#xA;      &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;      &#34;version&#34;: &#34;2.68.4-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;2.68.4-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oCbJhi6fmGrlKcF1SlNuYw==&#34;: {&#xA;      &#34;id&#34;: &#34;oCbJhi6fmGrlKcF1SlNuYw==&#34;,&#xA;      &#34;name&#34;: &#34;git-core&#34;,&#xA;      &#34;version&#34;: &#34;2.31.1-3.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;2.31.1-3.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oGWSEEsLb6ToIwJ1tUBkwg==&#34;: {&#xA;      &#34;id&#34;: &#34;oGWSEEsLb6ToIwJ1tUBkwg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-File-Copy&#34;,&#xA;      &#34;version&#34;: &#34;2.34-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oK41W21MyjS/j+5BoCQjuA==&#34;: {&#xA;      &#34;id&#34;: &#34;oK41W21MyjS/j+5BoCQjuA==&#34;,&#xA;      &#34;name&#34;: &#34;tcl&#34;,&#xA;      &#34;version&#34;: &#34;1:8.6.10-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tcl&#34;,&#xA;        &#34;version&#34;: &#34;8.6.10-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oWKtpTsx1ck3WozLlUNKbw==&#34;: {&#xA;      &#34;id&#34;: &#34;oWKtpTsx1ck3WozLlUNKbw==&#34;,&#xA;      &#34;name&#34;: &#34;yum&#34;,&#xA;      &#34;version&#34;: &#34;4.12.0-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dnf&#34;,&#xA;        &#34;version&#34;: &#34;4.12.0-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;obNuQXzAwE3TzjUoRN1yEw==&#34;: {&#xA;      &#34;id&#34;: &#34;obNuQXzAwE3TzjUoRN1yEw==&#34;,&#xA;      &#34;name&#34;: &#34;libbabeltrace&#34;,&#xA;      &#34;version&#34;: &#34;1.5.8-10.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;babeltrace&#34;,&#xA;        &#34;version&#34;: &#34;1.5.8-10.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;og/hyn7iqbsNsfIv/8VHFg==&#34;: {&#xA;      &#34;id&#34;: &#34;og/hyn7iqbsNsfIv/8VHFg==&#34;,&#xA;      &#34;name&#34;: &#34;harfbuzz&#34;,&#xA;      &#34;version&#34;: &#34;2.7.4-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;harfbuzz&#34;,&#xA;        &#34;version&#34;: &#34;2.7.4-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;om/hnbn42itSjLCSeL6+2A==&#34;: {&#xA;      &#34;id&#34;: &#34;om/hnbn42itSjLCSeL6+2A==&#34;,&#xA;      &#34;name&#34;: &#34;freetype&#34;,&#xA;      &#34;version&#34;: &#34;2.10.4-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;freetype&#34;,&#xA;        &#34;version&#34;: &#34;2.10.4-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;p9BcHmUiqsfiDX2HpNFM5g==&#34;: {&#xA;      &#34;id&#34;: &#34;p9BcHmUiqsfiDX2HpNFM5g==&#34;,&#xA;      &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;      &#34;version&#34;: &#34;1.10.0-8.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;1.10.0-8.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pNbpZqWYymW5Cm1QYLE4uQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pNbpZqWYymW5Cm1QYLE4uQ==&#34;,&#xA;      &#34;name&#34;: &#34;device-mapper&#34;,&#xA;      &#34;version&#34;: &#34;9:1.02.185-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lvm2&#34;,&#xA;        &#34;version&#34;: &#34;2.03.16-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pc8TmjOHnExT3yvCQuGR7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;pc8TmjOHnExT3yvCQuGR7Q==&#34;,&#xA;      &#34;name&#34;: &#34;tar&#34;,&#xA;      &#34;version&#34;: &#34;2:1.34-6.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;1.34-6.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pdyD4GFauXtML8NxA7nURQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pdyD4GFauXtML8NxA7nURQ==&#34;,&#xA;      &#34;name&#34;: &#34;python3-dnf&#34;,&#xA;      &#34;version&#34;: &#34;4.12.0-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dnf&#34;,&#xA;        &#34;version&#34;: &#34;4.12.0-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;peDze6790+ubKa/8hacS+w==&#34;: {&#xA;      &#34;id&#34;: &#34;peDze6790+ubKa/8hacS+w==&#34;,&#xA;      &#34;name&#34;: &#34;stdlib&#34;,&#xA;      &#34;version&#34;: &#34;1.18.9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;semver:0.1.18.9.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pff1wMeg2U6ebqlGIkRlMg==&#34;: {&#xA;      &#34;id&#34;: &#34;pff1wMeg2U6ebqlGIkRlMg==&#34;,&#xA;      &#34;name&#34;: &#34;git&#34;,&#xA;      &#34;version&#34;: &#34;2.31.1-3.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;2.31.1-3.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ptT0YL/h24MTjTTVlPAZVg==&#34;: {&#xA;      &#34;id&#34;: &#34;ptT0YL/h24MTjTTVlPAZVg==&#34;,&#xA;      &#34;name&#34;: &#34;freetype-devel&#34;,&#xA;      &#34;version&#34;: &#34;2.10.4-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;freetype&#34;,&#xA;        &#34;version&#34;: &#34;2.10.4-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qIHoKDOcFEbVk0+xQvglbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qIHoKDOcFEbVk0+xQvglbQ==&#34;,&#xA;      &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:3.0.1-47.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;3.0.1-47.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qTTyL80F/2JUAy85WSpobg==&#34;: {&#xA;      &#34;id&#34;: &#34;qTTyL80F/2JUAy85WSpobg==&#34;,&#xA;      &#34;name&#34;: &#34;coreutils-single&#34;,&#xA;      &#34;version&#34;: &#34;8.32-32.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;8.32-32.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qYSZ6aKFWol313IOGRXaug==&#34;: {&#xA;      &#34;id&#34;: &#34;qYSZ6aKFWol313IOGRXaug==&#34;,&#xA;      &#34;name&#34;: &#34;json-c&#34;,&#xA;      &#34;version&#34;: &#34;0.14-11.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;json-c&#34;,&#xA;        &#34;version&#34;: &#34;0.14-11.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qcLLXOiskeOh3Yk1oA8Pwg==&#34;: {&#xA;      &#34;id&#34;: &#34;qcLLXOiskeOh3Yk1oA8Pwg==&#34;,&#xA;      &#34;name&#34;: &#34;kmod-libs&#34;,&#xA;      &#34;version&#34;: &#34;28-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;kmod&#34;,&#xA;        &#34;version&#34;: &#34;28-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qijykJ/WFTcI/fd8/RsFmg==&#34;: {&#xA;      &#34;id&#34;: &#34;qijykJ/WFTcI/fd8/RsFmg==&#34;,&#xA;      &#34;name&#34;: &#34;ubi9&#34;,&#xA;      &#34;version&#34;: &#34;9.1.0-1782&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;9AmKs/wDQFsVMVHWnqbu+g==&#34;,&#xA;        &#34;name&#34;: &#34;ubi9-container&#34;,&#xA;        &#34;version&#34;: &#34;9.1.0-1782&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;source&#34;: {&#xA;          &#34;id&#34;: &#34;&#34;,&#xA;          &#34;name&#34;: &#34;&#34;,&#xA;          &#34;version&#34;: &#34;&#34;,&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;normalized_version&#34;: &#34;rhctag:9.1.0.0.0.0.0.0.0.0&#34;,&#xA;        &#34;arch&#34;: &#34;x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;rhctag:9.1.0.0.0.0.0.0.0.0&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rEU0uZUpz06y9hg0ORc49A==&#34;: {&#xA;      &#34;id&#34;: &#34;rEU0uZUpz06y9hg0ORc49A==&#34;,&#xA;      &#34;name&#34;: &#34;libpwquality&#34;,&#xA;      &#34;version&#34;: &#34;1.4.4-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpwquality&#34;,&#xA;        &#34;version&#34;: &#34;1.4.4-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rTAf2eiAGJSR1vI+tk12zg==&#34;: {&#xA;      &#34;id&#34;: &#34;rTAf2eiAGJSR1vI+tk12zg==&#34;,&#xA;      &#34;name&#34;: &#34;libuuid&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rUUieTQ6JPdOKUOFRfhvNw==&#34;: {&#xA;      &#34;id&#34;: &#34;rUUieTQ6JPdOKUOFRfhvNw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-MIME-Base64&#34;,&#xA;      &#34;version&#34;: &#34;3.16-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-MIME-Base64&#34;,&#xA;        &#34;version&#34;: &#34;3.16-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: {&#xA;      &#34;id&#34;: &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;,&#xA;      &#34;name&#34;: &#34;gawk&#34;,&#xA;      &#34;version&#34;: &#34;5.1.0-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gawk&#34;,&#xA;        &#34;version&#34;: &#34;5.1.0-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rYCgRZF9UtO2MybO6TcW0g==&#34;: {&#xA;      &#34;id&#34;: &#34;rYCgRZF9UtO2MybO6TcW0g==&#34;,&#xA;      &#34;name&#34;: &#34;nettle&#34;,&#xA;      &#34;version&#34;: &#34;3.8-3.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nettle&#34;,&#xA;        &#34;version&#34;: &#34;3.8-3.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rZckolqfVnE7xInGZn5Zzw==&#34;: {&#xA;      &#34;id&#34;: &#34;rZckolqfVnE7xInGZn5Zzw==&#34;,&#xA;      &#34;name&#34;: &#34;python3-pysocks&#34;,&#xA;      &#34;version&#34;: &#34;1.7.1-12.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pysocks&#34;,&#xA;        &#34;version&#34;: &#34;1.7.1-12.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rj2k4My0f4W7sR9R0rDeJg==&#34;: {&#xA;      &#34;id&#34;: &#34;rj2k4My0f4W7sR9R0rDeJg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Pod-Usage&#34;,&#xA;      &#34;version&#34;: &#34;4:2.01-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Pod-Usage&#34;,&#xA;        &#34;version&#34;: &#34;2.01-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rkUaC636uKZYge61PN1dew==&#34;: {&#xA;      &#34;id&#34;: &#34;rkUaC636uKZYge61PN1dew==&#34;,&#xA;      &#34;name&#34;: &#34;perl-POSIX&#34;,&#xA;      &#34;version&#34;: &#34;1.94-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;: {&#xA;      &#34;id&#34;: &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;,&#xA;      &#34;name&#34;: &#34;mpfr&#34;,&#xA;      &#34;version&#34;: &#34;4.1.0-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;mpfr&#34;,&#xA;        &#34;version&#34;: &#34;4.1.0-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ryPyL0/oZK1jJ8umBZkZBA==&#34;: {&#xA;      &#34;id&#34;: &#34;ryPyL0/oZK1jJ8umBZkZBA==&#34;,&#xA;      &#34;name&#34;: &#34;libjpeg-turbo-devel&#34;,&#xA;      &#34;version&#34;: &#34;2.0.90-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libjpeg-turbo&#34;,&#xA;        &#34;version&#34;: &#34;2.0.90-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;s9qYH9lv+nqFfUwtnSIxEw==&#34;: {&#xA;      &#34;id&#34;: &#34;s9qYH9lv+nqFfUwtnSIxEw==&#34;,&#xA;      &#34;name&#34;: &#34;ima-evm-utils&#34;,&#xA;      &#34;version&#34;: &#34;1.4-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ima-evm-utils&#34;,&#xA;        &#34;version&#34;: &#34;1.4-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sE1EmQ5Nhv4P4rilE6lODw==&#34;: {&#xA;      &#34;id&#34;: &#34;sE1EmQ5Nhv4P4rilE6lODw==&#34;,&#xA;      &#34;name&#34;: &#34;lsof&#34;,&#xA;      &#34;version&#34;: &#34;4.94.0-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lsof&#34;,&#xA;        &#34;version&#34;: &#34;4.94.0-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;: {&#xA;      &#34;id&#34;: &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;,&#xA;      &#34;name&#34;: &#34;sed&#34;,&#xA;      &#34;version&#34;: &#34;4.8-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sed&#34;,&#xA;        &#34;version&#34;: &#34;4.8-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sukNATkcLkohYgGrhDtrZA==&#34;: {&#xA;      &#34;id&#34;: &#34;sukNATkcLkohYgGrhDtrZA==&#34;,&#xA;      &#34;name&#34;: &#34;libxcrypt-devel&#34;,&#xA;      &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;        &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;: {&#xA;      &#34;id&#34;: &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;,&#xA;      &#34;name&#34;: &#34;libunistring&#34;,&#xA;      &#34;version&#34;: &#34;0.9.10-15.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libunistring&#34;,&#xA;        &#34;version&#34;: &#34;0.9.10-15.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sy1cTR7VjlyD3WavviV1+g==&#34;: {&#xA;      &#34;id&#34;: &#34;sy1cTR7VjlyD3WavviV1+g==&#34;,&#xA;      &#34;name&#34;: &#34;p11-kit&#34;,&#xA;      &#34;version&#34;: &#34;0.24.1-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.24.1-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;szNvvFbgC3+nu7+FkWHQxA==&#34;: {&#xA;      &#34;id&#34;: &#34;szNvvFbgC3+nu7+FkWHQxA==&#34;,&#xA;      &#34;name&#34;: &#34;perl-overload&#34;,&#xA;      &#34;version&#34;: &#34;1.31-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;t51FYLdtFZpGFe/8JMUaTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;t51FYLdtFZpGFe/8JMUaTQ==&#34;,&#xA;      &#34;name&#34;: &#34;rhel9/go-toolset&#34;,&#xA;      &#34;version&#34;: &#34;1.18.9-14&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;GXm2fCeoaq1FqYmMTmMmhQ==&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset-container&#34;,&#xA;        &#34;version&#34;: &#34;1.18.9-14&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;source&#34;: {&#xA;          &#34;id&#34;: &#34;&#34;,&#xA;          &#34;name&#34;: &#34;&#34;,&#xA;          &#34;version&#34;: &#34;&#34;,&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;normalized_version&#34;: &#34;rhctag:1.18.0.0.0.0.0.0.0.0&#34;,&#xA;        &#34;arch&#34;: &#34;x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;rhctag:1.18.0.0.0.0.0.0.0.0&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tOoZIHzytN01BRAw3es1Yg==&#34;: {&#xA;      &#34;id&#34;: &#34;tOoZIHzytN01BRAw3es1Yg==&#34;,&#xA;      &#34;name&#34;: &#34;bzip2&#34;,&#xA;      &#34;version&#34;: &#34;1.0.8-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2&#34;,&#xA;        &#34;version&#34;: &#34;1.0.8-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tWWw65aFr0Her+B1hlgbqA==&#34;: {&#xA;      &#34;id&#34;: &#34;tWWw65aFr0Her+B1hlgbqA==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Pod-Simple&#34;,&#xA;      &#34;version&#34;: &#34;1:3.42-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Pod-Simple&#34;,&#xA;        &#34;version&#34;: &#34;3.42-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tsX00aIcJlVDdnN8EABj3g==&#34;: {&#xA;      &#34;id&#34;: &#34;tsX00aIcJlVDdnN8EABj3g==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Getopt-Std&#34;,&#xA;      &#34;version&#34;: &#34;1.12-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u+N5u943P15onszlgf+ujA==&#34;: {&#xA;      &#34;id&#34;: &#34;u+N5u943P15onszlgf+ujA==&#34;,&#xA;      &#34;name&#34;: &#34;libdnf&#34;,&#xA;      &#34;version&#34;: &#34;0.67.0-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libdnf&#34;,&#xA;        &#34;version&#34;: &#34;0.67.0-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;: {&#xA;      &#34;id&#34;: &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;,&#xA;      &#34;name&#34;: &#34;fonts-filesystem&#34;,&#xA;      &#34;version&#34;: &#34;1:2.0.5-7.el9.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;fonts-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;2.0.5-7.el9.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u95OKK2MhRQlEYI4tmvSVQ==&#34;: {&#xA;      &#34;id&#34;: &#34;u95OKK2MhRQlEYI4tmvSVQ==&#34;,&#xA;      &#34;name&#34;: &#34;util-linux-core&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uCyCeArpCxiSoV6DjC80ng==&#34;: {&#xA;      &#34;id&#34;: &#34;uCyCeArpCxiSoV6DjC80ng==&#34;,&#xA;      &#34;name&#34;: &#34;pcre-devel&#34;,&#xA;      &#34;version&#34;: &#34;8.44-3.el9.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre&#34;,&#xA;        &#34;version&#34;: &#34;8.44-3.el9.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uOrv4V08LjQ381I5J7cGpw==&#34;: {&#xA;      &#34;id&#34;: &#34;uOrv4V08LjQ381I5J7cGpw==&#34;,&#xA;      &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;      &#34;version&#34;: &#34;1.68.0-10.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;        &#34;version&#34;: &#34;1.68.0-10.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uSt8DkzxoDcE1tRbyYPDOg==&#34;: {&#xA;      &#34;id&#34;: &#34;uSt8DkzxoDcE1tRbyYPDOg==&#34;,&#xA;      &#34;name&#34;: &#34;alternatives&#34;,&#xA;      &#34;version&#34;: &#34;1.20-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;chkconfig&#34;,&#xA;        &#34;version&#34;: &#34;1.20-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uWyEe6UPxO05NNzNabxBgA==&#34;: {&#xA;      &#34;id&#34;: &#34;uWyEe6UPxO05NNzNabxBgA==&#34;,&#xA;      &#34;name&#34;: &#34;tzdata&#34;,&#xA;      &#34;version&#34;: &#34;2022g-1.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tzdata&#34;,&#xA;        &#34;version&#34;: &#34;2022g-1.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uXpj8krYkomg5XDZ83F2kg==&#34;: {&#xA;      &#34;id&#34;: &#34;uXpj8krYkomg5XDZ83F2kg==&#34;,&#xA;      &#34;name&#34;: &#34;perl-libs&#34;,&#xA;      &#34;version&#34;: &#34;4:5.32.1-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uwkXfq5VvKEldZwWOwGq4w==&#34;: {&#xA;      &#34;id&#34;: &#34;uwkXfq5VvKEldZwWOwGq4w==&#34;,&#xA;      &#34;name&#34;: &#34;gmp&#34;,&#xA;      &#34;version&#34;: &#34;1:6.2.0-10.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gmp&#34;,&#xA;        &#34;version&#34;: &#34;6.2.0-10.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;v5fMEqf0GRz+BrBqAji9dQ==&#34;: {&#xA;      &#34;id&#34;: &#34;v5fMEqf0GRz+BrBqAji9dQ==&#34;,&#xA;      &#34;name&#34;: &#34;libzstd&#34;,&#xA;      &#34;version&#34;: &#34;1.5.1-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zstd&#34;,&#xA;        &#34;version&#34;: &#34;1.5.1-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;v6X9Dt1wPw8fK6VaHz1Ffw==&#34;: {&#xA;      &#34;id&#34;: &#34;v6X9Dt1wPw8fK6VaHz1Ffw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-threads-shared&#34;,&#xA;      &#34;version&#34;: &#34;1.61-460.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-threads-shared&#34;,&#xA;        &#34;version&#34;: &#34;1.61-460.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vSRLH3asu5knZtxqOxtnwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vSRLH3asu5knZtxqOxtnwQ==&#34;,&#xA;      &#34;name&#34;: &#34;brotli&#34;,&#xA;      &#34;version&#34;: &#34;1.0.9-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;brotli&#34;,&#xA;        &#34;version&#34;: &#34;1.0.9-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vVZXXrZNgHNmTJM7knKqAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vVZXXrZNgHNmTJM7knKqAQ==&#34;,&#xA;      &#34;name&#34;: &#34;libfdisk&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vaBZgtoGX6VZtIwrD9w+EQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vaBZgtoGX6VZtIwrD9w+EQ==&#34;,&#xA;      &#34;name&#34;: &#34;libdnf-plugin-subscription-manager&#34;,&#xA;      &#34;version&#34;: &#34;1.29.30.1-1.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;subscription-manager&#34;,&#xA;        &#34;version&#34;: &#34;1.29.30.1-1.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vcbNsnPegQ9DMvL/4z83AA==&#34;: {&#xA;      &#34;id&#34;: &#34;vcbNsnPegQ9DMvL/4z83AA==&#34;,&#xA;      &#34;name&#34;: &#34;perl-IO-Socket-SSL&#34;,&#xA;      &#34;version&#34;: &#34;2.073-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-IO-Socket-SSL&#34;,&#xA;        &#34;version&#34;: &#34;2.073-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vtNcuXyRth8r8K/W3sfqrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vtNcuXyRth8r8K/W3sfqrQ==&#34;,&#xA;      &#34;name&#34;: &#34;libpng-devel&#34;,&#xA;      &#34;version&#34;: &#34;2:1.6.37-12.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;1.6.37-12.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;w2DoavvB02S/+BS01jQqJw==&#34;: {&#xA;      &#34;id&#34;: &#34;w2DoavvB02S/+BS01jQqJw==&#34;,&#xA;      &#34;name&#34;: &#34;openblas-srpm-macros&#34;,&#xA;      &#34;version&#34;: &#34;2-11.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openblas-srpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;2-11.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wVOHUaFC3qlk+Ft1W2VH7A==&#34;: {&#xA;      &#34;id&#34;: &#34;wVOHUaFC3qlk+Ft1W2VH7A==&#34;,&#xA;      &#34;name&#34;: &#34;python3-gobject-base-noarch&#34;,&#xA;      &#34;version&#34;: &#34;3.40.1-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pygobject3&#34;,&#xA;        &#34;version&#34;: &#34;3.40.1-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wXu3MDegq/TfLSbBy6aoBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;wXu3MDegq/TfLSbBy6aoBQ==&#34;,&#xA;      &#34;name&#34;: &#34;gcc-c++&#34;,&#xA;      &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wdMozBSF06uhI4HOI003SQ==&#34;: {&#xA;      &#34;id&#34;: &#34;wdMozBSF06uhI4HOI003SQ==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Term-Cap&#34;,&#xA;      &#34;version&#34;: &#34;1.17-460.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Term-Cap&#34;,&#xA;        &#34;version&#34;: &#34;1.17-460.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wsc0mBnyNwrXYdpo0V+0aw==&#34;: {&#xA;      &#34;id&#34;: &#34;wsc0mBnyNwrXYdpo0V+0aw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-FileHandle&#34;,&#xA;      &#34;version&#34;: &#34;2.03-479.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-479.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wusWpHXirQF8KfxliQcLkQ==&#34;: {&#xA;      &#34;id&#34;: &#34;wusWpHXirQF8KfxliQcLkQ==&#34;,&#xA;      &#34;name&#34;: &#34;kernel-srpm-macros&#34;,&#xA;      &#34;version&#34;: &#34;1.0-11.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;kernel-srpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;1.0-11.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wvtx3JsOUmPyorardjeYSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;wvtx3JsOUmPyorardjeYSQ==&#34;,&#xA;      &#34;name&#34;: &#34;fontconfig-devel&#34;,&#xA;      &#34;version&#34;: &#34;2.14.0-2.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;fontconfig&#34;,&#xA;        &#34;version&#34;: &#34;2.14.0-2.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;: {&#xA;      &#34;id&#34;: &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;,&#xA;      &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;      &#34;version&#34;: &#34;2.13.0-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;        &#34;version&#34;: &#34;2.13.0-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xC2PhiBOHiQbniVjaMltjw==&#34;: {&#xA;      &#34;id&#34;: &#34;xC2PhiBOHiQbniVjaMltjw==&#34;,&#xA;      &#34;name&#34;: &#34;libpkgconf&#34;,&#xA;      &#34;version&#34;: &#34;1.7.3-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pkgconf&#34;,&#xA;        &#34;version&#34;: &#34;1.7.3-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xGsFnJNA7f9q/+8cz1QFqg==&#34;: {&#xA;      &#34;id&#34;: &#34;xGsFnJNA7f9q/+8cz1QFqg==&#34;,&#xA;      &#34;name&#34;: &#34;lua-srpm-macros&#34;,&#xA;      &#34;version&#34;: &#34;1-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lua-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;1-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xSR/sMJIXbuFPYhZS2ZN2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;xSR/sMJIXbuFPYhZS2ZN2Q==&#34;,&#xA;      &#34;name&#34;: &#34;gcc-plugin-annobin&#34;,&#xA;      &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;11.3.1-2.1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xVpXFb43dZh4HfBX53yyew==&#34;: {&#xA;      &#34;id&#34;: &#34;xVpXFb43dZh4HfBX53yyew==&#34;,&#xA;      &#34;name&#34;: &#34;python3-iniparse&#34;,&#xA;      &#34;version&#34;: &#34;0.4-45.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-iniparse&#34;,&#xA;        &#34;version&#34;: &#34;0.4-45.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xdunfqVk+0spTcWoJA7wPw==&#34;: {&#xA;      &#34;id&#34;: &#34;xdunfqVk+0spTcWoJA7wPw==&#34;,&#xA;      &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;      &#34;version&#34;: &#34;1.43.0-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nghttp2&#34;,&#xA;        &#34;version&#34;: &#34;1.43.0-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xfiNHrth0bRlTgQnR3IgUw==&#34;: {&#xA;      &#34;id&#34;: &#34;xfiNHrth0bRlTgQnR3IgUw==&#34;,&#xA;      &#34;name&#34;: &#34;libpsl&#34;,&#xA;      &#34;version&#34;: &#34;0.21.1-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpsl&#34;,&#xA;        &#34;version&#34;: &#34;0.21.1-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xgCGPQ7CZbjJqBTw2Nmu9w==&#34;: {&#xA;      &#34;id&#34;: &#34;xgCGPQ7CZbjJqBTw2Nmu9w==&#34;,&#xA;      &#34;name&#34;: &#34;groff-base&#34;,&#xA;      &#34;version&#34;: &#34;1.22.4-10.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;groff&#34;,&#xA;        &#34;version&#34;: &#34;1.22.4-10.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xnmn6fk+/THLJg3emXYMww==&#34;: {&#xA;      &#34;id&#34;: &#34;xnmn6fk+/THLJg3emXYMww==&#34;,&#xA;      &#34;name&#34;: &#34;perl-libnet&#34;,&#xA;      &#34;version&#34;: &#34;3.13-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-libnet&#34;,&#xA;        &#34;version&#34;: &#34;3.13-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;y9sflCLWTaHWSSC+w8u7bQ==&#34;: {&#xA;      &#34;id&#34;: &#34;y9sflCLWTaHWSSC+w8u7bQ==&#34;,&#xA;      &#34;name&#34;: &#34;xz-devel&#34;,&#xA;      &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz&#34;,&#xA;        &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yLdg/zIMr1LMvkW9tAZlGw==&#34;: {&#xA;      &#34;id&#34;: &#34;yLdg/zIMr1LMvkW9tAZlGw==&#34;,&#xA;      &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;      &#34;version&#34;: &#34;4.16.1.3-19.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;4.16.1.3-19.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yRjjypPMZa7QJg+DLoMumw==&#34;: {&#xA;      &#34;id&#34;: &#34;yRjjypPMZa7QJg+DLoMumw==&#34;,&#xA;      &#34;name&#34;: &#34;s2i-base-container&#34;,&#xA;      &#34;version&#34;: &#34;1-421&#34;,&#xA;      &#34;kind&#34;: &#34;source&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;rhctag:1.0.0.0.0.0.0.0.0.0&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yXx0rhfj7kyXaTrxOLQSfA==&#34;: {&#xA;      &#34;id&#34;: &#34;yXx0rhfj7kyXaTrxOLQSfA==&#34;,&#xA;      &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yY469KfvqdHWbJwmOcIU1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;yY469KfvqdHWbJwmOcIU1Q==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Carp&#34;,&#xA;      &#34;version&#34;: &#34;1.50-460.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Carp&#34;,&#xA;        &#34;version&#34;: &#34;1.50-460.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ycSS8xsUDu5nMwsql04xfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ycSS8xsUDu5nMwsql04xfQ==&#34;,&#xA;      &#34;name&#34;: &#34;gd&#34;,&#xA;      &#34;version&#34;: &#34;2.3.2-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gd&#34;,&#xA;        &#34;version&#34;: &#34;2.3.2-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;z/d/zUXK6aF2L4H7dfeSZw==&#34;: {&#xA;      &#34;id&#34;: &#34;z/d/zUXK6aF2L4H7dfeSZw==&#34;,&#xA;      &#34;name&#34;: &#34;pkgconf&#34;,&#xA;      &#34;version&#34;: &#34;1.7.3-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pkgconf&#34;,&#xA;        &#34;version&#34;: &#34;1.7.3-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zLbmCpiDy68qsFvtKNzmgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zLbmCpiDy68qsFvtKNzmgQ==&#34;,&#xA;      &#34;name&#34;: &#34;xml-common&#34;,&#xA;      &#34;version&#34;: &#34;0.6.3-58.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sgml-common&#34;,&#xA;        &#34;version&#34;: &#34;0.6.3-58.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zPYyryKVwACz98/WbfSW6w==&#34;: {&#xA;      &#34;id&#34;: &#34;zPYyryKVwACz98/WbfSW6w==&#34;,&#xA;      &#34;name&#34;: &#34;rpm-sign-libs&#34;,&#xA;      &#34;version&#34;: &#34;4.16.1.3-19.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;4.16.1.3-19.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zpqzIc9TY4hiXJG024jdBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zpqzIc9TY4hiXJG024jdBQ==&#34;,&#xA;      &#34;name&#34;: &#34;golang-src&#34;,&#xA;      &#34;version&#34;: &#34;1.18.9-1.el9_1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;1.18.9-1.el9_1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zxuLMmxubC84XoLpkfxZ3w==&#34;: {&#xA;      &#34;id&#34;: &#34;zxuLMmxubC84XoLpkfxZ3w==&#34;,&#xA;      &#34;name&#34;: &#34;perl-Mozilla-CA&#34;,&#xA;      &#34;version&#34;: &#34;20200520-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Mozilla-CA&#34;,&#xA;        &#34;version&#34;: &#34;20200520-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;distributions&#34;: {&#xA;    &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;: {&#xA;      &#34;id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;      &#34;did&#34;: &#34;rhel&#34;,&#xA;      &#34;name&#34;: &#34;Red Hat Enterprise Linux Server&#34;,&#xA;      &#34;version&#34;: &#34;9&#34;,&#xA;      &#34;version_code_name&#34;: &#34;&#34;,&#xA;      &#34;version_id&#34;: &#34;9&#34;,&#xA;      &#34;arch&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;      &#34;pretty_name&#34;: &#34;Red Hat Enterprise Linux Server 9&#34;&#xA;    }&#xA;  },&#xA;  &#34;repository&#34;: {&#xA;    &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;: {&#xA;      &#34;id&#34;: &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/o:redhat:enterprise_linux:9::baseos&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;: {&#xA;      &#34;id&#34;: &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;,&#xA;      &#34;name&#34;: &#34;Red Hat Container Catalog&#34;,&#xA;      &#34;uri&#34;: &#34;https://catalog.redhat.com/software/containers/explore&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2a32e048-f35d-4373-9a24-80be9fee286d&#34;: {&#xA;      &#34;id&#34;: &#34;2a32e048-f35d-4373-9a24-80be9fee286d&#34;,&#xA;      &#34;name&#34;: &#34;go&#34;,&#xA;      &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;: {&#xA;      &#34;id&#34;: &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/o:redhat:enterprise_linux:9::baseos&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;3ad5dc00-af60-4a7d-b6b4-a12726f024c5&#34;: {&#xA;      &#34;id&#34;: &#34;3ad5dc00-af60-4a7d-b6b4-a12726f024c5&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/a:redhat:enterprise_linux:9::appstream&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;a9438ddb-e64d-4c42-b1eb-134e533ca8ea&#34;: {&#xA;      &#34;id&#34;: &#34;a9438ddb-e64d-4c42-b1eb-134e533ca8ea&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/o:redhat:enterprise_linux:9::baseos&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;: {&#xA;      &#34;id&#34;: &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/a:redhat:enterprise_linux:9::appstream&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;: {&#xA;      &#34;id&#34;: &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/a:redhat:enterprise_linux:9::appstream&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;: {&#xA;      &#34;id&#34;: &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/a:redhat:enterprise_linux:9::appstream&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;: {&#xA;      &#34;id&#34;: &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/o:redhat:enterprise_linux:9::baseos&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;    }&#xA;  },&#xA;  &#34;environments&#34;: {&#xA;    &#34;++K+RsmgWfVk2mj1+hzWKA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;+8O7w8gnK983LoZMdgIWhQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;+B22ALb6YCnXu+3s6afaLg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;+LQ46YAn9giMKDZRMCUpfg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;+Mkqc/Y23wK8i6e0RDbi0w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;+jCn1wujuDa5B1uNvCdVnw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;+yIdH2Pb8SGFuXnry3uK/A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;/FMjm+UzO0PTaS3Td0lhkw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;/dbWc/LExxt1O7duWFf9og==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;/t0e+LuglIbDcO/k67Hr2A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;/th8aUKrkgR3Sw9KSBM+CA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;09fH92fqoWDOaYEpwQ9p2g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;0N0D43vK8KV4kQOq2LQn7g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;0QIby1L00NbGeIw8oxRQWQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;0Yvc2+M8FAry625wuL4S5A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;0wIoN0pFyBSc9eVtRdIOWA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;13/XvLtRK2RDQlcsZc1BtQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;13i0QoQ6Q4yBI5RUf20lXA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;1GZ5tdSeZY3Wi3x9/AVQ2Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;1T7WJ83NrIa0U7DlD1BR4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;1XXuvf69/0I2dNHaU2UndQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;1dO83wB64hDLki3A4eA/Pg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;1h9uHE0QiXBO/zpJrT0VjA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;1iUaGpv40BOJQUks5I0iYg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;1m9sKqHTfU4F/K4fidg9cg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;2REYKadw7TKFiuC+OnoHmA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;2fg1ZRYCSPKKOgCxCcA36w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;2w8qE/d9mqIY/9+1qBBrPg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;3688bXyK/nwHthXLLVH24g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;3DTA/XNFCCDFf6sfX96bGg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;3RQKCmep11B4hkfn96QJTA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;3iIPR0bjuCPQ2+48pSdeHg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;4Aph2Qer6+KdCecFsU0TXg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;4DM2GB9KLL7/xWypPdz7vA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;4ImdKzJ7uZoaviIayzuoUg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;4Kw/w2gH7CYCOCv19cdYYA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;582nBqlxZXz0sTRmkFvU4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;5EpVrCQ4OYKiPYYEOuUcmQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;5JeNH+bHiuiK9wwBZqH10A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;5NZNFErDrBiBoorV+igTjg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;5mmSudfrCeEmVSPweWmcVQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;5oq4jjwqdEJHokHmXZ7fFA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;5uy1J7qi/MafOdYJgaQeGw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;60b1mOIk+ncF/benyKWfug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;68hxwX7t9VVTsdLs/0iJBA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;695zXUDPsaaAbh1PGloHag==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;6AYt+NWt55432RGa/HxiQg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;6COiLlB/V7UlOwfuFJy77w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;6G1ytjIPgX0NNsVwuPQKkQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;6G4wapu2zP6UYfTP+Ip2pA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;6HUC1/dPziZpbtWEymw0nQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;6LVRZKaAJH97OKCXsJMDDw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;6MFxZDjn6ZxVQspQib4VSA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;6RxnMs+9yIqzJpLgR7I3zA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;6VAQWTpZhN9PW7YCmVhxsw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;6camihNRcGvFSo3XinEWFg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;6f28+Af9kIn0OSp9f9j14Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;root/buildinfo/Dockerfile-ubi9-s2i-base-1-421&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;,&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;74+EW3adzZwX9DbUU0vOdA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;7JHS+mBQfJeJoy73lvm4lw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;7Lf3UXydabzw8g7HGZER+w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;root/buildinfo/Dockerfile-ubi9-s2i-core-1-394&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;,&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;7ZWYFE98hi9HyU5Q68Jgsw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;7qAMBOvJ2FYxpK9n05pI7Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;7yB5oIQve4tWIMlUmHbdQQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;84WodsWNE9m9GIrBiKl02g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;88jYB91M4ddvxo2XjMJKmQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;8Gh2hioTt5BFisg9eNKeEg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;8I3zEJ4sFSgk47ZaRLgtDQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;8Ky53YwzOPM2pkEIVuuuBg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;8Q+4qMpgUhvMDCe2QUBIuQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;8gpmX0NZa9MMhcqi6FUGtg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;8tmJEWGia0UWhhPJb3EyAw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;9AmKs/wDQFsVMVHWnqbu+g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;root/buildinfo/Dockerfile-ubi9-9.1.0-1782&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;,&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;9Fy0bRr3ZMu3q8UNrhlOSQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;9HjCH3SeUwgItfYZysNlOw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;9WzsXAqqRoLidXM4HaB8/w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;a9438ddb-e64d-4c42-b1eb-134e533ca8ea&#34;,&#xA;          &#34;3ad5dc00-af60-4a7d-b6b4-a12726f024c5&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;9bMXqD09C2r4s8P+HNy2uw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;9hWn3VgLVkzmMJln7S0UCQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;9sAM/NqMLlsG3N88/yD1Vg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ACNA1cjsRpihwLsZYxMiYQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;AOquy/6bQ9axg0KRp6hMjg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ARxZCHzD7KB2Pu4aHl7POw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;AZwLZmqkel2BzSMgQsIVGQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;AbW1lRpGUjSEKNnr/Toz6A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;AdRs6lk9yzTM3HvjeEThKA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;AnHvlYoTKSxzg0JMVMiJkg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;AxTxyAHzdLVnUL9t8+ZYmg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;BX+oelClu2v6UOl6tluOEQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;C3QbGupU53FFTX0pkfNLrA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;C7VGVckK0YZj4RiVmStEsA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;CXRheoFIylTt2C0ZN4qu3w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;CjFzfz4zBZj7fcwIrVHCRA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;CpC5etTxiNuDvBGQesJNDg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Ct/46Ed7Asmqt98kLc0FLw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Cwut2mrMMUaIvKenvO1qWw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;D/XNnExpupd1bO9ZIJIE9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;D0GGDit/UxegO+/A5R03SA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;DGqCqs+yrHvXs9qsPgn58g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;go:opt/app-root/src/main&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:58bd48c688cddf0b8fd763ce887647a9f4e7eb355eb2f8970c721fc7b582740f&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2a32e048-f35d-4373-9a24-80be9fee286d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;DK0d2bPQCX0xz6Lec7u1cg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;DMchAI2VcGSa4n8bdw5YkA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;DSiKsVzdOYp1aJo/8T0A5A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;E2+Fh4utKcr7Wyiwzh2bYw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;E7ikPxWehuEw+6yIZODYlQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;a9438ddb-e64d-4c42-b1eb-134e533ca8ea&#34;,&#xA;          &#34;3ad5dc00-af60-4a7d-b6b4-a12726f024c5&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ED0/IlCpWWQwBBKR2YT9sw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;EEcEMKhGMvXAfnMhboIpqw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;EgjLGZKjPtqIaFVLlFAAPg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;EuqqL3yIFMd5VRAfuufJgg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Exv8+xTp+7Y4AfuM+ph47Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;FEF27h+V5TzrUeQsFddapA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;FFSNe661VBElA1asGZ7k3g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;FKD/ouYSWOOZHy4i43SaxA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;FMrR4PbDeEhmMEh2juuVnw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;FVL6ljas6Mq4jYoOr1b6Hw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;FW8ByCOP6ljvNWDQolahwg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;FaNO6QWs1mWPp40PrBiBUQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Fy3bplraTnRnJlV5RewauA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;G1YDEd7+V95Qa+PMxB8sJw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;G61ZL2SOHR2qgvQfi118gw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;GIScmMWQrnoFNoEgq3fg2w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;GSkR2SOuqWQN8NtOvU4cgw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;GVmxmNcJqT3ovg+RwjJg1A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;GXm2fCeoaq1FqYmMTmMmhQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;root/buildinfo/Dockerfile-rhel9-go-toolset-1.18.9-14&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;,&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;H+zLNGeS4JMpmfP42mEhnA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;H3zfV58LzeEUiNQbZbZb2A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;HRtVOTg/Y7Pvd6wqcX24fA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;HbglDdnV9yne0i8jQL30HA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;I16VSEydeiRYB1TSf5694A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;IDaB7M+//88qbPppM+LpUw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;IN2DA8X4LYRmUb07gLqapg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;IOb5jo+s7DgjzeK/LoVNig==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;J0HrVYoM3raELvTfJ82QMA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;JHQdC8JdSGipvO0sCig0cQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;JI92axWONkD2XCTUAeCtuQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;JaDqP2PIekJ4FuDfyPDUKA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;JrBk+FMgyv4RrG6esVBCIQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Jt5/Qd9oxegZwQjsNbUyYA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;K04omiWBsTnRCbFVZLmRKw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;K5U87AYLwYDq48YpniD72A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;KH0/KbRUi7KL6UvWa8i6Pg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;KSobT+LH4PXsCiP04HOhbQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;KcftiMkhTw4x89HNJI8NNg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;KlSRCTMecbL63Kg+FZjUdQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;KyRw1LumZrRo6AKKkHgP7w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;L1wl5gEz2lzyNJbirzPmpQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;L2RUW2Fm5EOgoqwyitY3bg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;L4diUjusARli24fy/u9lAw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;LD9yEwGtdZJl2S96EO58PQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;LDIMlzOywHz1+CG5FwjKdQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;LEyuwSco7tb1WIyWy42H8g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;LR+S3JloJQ5YEViBpmcLkA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;LZYaKh1MnXoGX4fHzghRTQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Leh3RdsGa1oyRcl5Dz4SdA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;LjtOegR/S/Y0KwJeOuSl/w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Lm5zHfIH4SjtxMBhECD0OQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;root/buildinfo/Dockerfile-ubi9-s2i-core-1-394&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;,&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Lwqn0aweLQLZmo12VvYcog==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;M2qdPAOOvb+CWXJwouP4Rw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;MJmw8vClC4VAn/J4MfhK2Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;MORX6hW9ZLZCt/52w71zTg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;MXR26wvfFq4/JiRamdOfsA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Ma5Vpx57SAZOCC5w2EPQYw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;MdGkZ055CI+TZYqVm7FIPg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Mp61fGpK3II0W8dIQgk3hA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;MvJE7slPeyMPjzl+J8UH7w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;MxYp6jmrNGPG4EUMxgtsIw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;N4dB55YYjGYeXRj+vLBatg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;N9SQ1VZ/1zaqG0gdsMW91g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;NQAINik1AG7Zn8OB8pLDpA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Nak/NGhCYVubG4CsEbHhug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;NdCY2/S+syamLH224R4hug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;O2SZ5NZewmkamADtmBGMpw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;OLwWa8SuQNJHUBFuTxkKKA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;OkY4XBjh2jDTkYhGjNkrUA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;On+NX4Yr+KIGVwagqPDWcQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;OvOSK0YS4U6j2gyFBATNXg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;PHkBez1UE90U9LJepncOKQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Pstkjkz7Io1S30t7a9lp4w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Q+exKQZH61PI/8YfpN472w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;QCZyKHG3XZk9MlIs9ZFBuA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;QcnepR4WKBdAhWdMUPrAWA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;QwKK6TG/JtcCly9jntVf+w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;R7K6A/Ve75xrYpD+6H0Z8w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;R9sC7SuM6vJmJZYq/bMHWw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RRIjgvJwJW9jZT+h6lhzrQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RgUn0rRy/i742s4qQGGoNw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RhNJQyxUHoA1z70UtgAC4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RjsHhFfoWvmQBIu8lxYZjw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RnnkgzrsHA8d297AfaWbPg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Rx4ZYvIz7JT5wbghBsjOTA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;SRyGVMCI95+oD0l3+3YStw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;SSFXEK4vNCR4s9ImWtXtgA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;SSnnOPGZCl33DlmR57wC7w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;SV9uo4F9Li9vAHBKYcAlZA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;SZllfeGD2yJm0VL0H7onLg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;SdI1Am/qHph5dG2ZoOeUIQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;TANtf1h6RhI5yVQQhHFTbg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;THoW7icQ9Ts4hZAkh5A/WQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Tl6ebomp9GQLN9svWzKp+w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Tob5YtKxleVTQzw2GCmwGg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;TzNyp6yTJ3m0O8xeeDKC3A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;TzT9ayOh2hZShfYtipxZEw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;U0P0dNPn1iUcw6b33AAKUg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Ud9PNLLJ6v7hTpAYdO825w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Uui1iXuECCOB7NgLQMsJpg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;UyCrdfN88WUEEECLCIw93w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;V/3oHP6E5IRlfgZZHK72RA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;VDWxBVhhJMCCBIlvmorheA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;VFldiAD+rTFuce+kutFUuA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;VKbklzwNVEem7m1iQRERDg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;go:usr/bin/dlv&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2a32e048-f35d-4373-9a24-80be9fee286d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;VLOqRGIR4aQvFfvVrpLyIg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;VhjrPOGZ9XGEFgLnQWc+KQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;W+js148eF9SSUbrTSIRvOQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;W4amAY83CsyR7zQ0GM7zsg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;WCNTEGU4JEqQUNwdkKkP0Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;WIBkwuKReD+vnev0WY88mA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;WM43f6rBXkL3dY9fUi8CGw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;WN9YKonIBKVWuMNAg76vrA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;WXfnWfq5UvDl4B0hS+0enw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;WgTBt6b85L1bF7WXV5bQRA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;WifWl02dLM2pp5urxOSuNg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;WuHt6bav9qTQn9+qCLLu3w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;XD0JiZBKTweysL9d3sIzpw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;XMI2bnJZdxdcHnKc3zgCUA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;XMPq7+46c92RSax5sZ9PZw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;XPJI1FEhwhWF1vzFJI8S6g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;XVUHqTgxrtHVNbQOLA/oQA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;XX1gx35T8rMzed7p4qESdA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;XliA1VgMzM5VjjSZdnmlQw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;XmQjRyagIacphhV3vVNJUg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Xs0UZDLX+3bz2vT+iSJz7Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Y2WVn7YbALZNiKrMVF83bA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Y35yrxWjtTUkUbNtS9+p6g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;YRfO+WACNVQDTEO1DaRoPw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ZEh/5caJmj5WMgoK5/jyfw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ZX4vKkXsoMfQ2HH9oPb0TA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Znd6oNA8HDVHwd3abR/PEg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;a0GQ0ecdg5PXNSF9I+cGHw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;aW0vfCmvp3ku6dMkvaoZGw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ao0mLJHwgqEhua26lzg6gQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;arzS3GnLPLKzM8xRPFnUzw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ax5YZqtoTsGSLh5YAOUDAA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;b/fX+2E3Kw/VrXP3Viej5w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;bEsPytE/ZdCMbfuAgQc9AA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;bQK0gSM91Pq8oi5kJ9072Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;bbOmNWQZu2GtbHRNTT5LbA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;bp0rUgZ5FkIYAX2aEVd/VA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;byfHs8LLvbAc+YzK8+QmXA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;c+W6x4Mcea6sasJQFpayfg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;c4cAHnbL6QvzxTWvSxwSUQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;a9438ddb-e64d-4c42-b1eb-134e533ca8ea&#34;,&#xA;          &#34;3ad5dc00-af60-4a7d-b6b4-a12726f024c5&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;c6MW06Rtj8J56gSpVtmC/w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;cGWkJkC9Qm+QCP4f8vmD+Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;cPPALpm8EZ1p7Fe1on0nPQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;a9438ddb-e64d-4c42-b1eb-134e533ca8ea&#34;,&#xA;          &#34;3ad5dc00-af60-4a7d-b6b4-a12726f024c5&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;caF9WsICRhpk2jJBTv5OsQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;cj0M8yBzJA8j5tTGHOqDIw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ckYokpjDEx3hfGxpdtbM6A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;clGQ5Kq/RKZZziBln/4BLA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ct/ndQfSB+G17YP34ufDBA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dC9CoYt17eaqinGSVCfCxw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dMY7Qly4vcBOdARECvhzxQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dStYvdO33sly7EacpHOqeA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dYr9tK7XM6aISNKJAtl5ZQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dnA+092RxSVxmYLtbm4n5w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dt/eA+h8BqXPeZvbQ4xjlQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;e7W78NrdwYaVEcBcXhDv5Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;eEjpOxWkwvzzJN5kkeVUcg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;eJ5VkZHE2z3KyF5sFEKj8g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;eMk3cpR3xfyfnR/IUeON3Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;go:usr/lib/golang/pkg/tool/linux_amd64/vet&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2a32e048-f35d-4373-9a24-80be9fee286d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;eUjbBBk9e6ukjdxq7Ysc5Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;eckWZv7IBjaLZNS/vZ1gWg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ey7Cn3NmMZ6qorZvUccGqA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;f2GhXCi0MGW6C5vh1ih8XQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;fTz/BbdjDg+PD+HvcMlQ3A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;a9438ddb-e64d-4c42-b1eb-134e533ca8ea&#34;,&#xA;          &#34;3ad5dc00-af60-4a7d-b6b4-a12726f024c5&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ffBZQco1wXO0fddcwHstSQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;gBWlSWdEA8U1+Ep4A/+M2g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;gJHwCqer7Rl9ijGK6wpg4A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;gngAZQYf0zy4+w3GwgpLmw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;gsdYiUdG+fMtG/M0X1EkAg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hGxLNL3q3tYYzz2uKfKB4A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hHL/OokyETnopazrev0shg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hKJ3xmpaes4B2vxd2C5M1Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hNv7ol5w6PGaZXktwlRWPg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hasHd85qN7fkJeIIqjjDow==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;heXcDkpDDTJ/ac/FHrXYvg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hgr5TOXgV4U9LXyKt2w6gA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hjikQWtnmVPaWts63wYw4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hrY/5TRUmBt6d/EoQ9M7aw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hvKbzRSMjrg1f3y/PRzGwg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hyds1mrD8GWUXo+lv53Rag==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;i1yNGcAdCbK2SnebCgMUqQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;iBA/JBMmSIEGbBZDQlcuUQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;iG10xBRfLLoRP3qlluI7NQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;iMLMqCcRXnm6QslpJnCS7w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;iQByZpdRXgW/fl3SoDuoAA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;iQnKl0+RxymKc9bhVdyuyQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;iTjyL8AL9avw3YnaeFgLEg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;iswhVSntR4QnIsTAyM6ydQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ix3lD4/Nn7qLbcpDm0AIhg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;j3oHbOmfE09xNAzoTXpcSg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;jADxtb7PiatU9dihVhjp/Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;jDIVpAdvhjPN/gmOBNQuag==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;jH43ZEoPP2TpNiUJXUizMw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;jSOT/FBECA7xUY+Zv/Ps+Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;jXo3rXdhdYGkiXYZpQxZ3Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;kAc8BYCjeCgQR9YdLeGx9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;kDzRHkg3txncDWuyd5771g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;kMrprdB/TspYL2Dyt9hBfw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;kdml4TiffKDDUHJjP7R1Tg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ki6pd/LsWsx2BY6b+Np6dQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ktHjHCegyaFGFLaqVjqkVA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;kzHnWWgcRX/Do32aQ8TMBQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;lITnNJqHTfcVQiCGHjWozA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;lwkb5oxxrG7ZgPYzSyvcZQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;lxyER9sFQyH/cLua8fAlfw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ly9SmBBH7WsYXh1oG69XaQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;m7hOFCjo7x6PMvux7htFOg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mK/FUfODp3MR7WS2xegPsw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mLZQEF4KLS62c+8BB/jz0Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mLtyJkgiain09bfdUDF0tA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mRRefE/Wm2s5CZDmwUJ8jg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mS/mU0XqXurt5b2cC0G2wA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;me8N6gnEhOLccvD/431aCw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mqd6XOc7hJ7OKe7FI62YlA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ms1/Dytf/YQgRgubY3EyyQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;n2BikwI3Mg2dIr4kYK8New==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;nC22unSxVi1R4g6taYLM9Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;nRx5HCyZ2M4L1LvJSclibw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;nUBBsXgA+QSl6Tx9eXi6Mw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;na4ojyfFHL07xf5Yr8wxsg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;noZz3cbDBX3Q1ohSWIKe1g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;nqniqNEVhrfub8cS+os87A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;nwgNWiqPWTP9jQpHdB8CFA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;o0sNxhdrQvn3LtgSlydcdw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;o3loazzxvm2hQ5N1QRaYvg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;oCbJhi6fmGrlKcF1SlNuYw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;oGWSEEsLb6ToIwJ1tUBkwg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;oK41W21MyjS/j+5BoCQjuA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;oWKtpTsx1ck3WozLlUNKbw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;obNuQXzAwE3TzjUoRN1yEw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;og/hyn7iqbsNsfIv/8VHFg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;om/hnbn42itSjLCSeL6+2A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;p9BcHmUiqsfiDX2HpNFM5g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;pNbpZqWYymW5Cm1QYLE4uQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;pc8TmjOHnExT3yvCQuGR7Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;pdyD4GFauXtML8NxA7nURQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;peDze6790+ubKa/8hacS+w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;go:opt/app-root/src/main&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:58bd48c688cddf0b8fd763ce887647a9f4e7eb355eb2f8970c721fc7b582740f&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2a32e048-f35d-4373-9a24-80be9fee286d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;pff1wMeg2U6ebqlGIkRlMg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ptT0YL/h24MTjTTVlPAZVg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;qIHoKDOcFEbVk0+xQvglbQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;qTTyL80F/2JUAy85WSpobg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;qYSZ6aKFWol313IOGRXaug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;qcLLXOiskeOh3Yk1oA8Pwg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;qijykJ/WFTcI/fd8/RsFmg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;root/buildinfo/Dockerfile-ubi9-9.1.0-1782&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;,&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;rEU0uZUpz06y9hg0ORc49A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;rTAf2eiAGJSR1vI+tk12zg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;rUUieTQ6JPdOKUOFRfhvNw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;rYCgRZF9UtO2MybO6TcW0g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;rZckolqfVnE7xInGZn5Zzw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;rj2k4My0f4W7sR9R0rDeJg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;rkUaC636uKZYge61PN1dew==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ryPyL0/oZK1jJ8umBZkZBA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;s9qYH9lv+nqFfUwtnSIxEw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;sE1EmQ5Nhv4P4rilE6lODw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;sukNATkcLkohYgGrhDtrZA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;sy1cTR7VjlyD3WavviV1+g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;szNvvFbgC3+nu7+FkWHQxA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;t51FYLdtFZpGFe/8JMUaTQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;root/buildinfo/Dockerfile-rhel9-go-toolset-1.18.9-14&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;,&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;tOoZIHzytN01BRAw3es1Yg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;tWWw65aFr0Her+B1hlgbqA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;tsX00aIcJlVDdnN8EABj3g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;u+N5u943P15onszlgf+ujA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;u95OKK2MhRQlEYI4tmvSVQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uCyCeArpCxiSoV6DjC80ng==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uOrv4V08LjQ381I5J7cGpw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uSt8DkzxoDcE1tRbyYPDOg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uWyEe6UPxO05NNzNabxBgA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uXpj8krYkomg5XDZ83F2kg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uwkXfq5VvKEldZwWOwGq4w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;v5fMEqf0GRz+BrBqAji9dQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;v6X9Dt1wPw8fK6VaHz1Ffw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;vSRLH3asu5knZtxqOxtnwQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;vVZXXrZNgHNmTJM7knKqAQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;vaBZgtoGX6VZtIwrD9w+EQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;vcbNsnPegQ9DMvL/4z83AA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;vtNcuXyRth8r8K/W3sfqrQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;w2DoavvB02S/+BS01jQqJw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;wVOHUaFC3qlk+Ft1W2VH7A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;wXu3MDegq/TfLSbBy6aoBQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;wdMozBSF06uhI4HOI003SQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;wsc0mBnyNwrXYdpo0V+0aw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;wusWpHXirQF8KfxliQcLkQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;wvtx3JsOUmPyorardjeYSQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xC2PhiBOHiQbniVjaMltjw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xGsFnJNA7f9q/+8cz1QFqg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xSR/sMJIXbuFPYhZS2ZN2Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xVpXFb43dZh4HfBX53yyew==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xdunfqVk+0spTcWoJA7wPw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xfiNHrth0bRlTgQnR3IgUw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xgCGPQ7CZbjJqBTw2Nmu9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:43f725c0c0584b7187ac624f5d464f94585c82f5765ee35dd40fb83301eb6975&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f74b8f72-cc6c-4f27-a3bf-e034ea6e9212&#34;,&#xA;          &#34;b0dbd76a-0010-4c55-952a-4a4ea7e7cfff&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xnmn6fk+/THLJg3emXYMww==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;y9sflCLWTaHWSSC+w8u7bQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;yLdg/zIMr1LMvkW9tAZlGw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;yRjjypPMZa7QJg+DLoMumw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;root/buildinfo/Dockerfile-ubi9-s2i-base-1-421&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;,&#xA;          &#34;19cc1ca6-2885-421f-8791-6b3ce26351c9&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;yXx0rhfj7kyXaTrxOLQSfA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;yY469KfvqdHWbJwmOcIU1Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ycSS8xsUDu5nMwsql04xfQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;z/d/zUXK6aF2L4H7dfeSZw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;zLbmCpiDy68qsFvtKNzmgQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;zPYyryKVwACz98/WbfSW6w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1d5eadfc16157a6fe1c21b525fd2b7ab40e4f15e2ee26fe0e9f709462eef0991&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;2c143cbc-60bb-4249-879d-c42bec22481e&#34;,&#xA;          &#34;e8b9608f-978c-4681-be5c-407253060f07&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;zpqzIc9TY4hiXJG024jdBQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:5b119ac89323ec097c7215e35382ea1fd0022c840f7d2cd961b7f82297a4e670&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;a9438ddb-e64d-4c42-b1eb-134e533ca8ea&#34;,&#xA;          &#34;3ad5dc00-af60-4a7d-b6b4-a12726f024c5&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;zxuLMmxubC84XoLpkfxZ3w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1754837f59411a4a3799161f6ba5c0122f70e25f84abc295e1c46637c602b581&#34;,&#xA;        &#34;distribution_id&#34;: &#34;af7b72a1-abdc-4b7c-a81d-a7aa7cc2b24a&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;0b1d11cf-d36a-432f-b1e8-427ef74fce06&#34;,&#xA;          &#34;b7559ec7-0499-4dc4-86cd-d7a7c62e4bc3&#34;&#xA;        ]&#xA;      }&#xA;    ]&#xA;  },&#xA;  &#34;vulnerabilities&#34;: {&#xA;    &#34;++J1c+9mFiyHFShlJEQFeA==&#34;: {&#xA;      &#34;id&#34;: &#34;++J1c+9mFiyHFShlJEQFeA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38546&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. This flaw allows an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38546 https://bugzilla.redhat.com/show_bug.cgi?id=2241938 https://access.redhat.com/errata/RHSA-2024:2101 https://www.cve.org/CVERecord?id=CVE-2023-38546 https://nvd.nist.gov/vuln/detail/CVE-2023-38546 https://curl.se/docs/CVE-2023-38546.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38546.json https://access.redhat.com/errata/RHSA-2023:5763&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+0Id+AHw3V8pYW+ywWnP+g==&#34;: {&#xA;      &#34;id&#34;: &#34;+0Id+AHw3V8pYW+ywWnP+g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-39253&#34;,&#xA;      &#34;description&#34;: &#34;Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source&#39;s `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim&#39;s machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-39253 https://bugzilla.redhat.com/show_bug.cgi?id=2137422 https://www.cve.org/CVERecord?id=CVE-2022-39253 https://nvd.nist.gov/vuln/detail/CVE-2022-39253 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-39253.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+0pi5+jw8FdwHp5pZIVTBg==&#34;: {&#xA;      &#34;id&#34;: &#34;+0pi5+jw8FdwHp5pZIVTBg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:6746&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.43.0-5.el9_3.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+1zjTJXhgIQ5uwrI0Po3UA==&#34;: {&#xA;      &#34;id&#34;: &#34;+1zjTJXhgIQ5uwrI0Po3UA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35065&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35065 https://bugzilla.redhat.com/show_bug.cgi?id=2156324 https://www.cve.org/CVERecord?id=CVE-2021-35065 https://nvd.nist.gov/vuln/detail/CVE-2021-35065 https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35065.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+3z2iqfNC+87k0NgFEkCCg==&#34;: {&#xA;      &#34;id&#34;: &#34;+3z2iqfNC+87k0NgFEkCCg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55130&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55130 https://bugzilla.redhat.com/show_bug.cgi?id=2431352 https://www.cve.org/CVERecord?id=CVE-2025-55130 https://nvd.nist.gov/vuln/detail/CVE-2025-55130 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55130.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+4boUUXSpak/++mwJDcv/A==&#34;: {&#xA;      &#34;id&#34;: &#34;+4boUUXSpak/++mwJDcv/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+56lxqiE6H3D8IED88OxVw==&#34;: {&#xA;      &#34;id&#34;: &#34;+56lxqiE6H3D8IED88OxVw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69649&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted ELF binary file containing malformed header fields with the readelf program can trigger a NULL pointer dereference, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69649 https://bugzilla.redhat.com/show_bug.cgi?id=2445298 https://www.cve.org/CVERecord?id=CVE-2025-69649 https://nvd.nist.gov/vuln/detail/CVE-2025-69649 https://sourceware.org/bugzilla/show_bug.cgi?id=33697 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=66a3492ce68e1ae45b2489bd9a815c39ea5d7f66 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69649.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+63s7h05SP1xmH1EyLoL/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;+63s7h05SP1xmH1EyLoL/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4904 https://bugzilla.redhat.com/show_bug.cgi?id=2168631 https://www.cve.org/CVERecord?id=CVE-2022-4904 https://nvd.nist.gov/vuln/detail/CVE-2022-4904 https://github.com/c-ares/c-ares/issues/496 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4904.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+81WHs4+NlxNNP8OWMLJ2g==&#34;: {&#xA;      &#34;id&#34;: &#34;+81WHs4+NlxNNP8OWMLJ2g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33056&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tar-rs, a Rust library for reading and writing tar archives. When unpacking a crafted tar archive, an attacker can exploit a symbolic link vulnerability. By including a symlink followed by a directory with the same name, the library incorrectly applies file permissions to the symlink&#39;s target. This allows an attacker to modify the permissions of arbitrary directories outside the intended extraction location.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T07:11:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33056 https://bugzilla.redhat.com/show_bug.cgi?id=2449490 https://www.cve.org/CVERecord?id=CVE-2026-33056 https://nvd.nist.gov/vuln/detail/CVE-2026-33056 https://github.com/alexcrichton/tar-rs/commit/17b1fd84e632071cb8eef9d3709bf347bd266446 https://github.com/alexcrichton/tar-rs/security/advisories/GHSA-j4xf-2g29-59ph https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33056.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+DDOZxWQYsdNCtZZs4LB2w==&#34;: {&#xA;      &#34;id&#34;: &#34;+DDOZxWQYsdNCtZZs4LB2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24789&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. The ZIP implementation of the Go language archive/zip library behaves differently than the rest of the ZIP file format implementations. When handling ZIP files with a corrupted central directory record, the library skips over the invalid record and processes the next valid one. This flaw allows a malicious user to access hidden information or files inside maliciously crafted ZIP files.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24789 https://bugzilla.redhat.com/show_bug.cgi?id=2292668 https://www.cve.org/CVERecord?id=CVE-2024-24789 https://nvd.nist.gov/vuln/detail/CVE-2024-24789 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24789.json https://access.redhat.com/errata/RHSA-2024:4212&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.11-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+Hel9A1WiSK+ZclItesXnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+Hel9A1WiSK+ZclItesXnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35939&#34;,&#xA;      &#34;description&#34;: &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35939 https://bugzilla.redhat.com/show_bug.cgi?id=1964129 https://www.cve.org/CVERecord?id=CVE-2021-35939 https://nvd.nist.gov/vuln/detail/CVE-2021-35939 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35939.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+JeSB99qGv/68TsolLxJ1A==&#34;: {&#xA;      &#34;id&#34;: &#34;+JeSB99qGv/68TsolLxJ1A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+Jox86Lr4olzZZpeF2W5Cg==&#34;: {&#xA;      &#34;id&#34;: &#34;+Jox86Lr4olzZZpeF2W5Cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-12818&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in PostgreSQL’s libpq client library, where integer wraparound in several allocation-size calculations allows a peer or input provider to cause an undersized buffer and then write out-of-bounds by hundreds of megabytes. This can lead to a client application segmentation fault or crash when using libpq to connect to a PostgreSQL server.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-13T13:00:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-12818 https://bugzilla.redhat.com/show_bug.cgi?id=2414826 https://www.cve.org/CVERecord?id=CVE-2025-12818 https://nvd.nist.gov/vuln/detail/CVE-2025-12818 https://www.postgresql.org/support/security/CVE-2025-12818/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-12818.json https://access.redhat.com/errata/RHSA-2026:0458&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpq-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:13.23-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+KQdB1idGjEGKH9of9v/Ew==&#34;: {&#xA;      &#34;id&#34;: &#34;+KQdB1idGjEGKH9of9v/Ew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+PjI2yN4wCMPyf1oygeT5Q==&#34;: {&#xA;      &#34;id&#34;: &#34;+PjI2yN4wCMPyf1oygeT5Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-48237&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, an open source command line text editor. In affected versions, when shifting lines in operator pending mode and using a large value, it may be possible to overflow the size of the integer. The impact is low because user interaction is required and a crash may not happen in all situations.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-48237 https://bugzilla.redhat.com/show_bug.cgi?id=2250274 https://www.cve.org/CVERecord?id=CVE-2023-48237 https://nvd.nist.gov/vuln/detail/CVE-2023-48237 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/6bf131888a3d1de62bbfa8a7ea03c0ddccfd496e https://github.com/vim/vim/security/advisories/GHSA-f2m2-v387-gv87 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48237.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+Q1v3N9+IP1xQOJnmQWDyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+Q1v3N9+IP1xQOJnmQWDyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8088&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s zipfile module. When iterating over the entries of a zip archive, the process can enter into an infinite loop state and become unresponsive. This flaw allows an attacker to craft a malicious ZIP archive, leading to a denial of service from the application consuming the zipfile module. Only applications that handle user-controlled zip archives are affected by this vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-22T19:15:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-8088 https://bugzilla.redhat.com/show_bug.cgi?id=2307370 https://www.cve.org/CVERecord?id=CVE-2024-8088 https://nvd.nist.gov/vuln/detail/CVE-2024-8088 https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64 https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea https://github.com/python/cpython/issues/122905 https://github.com/python/cpython/pull/122906 https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8088.json https://access.redhat.com/errata/RHSA-2024:9371&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.19-8.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+Q9jA+OXah1xDhJvsj+1OQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+Q9jA+OXah1xDhJvsj+1OQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29403&#34;,&#xA;      &#34;description&#34;: &#34;On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state or assuming the status of standard I/O file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29403 https://bugzilla.redhat.com/show_bug.cgi?id=2216965 https://www.cve.org/CVERecord?id=CVE-2023-29403 https://nvd.nist.gov/vuln/detail/CVE-2023-29403 https://go.dev/cl/501223 https://go.dev/issue/60272 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1840 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29403.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+QQwOZo/9naGhbYAyaOr+w==&#34;: {&#xA;      &#34;id&#34;: &#34;+QQwOZo/9naGhbYAyaOr+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33809&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang.org/x/image/tiff. A remote attacker could exploit this vulnerability by providing a maliciously crafted Tagged Image File Format (TIFF) file. This could cause the image decoding process to attempt to allocate up to 4 gigabytes (GiB) of memory. The excessive resource consumption or an out-of-memory error would lead to a Denial of Service (DoS) condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-25T18:24:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33809 https://bugzilla.redhat.com/show_bug.cgi?id=2451437 https://www.cve.org/CVERecord?id=CVE-2026-33809 https://nvd.nist.gov/vuln/detail/CVE-2026-33809 https://go.dev/cl/757660 https://go.dev/issue/78267 https://pkg.go.dev/vuln/GO-2026-4815 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33809.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+SOMbfLFiy8gAeP6YTZQLA==&#34;: {&#xA;      &#34;id&#34;: &#34;+SOMbfLFiy8gAeP6YTZQLA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41862&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found In PostgreSQL. A modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. In certain conditions, a server can cause a libpq client to over-read and report an error message containing uninitialized bytes.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41862 https://bugzilla.redhat.com/show_bug.cgi?id=2165722 https://www.cve.org/CVERecord?id=CVE-2022-41862 https://nvd.nist.gov/vuln/detail/CVE-2022-41862 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41862.json https://access.redhat.com/errata/RHSA-2023:6429&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpq-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:13.11-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+SqndwadNHIvm6x16t9CQg==&#34;: {&#xA;      &#34;id&#34;: &#34;+SqndwadNHIvm6x16t9CQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8244&#34;,&#xA;      &#34;description&#34;: &#34;A race condition has been discovered in the golang filepath.Walk and filepath.WalkDir functions. This race condition exists where a portion of the path being walked is replaced with a symbolic link while the walk is in progress.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-06T15:32:27Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-8244 https://bugzilla.redhat.com/show_bug.cgi?id=2386885 https://www.cve.org/CVERecord?id=CVE-2024-8244 https://nvd.nist.gov/vuln/detail/CVE-2024-8244 https://go.dev/issue/70007 https://pkg.go.dev/vuln/GO-2025-9999 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8244.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+T/c3saENK5zeqXtZtGLNw==&#34;: {&#xA;      &#34;id&#34;: &#34;+T/c3saENK5zeqXtZtGLNw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5914&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5914 https://bugzilla.redhat.com/show_bug.cgi?id=2370861 https://www.cve.org/CVERecord?id=CVE-2025-5914 https://nvd.nist.gov/vuln/detail/CVE-2025-5914 https://github.com/libarchive/libarchive/pull/2598 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5914.json https://access.redhat.com/errata/RHSA-2025:14130&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-6.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+TrS27bZKgEeir9pISurnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+TrS27bZKgEeir9pISurnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5773&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl. Due to a logical error in the connection reuse mechanism for SMB (Server Message Block) transfers, libcurl might reuse an existing SMB connection with a different share than intended. This vulnerability, categorized as CWE-488 (Exposure of Data Element to Wrong Session), could lead to the download of an incorrect file or the upload of a file to an unintended location when an application uses libcurl for SMB transfers.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5773 https://bugzilla.redhat.com/show_bug.cgi?id=2461201 https://www.cve.org/CVERecord?id=CVE-2026-5773 https://nvd.nist.gov/vuln/detail/CVE-2026-5773 https://curl.se/docs/CVE-2026-5773.html https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5773.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;: {&#xA;      &#34;id&#34;: &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-14T21:01:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0861 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://www.cve.org/CVERecord?id=CVE-2026-0861 https://nvd.nist.gov/vuln/detail/CVE-2026-0861 https://sourceware.org/bugzilla/show_bug.cgi?id=33796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0861.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+VEguSVDjTT9/ZZv1zUgpg==&#34;: {&#xA;      &#34;id&#34;: &#34;+VEguSVDjTT9/ZZv1zUgpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24607&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Qt, where a flaw occurs when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4, a remote attacker could exploit this vulnerability by sending a specially crafted string, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24607 https://bugzilla.redhat.com/show_bug.cgi?id=2187154 https://www.cve.org/CVERecord?id=CVE-2023-24607 https://nvd.nist.gov/vuln/detail/CVE-2023-24607 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24607.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;qt5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+WB02bbxvRVZgJj5gYjJ7w==&#34;: {&#xA;      &#34;id&#34;: &#34;+WB02bbxvRVZgJj5gYjJ7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-IO&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.43-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+Y8OjDjxiEFL5zY0EIjaWA==&#34;: {&#xA;      &#34;id&#34;: &#34;+Y8OjDjxiEFL5zY0EIjaWA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+YVz742I3o3v3ix+O1wb3g==&#34;: {&#xA;      &#34;id&#34;: &#34;+YVz742I3o3v3ix+O1wb3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45290&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was discovered in Go&#39;s net/http standard library package. When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45290 https://bugzilla.redhat.com/show_bug.cgi?id=2268017 https://www.cve.org/CVERecord?id=CVE-2023-45290 https://nvd.nist.gov/vuln/detail/CVE-2023-45290 http://www.openwall.com/lists/oss-security/2024/03/08/4 https://go.dev/cl/569341 https://go.dev/issue/65383 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg https://pkg.go.dev/vuln/GO-2024-2599 https://security.netapp.com/advisory/ntap-20240329-0004 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45290.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+YsItiFwLsY/quEIP17M6A==&#34;: {&#xA;      &#34;id&#34;: &#34;+YsItiFwLsY/quEIP17M6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2511&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A malicious client can trigger an uncontrolled memory consumption, resulting in a Denial of Service. This issue occurs due to OpenSSL&#39;s TLSv1.3 session cache going into an incorrect state, leading to it failing to flush properly as it fills. OpenSSL must be configured with the non-default SSL_OP_NO_TICKET option enabled to be vulnerable. This issue only affects TLSv1.3 servers, while TLS clients are not affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2511 https://bugzilla.redhat.com/show_bug.cgi?id=2274020 https://www.cve.org/CVERecord?id=CVE-2024-2511 https://nvd.nist.gov/vuln/detail/CVE-2024-2511 https://www.openssl.org/news/vulnerabilities.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2511.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+do0gu6vrF3ZT5my5V6+CQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+do0gu6vrF3ZT5my5V6+CQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8088&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s zipfile module. When iterating over the entries of a zip archive, the process can enter into an infinite loop state and become unresponsive. This flaw allows an attacker to craft a malicious ZIP archive, leading to a denial of service from the application consuming the zipfile module. Only applications that handle user-controlled zip archives are affected by this vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-22T19:15:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-8088 https://bugzilla.redhat.com/show_bug.cgi?id=2307370 https://www.cve.org/CVERecord?id=CVE-2024-8088 https://nvd.nist.gov/vuln/detail/CVE-2024-8088 https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64 https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea https://github.com/python/cpython/issues/122905 https://github.com/python/cpython/pull/122906 https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8088.json https://access.redhat.com/errata/RHSA-2024:6163&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+doAGgTwsE0iptDdCED/aA==&#34;: {&#xA;      &#34;id&#34;: &#34;+doAGgTwsE0iptDdCED/aA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33672&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in picomatch, a JavaScript glob matcher. A remote attacker could exploit a method injection vulnerability by providing specially crafted POSIX bracket expressions, such as [[:constructor:]]. This allows the attacker to inject inherited method names into generated regular expressions, leading to incorrect glob matching behavior. This issue can cause security-relevant logic errors in applications that use picomatch for filtering, validation, or access control, potentially compromising data integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-26T21:39:16Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33672 https://bugzilla.redhat.com/show_bug.cgi?id=2451993 https://www.cve.org/CVERecord?id=CVE-2026-33672 https://nvd.nist.gov/vuln/detail/CVE-2026-33672 https://github.com/micromatch/picomatch/commit/4516eb521f13a46b2fe1a1d2c9ef6b20ddc0e903 https://github.com/micromatch/picomatch/security/advisories/GHSA-3v7f-55p6-f55p https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33672.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+dqw6lT9TwTTzMp6O2vf1w==&#34;: {&#xA;      &#34;id&#34;: &#34;+dqw6lT9TwTTzMp6O2vf1w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29403&#34;,&#xA;      &#34;description&#34;: &#34;On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state or assuming the status of standard I/O file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29403 https://bugzilla.redhat.com/show_bug.cgi?id=2216965 https://www.cve.org/CVERecord?id=CVE-2023-29403 https://nvd.nist.gov/vuln/detail/CVE-2023-29403 https://go.dev/cl/501223 https://go.dev/issue/60272 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1840 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29403.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+eh9aI+N2OVaUhb6bBR86g==&#34;: {&#xA;      &#34;id&#34;: &#34;+eh9aI+N2OVaUhb6bBR86g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55131&#34;,&#xA;      &#34;description&#34;: &#34;A memory exposure flaw has been discovered in Node.js. A flaw in Node.js&#39;s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55131 https://bugzilla.redhat.com/show_bug.cgi?id=2431350 https://www.cve.org/CVERecord?id=CVE-2025-55131 https://nvd.nist.gov/vuln/detail/CVE-2025-55131 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55131.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+fYUom03o4taYF0LdBwDsg==&#34;: {&#xA;      &#34;id&#34;: &#34;+fYUom03o4taYF0LdBwDsg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+gPHeZza1/WobF3MlhRjIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+gPHeZza1/WobF3MlhRjIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+govv3Zh4UHQ+P7JiRlanw==&#34;: {&#xA;      &#34;id&#34;: &#34;+govv3Zh4UHQ+P7JiRlanw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-26T01:07:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27904 https://bugzilla.redhat.com/show_bug.cgi?id=2442922 https://www.cve.org/CVERecord?id=CVE-2026-27904 https://nvd.nist.gov/vuln/detail/CVE-2026-27904 https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27904.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+hBhqk1qKnkU+nqn6a96qg==&#34;: {&#xA;      &#34;id&#34;: &#34;+hBhqk1qKnkU+nqn6a96qg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-48233&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, an open source command line text editor. If the count after the :s command is larger than what fits into a signed long variable, abort with e_value_too_large. The impact is low because user interaction is required and a crash may not happen in all situations.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-48233 https://bugzilla.redhat.com/show_bug.cgi?id=2250270 https://www.cve.org/CVERecord?id=CVE-2023-48233 https://nvd.nist.gov/vuln/detail/CVE-2023-48233 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/ac63787734fda2e294e477af52b3bd601517fa78 https://github.com/vim/vim/security/advisories/GHSA-3xx4-hcq6-r2vj https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48233.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+hNDIOxLd94c7zDMEtwHAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+hNDIOxLd94c7zDMEtwHAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6237&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When the EVP_PKEY_public_check() function is called in RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is a large prime, this computation takes a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6237 https://bugzilla.redhat.com/show_bug.cgi?id=2258502 https://www.cve.org/CVERecord?id=CVE-2023-6237 https://nvd.nist.gov/vuln/detail/CVE-2023-6237 https://www.openssl.org/news/secadv/20240115.txt https://www.openwall.com/lists/oss-security/2024/01/15/2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6237.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+ieGB56AL1fLbXEZaHIRig==&#34;: {&#xA;      &#34;id&#34;: &#34;+ieGB56AL1fLbXEZaHIRig==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28834&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28834 https://bugzilla.redhat.com/show_bug.cgi?id=2269228 https://www.cve.org/CVERecord?id=CVE-2024-28834 https://nvd.nist.gov/vuln/detail/CVE-2024-28834 https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html https://minerva.crocs.fi.muni.cz/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28834.json https://access.redhat.com/errata/RHSA-2024:2570&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-4.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+nrMi8U389zlK2TEsOUGbw==&#34;: {&#xA;      &#34;id&#34;: &#34;+nrMi8U389zlK2TEsOUGbw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-vars&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.05-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+o9j0Llb6+ISl2S6vmkRkQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+o9j0Llb6+ISl2S6vmkRkQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25434&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow vulnerability was found in LibTIFF&#39;s tiffcrop utility in the extractContigSamplesBytes() function. This flaw allows an attacker to pass a crafted TIFF image file to the tiffcrop utility, which causes an out-of-bounds read access resulting in an application crash, eventually leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25434 https://bugzilla.redhat.com/show_bug.cgi?id=2215209 https://www.cve.org/CVERecord?id=CVE-2023-25434 https://nvd.nist.gov/vuln/detail/CVE-2023-25434 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25434.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+pLPiYWkQ9M+8Zi7lKlOZA==&#34;: {&#xA;      &#34;id&#34;: &#34;+pLPiYWkQ9M+8Zi7lKlOZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3576&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3576 https://bugzilla.redhat.com/show_bug.cgi?id=2359465 https://www.cve.org/CVERecord?id=CVE-2025-3576 https://nvd.nist.gov/vuln/detail/CVE-2025-3576 https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3576.json https://access.redhat.com/errata/RHSA-2025:9430&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-8.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+pWnGgJUL0jrC1yhwq+kNw==&#34;: {&#xA;      &#34;id&#34;: &#34;+pWnGgJUL0jrC1yhwq+kNw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23083&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js diagnostics_channel. This vulnerability allows an attacker to reinstate and misuse worker constructors, potentially bypassing the Permission Model via hooking into events when a worker thread is created.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T01:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23083 https://bugzilla.redhat.com/show_bug.cgi?id=2339392 https://www.cve.org/CVERecord?id=CVE-2025-23083 https://nvd.nist.gov/vuln/detail/CVE-2025-23083 https://nodejs.org/en/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23083.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.2-1.22.13.1.1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+rCn8yfwQj/rMH9c7+J0ww==&#34;: {&#xA;      &#34;id&#34;: &#34;+rCn8yfwQj/rMH9c7+J0ww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+sWeYS6ySa1XLsRNuvvO3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;+sWeYS6ySa1XLsRNuvvO3Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15366&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the imaplib module in the Python standard library. The imaplib module does not reject control characters, such as newlines, in user-controlled input passed to IMAP commands. This issue allows an attacker to inject additional commands to be executed in the IMAP server.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:40:24Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15366 https://bugzilla.redhat.com/show_bug.cgi?id=2431368 https://www.cve.org/CVERecord?id=CVE-2025-15366 https://nvd.nist.gov/vuln/detail/CVE-2025-15366 https://github.com/python/cpython/issues/143921 https://github.com/python/cpython/pull/143922 https://mail.python.org/archives/list/security-announce@python.org/thread/DD7C7JZJYTBXMDOWKCEIEBJLBRU64OMR/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15366.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+tNEhZfQ7eus2PEerEe59g==&#34;: {&#xA;      &#34;id&#34;: &#34;+tNEhZfQ7eus2PEerEe59g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+uMSPU5jbqI0+jsP/eX6PA==&#34;: {&#xA;      &#34;id&#34;: &#34;+uMSPU5jbqI0+jsP/eX6PA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3037&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim, where it is vulnerable to a use-after-free in the qf_buf_add_line() function. This flaw allows a specially crafted file to crash a program, use unexpected values, or execute code.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3037 https://bugzilla.redhat.com/show_bug.cgi?id=2122907 https://www.cve.org/CVERecord?id=CVE-2022-3037 https://nvd.nist.gov/vuln/detail/CVE-2022-3037 https://huntr.dev/bounties/af4c2f2d-d754-4607-b565-9e92f3f717b5 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3037.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+wnQC0tYj+uyZzMNgN2bcw==&#34;: {&#xA;      &#34;id&#34;: &#34;+wnQC0tYj+uyZzMNgN2bcw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32020&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw allows an unauthenticated attacker to place a specialized repository on their target&#39;s local system. For performance reasons, Git uses hardlinks when cloning a repository located on the same disk. However, if the repo being cloned is owned by a different user, this can introduce a security risk. At any time in the future, the original repo owner could rewrite the hardlinked files in the cloned user&#39;s repo.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32020 https://bugzilla.redhat.com/show_bug.cgi?id=2280466 https://www.cve.org/CVERecord?id=CVE-2024-32020 https://nvd.nist.gov/vuln/detail/CVE-2024-32020 https://github.com/git/git/security/advisories/GHSA-5rfh-556j-fhgj https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32020.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+xzMjgQ/BhN1jTBlVwQfIA==&#34;: {&#xA;      &#34;id&#34;: &#34;+xzMjgQ/BhN1jTBlVwQfIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6237&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When the EVP_PKEY_public_check() function is called in RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is a large prime, this computation takes a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6237 https://bugzilla.redhat.com/show_bug.cgi?id=2258502 https://www.cve.org/CVERecord?id=CVE-2023-6237 https://nvd.nist.gov/vuln/detail/CVE-2023-6237 https://www.openssl.org/news/secadv/20240115.txt https://www.openwall.com/lists/oss-security/2024/01/15/2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6237.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/+0dqY3HS0Vwp8Izm3R04Q==&#34;: {&#xA;      &#34;id&#34;: &#34;/+0dqY3HS0Vwp8Izm3R04Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3817&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security issue occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3817 https://bugzilla.redhat.com/show_bug.cgi?id=2227852 https://www.cve.org/CVERecord?id=CVE-2023-3817 https://nvd.nist.gov/vuln/detail/CVE-2023-3817 https://www.openssl.org/news/secadv/20230731.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3817.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/+Tfrcve2y5Ca3irhvwHVA==&#34;: {&#xA;      &#34;id&#34;: &#34;/+Tfrcve2y5Ca3irhvwHVA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8194&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python tarfile module. Processing a specially crafted tar archive, specifically an archive with negative offsets, can cause an infinite loop and deadlock. This issue results in a denial of service in the Python application using the tarfile module.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-28T18:42:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8194 https://bugzilla.redhat.com/show_bug.cgi?id=2384043 https://www.cve.org/CVERecord?id=CVE-2025-8194 https://nvd.nist.gov/vuln/detail/CVE-2025-8194 https://github.com/python/cpython/issues/130577 https://github.com/python/cpython/pull/137027 https://mail.python.org/archives/list/security-announce@python.org/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8194.json https://access.redhat.com/errata/RHSA-2025:15019&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/+enDTB16pRyR8XOMcf3ug==&#34;: {&#xA;      &#34;id&#34;: &#34;/+enDTB16pRyR8XOMcf3ug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27538&#34;,&#xA;      &#34;description&#34;: &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27538 https://bugzilla.redhat.com/show_bug.cgi?id=2179103 https://www.cve.org/CVERecord?id=CVE-2023-27538 https://nvd.nist.gov/vuln/detail/CVE-2023-27538 https://curl.se/docs/CVE-2023-27538.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27538.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/+t6edjy50ibBAIw8q+CWg==&#34;: {&#xA;      &#34;id&#34;: &#34;/+t6edjy50ibBAIw8q+CWg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0938&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accept domain names that included square brackets, which isn&#39;t valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-31T17:51:35Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0938 https://bugzilla.redhat.com/show_bug.cgi?id=2343237 https://www.cve.org/CVERecord?id=CVE-2025-0938 https://nvd.nist.gov/vuln/detail/CVE-2025-0938 https://github.com/python/cpython/issues/105704 https://github.com/python/cpython/pull/129418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0938.json https://access.redhat.com/errata/RHSA-2025:6977&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;//2gjbgNV4aF0qefir+7Ng==&#34;: {&#xA;      &#34;id&#34;: &#34;//2gjbgNV4aF0qefir+7Ng==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2024-2963&#34;,&#xA;      &#34;description&#34;: &#34;Denial of service due to improper 100-continue handling in net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-02T20:11:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/591255 https://go.dev/issue/67555 https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.21.12&#34;&#xA;    },&#xA;    &#34;//8buewiV8gb20qv4g1cqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;//8buewiV8gb20qv4g1cqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-65018&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow flaw has been discovered in libpng. There is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:50:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-65018 https://bugzilla.redhat.com/show_bug.cgi?id=2416907 https://www.cve.org/CVERecord?id=CVE-2025-65018 https://nvd.nist.gov/vuln/detail/CVE-2025-65018 https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea https://github.com/pnggroup/libpng/issues/755 https://github.com/pnggroup/libpng/pull/757 https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-65018.json https://access.redhat.com/errata/RHSA-2026:0238&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/0WOR5Jn6BKoC/9+5dlz1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;/0WOR5Jn6BKoC/9+5dlz1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23165&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ReadFileUtf8 internal binding of Node.js. This vulnerability can allow an attacker to cause an application denial of service via repeated file read operations that trigger an unrecoverable memory leak due to a corrupted pointer in the underlying file system binding.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23165 https://bugzilla.redhat.com/show_bug.cgi?id=2367162 https://www.cve.org/CVERecord?id=CVE-2025-23165 https://nvd.nist.gov/vuln/detail/CVE-2025-23165 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23165.json https://access.redhat.com/errata/RHSA-2025:8468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.19.2-1.module+el9.6.0+23146+be9976bd&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/8OUfvwBnXvWQXB4Meq/rQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/8OUfvwBnXvWQXB4Meq/rQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5914&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5914 https://bugzilla.redhat.com/show_bug.cgi?id=2370861 https://www.cve.org/CVERecord?id=CVE-2025-5914 https://nvd.nist.gov/vuln/detail/CVE-2025-5914 https://github.com/libarchive/libarchive/pull/2598 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5914.json https://access.redhat.com/errata/RHSA-2025:14130&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-6.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/E8Khm0ZXy1gRiDom4c+aw==&#34;: {&#xA;      &#34;id&#34;: &#34;/E8Khm0ZXy1gRiDom4c+aw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43785&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43785 https://bugzilla.redhat.com/show_bug.cgi?id=2242252 https://www.cve.org/CVERecord?id=CVE-2023-43785 https://nvd.nist.gov/vuln/detail/CVE-2023-43785 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43785.json https://access.redhat.com/errata/RHSA-2024:2145&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/EvgSih2YVXl7ohENLMJIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/EvgSih2YVXl7ohENLMJIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-43618&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in gmp. An integer overflow vulnerability could allow an attacker to input an integer value leading to a crash. The highest threat from this vulnerability is to system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-11-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-43618 https://bugzilla.redhat.com/show_bug.cgi?id=2024904 https://www.cve.org/CVERecord?id=CVE-2021-43618 https://nvd.nist.gov/vuln/detail/CVE-2021-43618 https://bugs.debian.org/994405 https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-43618.json https://access.redhat.com/errata/RHSA-2023:6661&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gmp&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:6.2.0-13.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/F62/Gd7cIE4aLRbxVnfCA==&#34;: {&#xA;      &#34;id&#34;: &#34;/F62/Gd7cIE4aLRbxVnfCA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52425&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Expat (libexpat). When parsing a large token that requires multiple buffer fills to complete, Expat has to re-parse the token from start numerous times. This process may trigger excessive resource consumption, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-52425 https://bugzilla.redhat.com/show_bug.cgi?id=2262877 https://www.cve.org/CVERecord?id=CVE-2023-52425 https://nvd.nist.gov/vuln/detail/CVE-2023-52425 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-52425.json https://access.redhat.com/errata/RHSA-2024:1530&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-1.el9_3.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/G3xQo8kmNMyu7hycZYF/A==&#34;: {&#xA;      &#34;id&#34;: &#34;/G3xQo8kmNMyu7hycZYF/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27983&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27983 https://bugzilla.redhat.com/show_bug.cgi?id=2272764 https://www.cve.org/CVERecord?id=CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27983.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/GSEB7NuV5IOBsMvXs0hOw==&#34;: {&#xA;      &#34;id&#34;: &#34;/GSEB7NuV5IOBsMvXs0hOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21716&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. An incomplete security fix allows code operating under restricted file system write permissions to bypass these limitations. This vulnerability enables the modification of file permissions and ownership on already-open files, even when explicit write access is denied. Such a bypass could lead to unauthorized changes to system files.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21716 https://bugzilla.redhat.com/show_bug.cgi?id=2453157 https://www.cve.org/CVERecord?id=CVE-2026-21716 https://nvd.nist.gov/vuln/detail/CVE-2026-21716 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21716.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/HT2WOXIuvVNrzT1Wp3ntw==&#34;: {&#xA;      &#34;id&#34;: &#34;/HT2WOXIuvVNrzT1Wp3ntw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24534&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24534 https://bugzilla.redhat.com/show_bug.cgi?id=2184483 https://www.cve.org/CVERecord?id=CVE-2023-24534 https://nvd.nist.gov/vuln/detail/CVE-2023-24534 https://go.dev/issue/58975 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24534.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/Hu/RwrxQwmMU70Y0Ls1DA==&#34;: {&#xA;      &#34;id&#34;: &#34;/Hu/RwrxQwmMU70Y0Ls1DA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29458&#34;,&#xA;      &#34;description&#34;: &#34;A segmentation fault vulnerability was found in ncurses&#39;s convert_strings() function of tinfo/read_entry.c file. This flaw occurs due to corrupted terminfo data, triggering an out-of-bounds read error.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-04-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-29458 https://bugzilla.redhat.com/show_bug.cgi?id=2076483 https://www.cve.org/CVERecord?id=CVE-2022-29458 https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-29458.json https://access.redhat.com/errata/RHSA-2025:12876&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:6.2-10.20210508.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/IZs3BxM2p7QaA473aqOUw==&#34;: {&#xA;      &#34;id&#34;: &#34;/IZs3BxM2p7QaA473aqOUw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21717&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in V8&#39;s string hashing mechanism within Node.js. A remote attacker can exploit this vulnerability by crafting requests containing integer-like strings. These specially crafted strings cause predictable hash collisions in V8&#39;s internal string table, particularly when processed by functions like JSON.parse() on attacker-controlled input. This can significantly degrade the performance of the Node.js process, leading to a Denial of Service (DoS) condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21717 https://bugzilla.redhat.com/show_bug.cgi?id=2453162 https://www.cve.org/CVERecord?id=CVE-2026-21717 https://nvd.nist.gov/vuln/detail/CVE-2026-21717 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21717.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/KRhrFyFO2WBBj1/Wnbnrg==&#34;: {&#xA;      &#34;id&#34;: &#34;/KRhrFyFO2WBBj1/Wnbnrg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34158&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the go/build/constraint package of the Golang standard library. Calling Parse on a \&#34;// +build\&#34; build tag line with deeply nested expressions can cause a panic due to stack exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34158 https://bugzilla.redhat.com/show_bug.cgi?id=2310529 https://www.cve.org/CVERecord?id=CVE-2024-34158 https://nvd.nist.gov/vuln/detail/CVE-2024-34158 https://go.dev/cl/611240 https://go.dev/issue/69141 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3107 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34158.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/MWzwBJlhhNbF+zp0zgq+A==&#34;: {&#xA;      &#34;id&#34;: &#34;/MWzwBJlhhNbF+zp0zgq+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-File-Find&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.37-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/MgFHW097IAGIZkNc/Fltw==&#34;: {&#xA;      &#34;id&#34;: &#34;/MgFHW097IAGIZkNc/Fltw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5245&#34;,&#xA;      &#34;description&#34;: &#34;A denial-of-service vulnerability has been identified in GNU Binutils, affecting versions up to 2.44. The flaw resides within the debug_type_samep function in the /binutils/debug.c file of the objdump component. An attacker with local access can trigger a program crash by manipulating input data, leading to a denial of service for the objdump utility.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-27T14:31:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5245 https://bugzilla.redhat.com/show_bug.cgi?id=2368771 https://www.cve.org/CVERecord?id=CVE-2025-5245 https://nvd.nist.gov/vuln/detail/CVE-2025-5245 https://sourceware.org/bugzilla/attachment.cgi?id=16004 https://sourceware.org/bugzilla/show_bug.cgi?id=32829 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a https://vuldb.com/?ctiid.310347 https://vuldb.com/?id.310347 https://vuldb.com/?submit.584635 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5245.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/SEhubz8W4ZKbKg2+yh86Q==&#34;: {&#xA;      &#34;id&#34;: &#34;/SEhubz8W4ZKbKg2+yh86Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-30635&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-30635 https://bugzilla.redhat.com/show_bug.cgi?id=2107388 https://www.cve.org/CVERecord?id=CVE-2022-30635 https://nvd.nist.gov/vuln/detail/CVE-2022-30635 https://go.dev/issue/53615 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-30635.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/U86DUGeHRSAL0GvmlifyA==&#34;: {&#xA;      &#34;id&#34;: &#34;/U86DUGeHRSAL0GvmlifyA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js package. By embedding non-network imports in data URLs, this flaw allows an attacker to execute arbitrary code, compromising system security.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22020 https://bugzilla.redhat.com/show_bug.cgi?id=2296417 https://www.cve.org/CVERecord?id=CVE-2024-22020 https://nvd.nist.gov/vuln/detail/CVE-2024-22020 https://hackerone.com/reports/2092749 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22020.json https://access.redhat.com/errata/RHSA-2024:5815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.16.0-1.module+el9.4.0+22197+9e60f127&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/U8Jx7SKI9t4H3q4Xm/KEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/U8Jx7SKI9t4H3q4Xm/KEQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48281&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libtiff. This vulnerability occurs due to an issue in processCropSelections in the tools/tiffcrop.c function in LibTIFF that has a heap-based buffer overflow (for example, \&#34;WRITE of size 307203\&#34;) via a crafted TIFF image.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-48281 https://bugzilla.redhat.com/show_bug.cgi?id=2163606 https://www.cve.org/CVERecord?id=CVE-2022-48281 https://nvd.nist.gov/vuln/detail/CVE-2022-48281 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-48281.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/VvBaUxAqtfTsAgPes9bAA==&#34;: {&#xA;      &#34;id&#34;: &#34;/VvBaUxAqtfTsAgPes9bAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12797&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL&#39;s RFC7250 Raw Public Key (RPK) authentication. This vulnerability allows man-in-the-middle (MITM) attacks via failure to abort TLS/DTLS handshakes when the server&#39;s RPK does not match the expected key despite the SSL_VERIFY_PEER verification mode being set.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-11T15:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12797 https://bugzilla.redhat.com/show_bug.cgi?id=2342757 https://www.cve.org/CVERecord?id=CVE-2024-12797 https://nvd.nist.gov/vuln/detail/CVE-2024-12797 https://openssl-library.org/news/secadv/20250211.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12797.json https://access.redhat.com/errata/RHSA-2025:1330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/WghVlKV6eiRYf2iGmk9sQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/WghVlKV6eiRYf2iGmk9sQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46809&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The privateDecrypt() API of the crypto library may allow a covert timing side-channel during PKCS#1 v1.5 padding error handling. This issue revealed significant timing differences in decryption for valid and invalid ciphertexts, which may allow a remote attacker to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing JSON Web Encryption messages.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46809 https://bugzilla.redhat.com/show_bug.cgi?id=2264569 https://www.cve.org/CVERecord?id=CVE-2023-46809 https://nvd.nist.gov/vuln/detail/CVE-2023-46809 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46809.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/YIHlhDwc0XvwYDDbGEIMg==&#34;: {&#xA;      &#34;id&#34;: &#34;/YIHlhDwc0XvwYDDbGEIMg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/YcdipQjiqJUDpddwhDiIw==&#34;: {&#xA;      &#34;id&#34;: &#34;/YcdipQjiqJUDpddwhDiIw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2345&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in Vim in the skipwhite function in the charset.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, and cause the application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2345 https://bugzilla.redhat.com/show_bug.cgi?id=2106775 https://www.cve.org/CVERecord?id=CVE-2022-2345 https://nvd.nist.gov/vuln/detail/CVE-2022-2345 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2345.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/ZDgobr+usix01fmflBpYg==&#34;: {&#xA;      &#34;id&#34;: &#34;/ZDgobr+usix01fmflBpYg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69647&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted ELF binary file containing malformed DWARF loclists data with the readelf program can trigger an infinite loop and result in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69647 https://bugzilla.redhat.com/show_bug.cgi?id=2445773 https://www.cve.org/CVERecord?id=CVE-2025-69647 https://nvd.nist.gov/vuln/detail/CVE-2025-69647 https://sourceware.org/bugzilla/show_bug.cgi?id=33640 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=455446bbdc8675f34808187de2bbad4682016ff7 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69647.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/bIhvJWw2AYMGyJtBaoH6A==&#34;: {&#xA;      &#34;id&#34;: &#34;/bIhvJWw2AYMGyJtBaoH6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21892&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. On Linux, Node.js ignores certain environment variables if an unprivileged user has set them while the process is running with elevated privileges, except for CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when other capabilities have been set. This flaw allows unprivileged users to inject code that inherits the process&#39;s elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21892 https://bugzilla.redhat.com/show_bug.cgi?id=2264582 https://www.cve.org/CVERecord?id=CVE-2024-21892 https://nvd.nist.gov/vuln/detail/CVE-2024-21892 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21892.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/crHce0F0k12Ag9tTWXgCA==&#34;: {&#xA;      &#34;id&#34;: &#34;/crHce0F0k12Ag9tTWXgCA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.20.2.1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/eHyvb2Yvu/vFkWHODEbfw==&#34;: {&#xA;      &#34;id&#34;: &#34;/eHyvb2Yvu/vFkWHODEbfw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0865&#34;,&#xA;      &#34;description&#34;: &#34;Missing newline filtering has been discovered in Python. User-controlled header names and values containing newlines can allow injecting HTTP headers.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:26:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0865 https://bugzilla.redhat.com/show_bug.cgi?id=2431367 https://www.cve.org/CVERecord?id=CVE-2026-0865 https://nvd.nist.gov/vuln/detail/CVE-2026-0865 https://github.com/python/cpython/issues/143916 https://github.com/python/cpython/pull/143917 https://mail.python.org/archives/list/security-announce@python.org/thread/BJ6QPHNSHJTS3A7CFV6IBMCAP2DWRVNT/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0865.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/eIvRWSFFmU3q3Ki3j/gKA==&#34;: {&#xA;      &#34;id&#34;: &#34;/eIvRWSFFmU3q3Ki3j/gKA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32004&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This vulnerability can be exploited by an unauthenticated attacker who places a specialized repository on the target&#39;s local system. If the victim clones this repository, the attacker can execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32004 https://bugzilla.redhat.com/show_bug.cgi?id=2280428 https://www.cve.org/CVERecord?id=CVE-2024-32004 https://nvd.nist.gov/vuln/detail/CVE-2024-32004 https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32004.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/h81Nr0GSz2fO9zGO8rpYw==&#34;: {&#xA;      &#34;id&#34;: &#34;/h81Nr0GSz2fO9zGO8rpYw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/i0rPUB7nJcIUQuikyWxeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/i0rPUB7nJcIUQuikyWxeQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59465&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been discovered in NodeJS. A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59465 https://bugzilla.redhat.com/show_bug.cgi?id=2431349 https://www.cve.org/CVERecord?id=CVE-2025-59465 https://nvd.nist.gov/vuln/detail/CVE-2025-59465 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59465.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/ik4PFVpoYSF6+jKJPGHoA==&#34;: {&#xA;      &#34;id&#34;: &#34;/ik4PFVpoYSF6+jKJPGHoA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11840&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in GNU binutils. The `vfinfo` function in the `ldmisc.c` file. Exploitation of this flaw requires local access and may cause a program crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-16T15:32:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11840 https://bugzilla.redhat.com/show_bug.cgi?id=2404481 https://www.cve.org/CVERecord?id=CVE-2025-11840 https://nvd.nist.gov/vuln/detail/CVE-2025-11840 https://sourceware.org/bugzilla/attachment.cgi?id=16351 https://sourceware.org/bugzilla/attachment.cgi?id=16357 https://sourceware.org/bugzilla/show_bug.cgi?id=33455 https://vuldb.com/?ctiid.328775 https://vuldb.com/?id.328775 https://vuldb.com/?submit.661281 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11840.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;: {&#xA;      &#34;id&#34;: &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/kFHc0+JKhJmQT3bM6TpTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/kFHc0+JKhJmQT3bM6TpTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/m4KubgMsY+Uf3GqqbY5Og==&#34;: {&#xA;      &#34;id&#34;: &#34;/m4KubgMsY+Uf3GqqbY5Og==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-35252&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability found in curl. This security flaw happens when curl is used to retrieve and parse cookies from an HTTP(S) server, where it accepts cookies using control codes (byte values below 32), and also when cookies that contain such control codes are later sent back to an HTTP(S) server, possibly causing the server to return a 400 response. This issue effectively allows a \&#34;sister site\&#34; to deny service to siblings and cause a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-35252 https://bugzilla.redhat.com/show_bug.cgi?id=2120718 https://www.cve.org/CVERecord?id=CVE-2022-35252 https://nvd.nist.gov/vuln/detail/CVE-2022-35252 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-35252.json https://access.redhat.com/errata/RHSA-2023:2478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/mkayEGPyxm+Oz1uU7VxhQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/mkayEGPyxm+Oz1uU7VxhQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61984&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH where control characters in usernames were not properly validated when sourced from untrusted inputs like the command line or configuration expansion. If a ProxyCommand is used, these control characters could modify command behavior, potentially leading to code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61984 https://bugzilla.redhat.com/show_bug.cgi?id=2401960 https://www.cve.org/CVERecord?id=CVE-2025-61984 https://nvd.nist.gov/vuln/detail/CVE-2025-61984 https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2 https://www.openssh.com/releasenotes.html#10.1p1 https://www.openwall.com/lists/oss-security/2025/10/06/1 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61984.json https://access.redhat.com/errata/RHSA-2025:23480&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-47.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/pWkiqt8QgDCUksSSa24UQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/pWkiqt8QgDCUksSSa24UQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29007&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security flaw occurs when renaming or deleting a section from a configuration file, where certain malicious configuration values may be misinterpreted as the beginning of a new configuration section. This flaw leads to arbitrary configuration injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29007 https://bugzilla.redhat.com/show_bug.cgi?id=2188338 https://www.cve.org/CVERecord?id=CVE-2023-29007 https://nvd.nist.gov/vuln/detail/CVE-2023-29007 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29007.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/qkNjq5a4HrGsyOMMBvKNA==&#34;: {&#xA;      &#34;id&#34;: &#34;/qkNjq5a4HrGsyOMMBvKNA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/rGrv6ID1FHztWkSNUU0Yw==&#34;: {&#xA;      &#34;id&#34;: &#34;/rGrv6ID1FHztWkSNUU0Yw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43786&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43786 https://bugzilla.redhat.com/show_bug.cgi?id=2242253 https://www.cve.org/CVERecord?id=CVE-2023-43786 https://nvd.nist.gov/vuln/detail/CVE-2023-43786 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43786.json https://access.redhat.com/errata/RHSA-2024:2145&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/w1B4Q4YhRhn+C15Pv2Mlg==&#34;: {&#xA;      &#34;id&#34;: &#34;/w1B4Q4YhRhn+C15Pv2Mlg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27142&#34;,&#xA;      &#34;description&#34;: &#34;An input escaping flaw has been discovered in the golang html/template module. Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value \&#34;refresh\&#34;. A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow \&#34;url=\&#34; by setting htmlmetacontenturlescape=0.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:28:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27142 https://bugzilla.redhat.com/show_bug.cgi?id=2445351 https://www.cve.org/CVERecord?id=CVE-2026-27142 https://nvd.nist.gov/vuln/detail/CVE-2026-27142 https://go.dev/cl/752081 https://go.dev/issue/77954 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://pkg.go.dev/vuln/GO-2026-4603 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27142.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/wfob5jHHezdiyugtfPWjg==&#34;: {&#xA;      &#34;id&#34;: &#34;/wfob5jHHezdiyugtfPWjg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-45261&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in patch. A possible memory corruption vulnerability could allow an attacker to input a specially crafted patch file leading to a crash or code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-12-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-45261 https://bugzilla.redhat.com/show_bug.cgi?id=2035081 https://www.cve.org/CVERecord?id=CVE-2021-45261 https://nvd.nist.gov/vuln/detail/CVE-2021-45261 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-45261.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;patch&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;00MQS+g+VNjKvRbuFWsWbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;00MQS+g+VNjKvRbuFWsWbQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29403&#34;,&#xA;      &#34;description&#34;: &#34;On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state or assuming the status of standard I/O file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29403 https://bugzilla.redhat.com/show_bug.cgi?id=2216965 https://www.cve.org/CVERecord?id=CVE-2023-29403 https://nvd.nist.gov/vuln/detail/CVE-2023-29403 https://go.dev/cl/501223 https://go.dev/issue/60272 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1840 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29403.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;00cDk2w3qfvdzMbO27c/+w==&#34;: {&#xA;      &#34;id&#34;: &#34;00cDk2w3qfvdzMbO27c/+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2982&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free vulnerability was found in vim&#39;s qf_fill_buffer() function of the src/quickfix.c file. The issue occurs because vim uses freed memory when recursively using &#39;quickfixtextfunc.&#39; This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2982 https://bugzilla.redhat.com/show_bug.cgi?id=2123714 https://www.cve.org/CVERecord?id=CVE-2022-2982 https://nvd.nist.gov/vuln/detail/CVE-2022-2982 https://huntr.dev/bounties/53f53d9a-ba8a-4985-b7ba-23efbe6833be/ https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2982.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;01GEWNrsm5Pgr9C+LDMW/A==&#34;: {&#xA;      &#34;id&#34;: &#34;01GEWNrsm5Pgr9C+LDMW/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-26T01:07:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27904 https://bugzilla.redhat.com/show_bug.cgi?id=2442922 https://www.cve.org/CVERecord?id=CVE-2026-27904 https://nvd.nist.gov/vuln/detail/CVE-2026-27904 https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27904.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;03WJApqdfWbzHtZHpqBt1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;03WJApqdfWbzHtZHpqBt1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30590&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30590 https://bugzilla.redhat.com/show_bug.cgi?id=2219842 https://www.cve.org/CVERecord?id=CVE-2023-30590 https://nvd.nist.gov/vuln/detail/CVE-2023-30590 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30590.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;041SU8x5Wrw6mRfaRurHIg==&#34;: {&#xA;      &#34;id&#34;: &#34;041SU8x5Wrw6mRfaRurHIg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;06GjiUkv66Ek9Iq8u3SFSA==&#34;: {&#xA;      &#34;id&#34;: &#34;06GjiUkv66Ek9Iq8u3SFSA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27983&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27983 https://bugzilla.redhat.com/show_bug.cgi?id=2272764 https://www.cve.org/CVERecord?id=CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27983.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.2.8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;081ZZUa7+goThe2JzRBcxw==&#34;: {&#xA;      &#34;id&#34;: &#34;081ZZUa7+goThe2JzRBcxw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1621&#34;,&#xA;      &#34;description&#34;: &#34;Incorrect calculation on P256 curves in crypto/internal/nistec&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-08T19:30:53Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/58647 https://go.dev/cl/471255 https://groups.google.com/g/golang-announce/c/3-TpUx48iQY&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.7&#34;&#xA;    },&#xA;    &#34;08D4UJe9dGHvq1NhH1rKXw==&#34;: {&#xA;      &#34;id&#34;: &#34;08D4UJe9dGHvq1NhH1rKXw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-26T01:07:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27904 https://bugzilla.redhat.com/show_bug.cgi?id=2442922 https://www.cve.org/CVERecord?id=CVE-2026-27904 https://nvd.nist.gov/vuln/detail/CVE-2026-27904 https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27904.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;09S7nCU8PMWz5tWquOFCaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;09S7nCU8PMWz5tWquOFCaQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39325&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39325 https://bugzilla.redhat.com/show_bug.cgi?id=2243296 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-39325 https://nvd.nist.gov/vuln/detail/CVE-2023-39325 https://access.redhat.com/security/cve/CVE-2023-44487 https://go.dev/issue/63417 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39325.json https://access.redhat.com/errata/RHSA-2023:5738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.13-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0DSgRHOq1OLwMX3biKMcbA==&#34;: {&#xA;      &#34;id&#34;: &#34;0DSgRHOq1OLwMX3biKMcbA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24788&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net package of the Go stdlib. When a malformed DNS message is received as a response to a query, the Lookup functions within the net package can get stuck in an infinite loop. This issue can lead to resource exhaustion and denial of service (DoS) conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24788 https://bugzilla.redhat.com/show_bug.cgi?id=2279814 https://www.cve.org/CVERecord?id=CVE-2024-24788 https://nvd.nist.gov/vuln/detail/CVE-2024-24788 https://pkg.go.dev/vuln/GO-2024-2824 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24788.json https://access.redhat.com/errata/RHBA-2024:3840&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.10-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28389&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message with KeyAgreeRecipientInfo. This vulnerability arises because the software attempts to process an optional field without verifying its existence, leading to a NULL pointer dereference. This can result in a Denial of Service (DoS) for applications that handle untrusted CMS data.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28389 https://bugzilla.redhat.com/show_bug.cgi?id=2451096 https://www.cve.org/CVERecord?id=CVE-2026-28389 https://nvd.nist.gov/vuln/detail/CVE-2026-28389 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28389.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0E3jDwz9OiQ7ty2SI9zDYQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0E3jDwz9OiQ7ty2SI9zDYQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:5765&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-3.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0EZfEnxlowgJ1Et69rh7Fg==&#34;: {&#xA;      &#34;id&#34;: &#34;0EZfEnxlowgJ1Et69rh7Fg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45491&#34;,&#xA;      &#34;description&#34;: &#34;An issue was found in libexpat’s internal dtdCopy function in xmlparse.c, It can have an integer overflow for nDefaultAtts on 32-bit platforms where UINT_MAX equals SIZE_MAX.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-30T03:15:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45491 https://bugzilla.redhat.com/show_bug.cgi?id=2308616 https://www.cve.org/CVERecord?id=CVE-2024-45491 https://nvd.nist.gov/vuln/detail/CVE-2024-45491 https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes https://github.com/libexpat/libexpat/issues/888 https://github.com/libexpat/libexpat/pull/891 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45491.json https://access.redhat.com/errata/RHSA-2024:6754&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-2.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0Gq5wAUiCXaH50wxZYx9MQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0Gq5wAUiCXaH50wxZYx9MQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9287&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been found in the Python `venv` module and CLI. Path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \&#34;activation\&#34; scripts, for example, \&#34;source venv/bin/activate\&#34;. This flaw allows attacker-controlled virtual environments to run commands when the virtual environment is activated.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-10-22T16:34:39Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9287 https://bugzilla.redhat.com/show_bug.cgi?id=2321440 https://www.cve.org/CVERecord?id=CVE-2024-9287 https://nvd.nist.gov/vuln/detail/CVE-2024-9287 https://github.com/python/cpython/issues/124651 https://github.com/python/cpython/pull/124712 https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9287.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0K8l/WAiKh6VWmmuYinJBA==&#34;: {&#xA;      &#34;id&#34;: &#34;0K8l/WAiKh6VWmmuYinJBA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11495&#34;,&#xA;      &#34;description&#34;: &#34;A heap based buffer overflow flaw has been discovered in the GNU Binutils package. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-08T20:02:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11495 https://bugzilla.redhat.com/show_bug.cgi?id=2402584 https://www.cve.org/CVERecord?id=CVE-2025-11495 https://nvd.nist.gov/vuln/detail/CVE-2025-11495 https://sourceware.org/bugzilla/attachment.cgi?id=16393 https://sourceware.org/bugzilla/show_bug.cgi?id=33502 https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0 https://vuldb.com/?ctiid.327620 https://vuldb.com/?id.327620 https://vuldb.com/?submit.668290 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11495.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0LMSjLLjEqlpe4LAE1rWJA==&#34;: {&#xA;      &#34;id&#34;: &#34;0LMSjLLjEqlpe4LAE1rWJA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28321&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. An incorrect International Domain Name (IDN) wildcard match may lead to improper certificate validation.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28321 https://bugzilla.redhat.com/show_bug.cgi?id=2196786 https://www.cve.org/CVERecord?id=CVE-2023-28321 https://nvd.nist.gov/vuln/detail/CVE-2023-28321 https://curl.se/docs/CVE-2023-28321.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28321.json https://access.redhat.com/errata/RHSA-2023:4354&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0LvlxzvH25js4ffWzvLRTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0LvlxzvH25js4ffWzvLRTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js package. By embedding non-network imports in data URLs, this flaw allows an attacker to execute arbitrary code, compromising system security.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22020 https://bugzilla.redhat.com/show_bug.cgi?id=2296417 https://www.cve.org/CVERecord?id=CVE-2024-22020 https://nvd.nist.gov/vuln/detail/CVE-2024-22020 https://hackerone.com/reports/2092749 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22020.json https://access.redhat.com/errata/RHSA-2024:6147&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.4-1.module+el9.4.0+22195+c221878e&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0MVVcjDKfdLbs80csEfrOw==&#34;: {&#xA;      &#34;id&#34;: &#34;0MVVcjDKfdLbs80csEfrOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22871&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/http golang package. The net/http package incorrectly accepts messages that end with a line feed (LF) instead of the proper line ending. When used with another server that also misinterprets this, it can lead to request smuggling—where an attacker tricks the system to send hidden or unauthorized requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T20:04:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22871 https://bugzilla.redhat.com/show_bug.cgi?id=2358493 https://www.cve.org/CVERecord?id=CVE-2025-22871 https://nvd.nist.gov/vuln/detail/CVE-2025-22871 https://go.dev/cl/652998 https://go.dev/issue/71988 https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk https://pkg.go.dev/vuln/GO-2025-3563 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22871.json https://access.redhat.com/errata/RHSA-2025:8476&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.9-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0O2I0zrYDyiCiU68WyBLvw==&#34;: {&#xA;      &#34;id&#34;: &#34;0O2I0zrYDyiCiU68WyBLvw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30589&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30589 https://bugzilla.redhat.com/show_bug.cgi?id=2219841 https://www.cve.org/CVERecord?id=CVE-2023-30589 https://nvd.nist.gov/vuln/detail/CVE-2023-30589 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30589.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0P/5eKFuPPXM3bHgeAHWxw==&#34;: {&#xA;      &#34;id&#34;: &#34;0P/5eKFuPPXM3bHgeAHWxw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0PMktbRk+B4fdwvvP1VWUg==&#34;: {&#xA;      &#34;id&#34;: &#34;0PMktbRk+B4fdwvvP1VWUg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-48385&#34;,&#xA;      &#34;description&#34;: &#34;A bundled uri handling flaw was found in Git. When cloning a repository, Git knows to optionally fetch a bundle advertised by the remote server, which allows the server side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T18:23:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-48385 https://bugzilla.redhat.com/show_bug.cgi?id=2378808 https://www.cve.org/CVERecord?id=CVE-2025-48385 https://nvd.nist.gov/vuln/detail/CVE-2025-48385 https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-48385.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0QqnWQey4QRkB1tBadW1jg==&#34;: {&#xA;      &#34;id&#34;: &#34;0QqnWQey4QRkB1tBadW1jg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0RLigWktH24pjgFtIwRH2A==&#34;: {&#xA;      &#34;id&#34;: &#34;0RLigWktH24pjgFtIwRH2A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23920&#34;,&#xA;      &#34;description&#34;: &#34;An untrusted search path vulnerability exists in Node.js. \u003c19.6.1, \u003c18.14.1, \u003c16.19.1, and \u003c14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23920 https://bugzilla.redhat.com/show_bug.cgi?id=2172217 https://www.cve.org/CVERecord?id=CVE-2023-23920 https://nvd.nist.gov/vuln/detail/CVE-2023-23920 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23920.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0TUqdQNGOvjHNFjkDen1Sg==&#34;: {&#xA;      &#34;id&#34;: &#34;0TUqdQNGOvjHNFjkDen1Sg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25881&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25881 https://bugzilla.redhat.com/show_bug.cgi?id=2165824 https://www.cve.org/CVERecord?id=CVE-2022-25881 https://nvd.nist.gov/vuln/detail/CVE-2022-25881 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25881.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.3-1.16.19.1.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0Tr3QMpqaFB6S//rbJ/Onw==&#34;: {&#xA;      &#34;id&#34;: &#34;0Tr3QMpqaFB6S//rbJ/Onw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3576&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3576 https://bugzilla.redhat.com/show_bug.cgi?id=2359465 https://www.cve.org/CVERecord?id=CVE-2025-3576 https://nvd.nist.gov/vuln/detail/CVE-2025-3576 https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3576.json https://access.redhat.com/errata/RHSA-2025:9430&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-8.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0U0p6zwok5l6rbIxjBRN7w==&#34;: {&#xA;      &#34;id&#34;: &#34;0U0p6zwok5l6rbIxjBRN7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43788&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local attacker to trigger an out-of-bounds read error and read the contents of memory on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43788 https://bugzilla.redhat.com/show_bug.cgi?id=2242248 https://www.cve.org/CVERecord?id=CVE-2023-43788 https://nvd.nist.gov/vuln/detail/CVE-2023-43788 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43788.json https://access.redhat.com/errata/RHSA-2024:2146&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libXpm-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.13-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0UWL07sxLog3CGNaaYYQxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0UWL07sxLog3CGNaaYYQxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0UxirvKJMj5gY8fbrSf6sA==&#34;: {&#xA;      &#34;id&#34;: &#34;0UxirvKJMj5gY8fbrSf6sA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-File-Copy&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0W0/E/g2cPvxNF42LmIwRg==&#34;: {&#xA;      &#34;id&#34;: &#34;0W0/E/g2cPvxNF42LmIwRg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-AutoLoader&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:5.74-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0YTTGmYE/9YKV7yhSG2wCw==&#34;: {&#xA;      &#34;id&#34;: &#34;0YTTGmYE/9YKV7yhSG2wCw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69650&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted ELF binary file containing malformed relocation data with the readelf program can trigger a double free, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69650 https://bugzilla.redhat.com/show_bug.cgi?id=2445293 https://www.cve.org/CVERecord?id=CVE-2025-69650 https://nvd.nist.gov/vuln/detail/CVE-2025-69650 https://sourceware.org/bugzilla/show_bug.cgi?id=33698 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea4bc025abdba85a90e26e13f551c16a44bfa921 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69650.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0YVxD0vSH+0MhijemP/Jmg==&#34;: {&#xA;      &#34;id&#34;: &#34;0YVxD0vSH+0MhijemP/Jmg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3705&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free flaw was found in the qf_update_buffer function in vim. This issue allows a specially crafted file to crash a program, use unexpected values, or execute code.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3705 https://bugzilla.redhat.com/show_bug.cgi?id=2139086 https://www.cve.org/CVERecord?id=CVE-2022-3705 https://nvd.nist.gov/vuln/detail/CVE-2022-3705 https://vuldb.com/?id.212324 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3705.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0ZGrJGNNqDLH/sZXsRkfvA==&#34;: {&#xA;      &#34;id&#34;: &#34;0ZGrJGNNqDLH/sZXsRkfvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js package. By embedding non-network imports in data URLs, this flaw allows an attacker to execute arbitrary code, compromising system security.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22020 https://bugzilla.redhat.com/show_bug.cgi?id=2296417 https://www.cve.org/CVERecord?id=CVE-2024-22020 https://nvd.nist.gov/vuln/detail/CVE-2024-22020 https://hackerone.com/reports/2092749 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22020.json https://access.redhat.com/errata/RHSA-2024:6147&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0ZQtBpkFjRCvM3RNGGREDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0ZQtBpkFjRCvM3RNGGREDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29409&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service vulnerability was found in the Golang Go package caused by an uncontrolled resource consumption flaw. By persuading a victim to use a specially crafted certificate with large RSA keys, a remote attacker can cause a client/server to expend significant CPU time verifying signatures, resulting in a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29409 https://bugzilla.redhat.com/show_bug.cgi?id=2228743 https://www.cve.org/CVERecord?id=CVE-2023-29409 https://nvd.nist.gov/vuln/detail/CVE-2023-29409 https://go.dev/cl/515257 https://go.dev/issue/61460 https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ https://pkg.go.dev/vuln/GO-2023-1987 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29409.json https://access.redhat.com/errata/RHSA-2023:5738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.13-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0ZniYEExf5hn6bWx9CxbmA==&#34;: {&#xA;      &#34;id&#34;: &#34;0ZniYEExf5hn6bWx9CxbmA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23918&#34;,&#xA;      &#34;description&#34;: &#34;A privilege escalation vulnerability exists in Node.js \u003c19.6.1, \u003c18.14.1, \u003c16.19.1 and \u003c14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23918 https://bugzilla.redhat.com/show_bug.cgi?id=2171935 https://www.cve.org/CVERecord?id=CVE-2023-23918 https://nvd.nist.gov/vuln/detail/CVE-2023-23918 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23918.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0ahYjiLWT0VE+MRcEm8yAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0ahYjiLWT0VE+MRcEm8yAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25881&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25881 https://bugzilla.redhat.com/show_bug.cgi?id=2165824 https://www.cve.org/CVERecord?id=CVE-2022-25881 https://nvd.nist.gov/vuln/detail/CVE-2022-25881 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25881.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0bK7Vo3x9SXQYvDvMmgzXA==&#34;: {&#xA;      &#34;id&#34;: &#34;0bK7Vo3x9SXQYvDvMmgzXA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2208&#34;,&#xA;      &#34;description&#34;: &#34;NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2208 https://bugzilla.redhat.com/show_bug.cgi?id=2102183 https://www.cve.org/CVERecord?id=CVE-2022-2208 https://nvd.nist.gov/vuln/detail/CVE-2022-2208 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2208.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0bsVwLbC3DjqoPdFlpHGrA==&#34;: {&#xA;      &#34;id&#34;: &#34;0bsVwLbC3DjqoPdFlpHGrA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0dpAE7ovD7NaRYwnkw3w3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;0dpAE7ovD7NaRYwnkw3w3Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59465&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been discovered in NodeJS. A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59465 https://bugzilla.redhat.com/show_bug.cgi?id=2431349 https://www.cve.org/CVERecord?id=CVE-2025-59465 https://nvd.nist.gov/vuln/detail/CVE-2025-59465 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59465.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0gEzVf04N4WWI36MnLXr1w==&#34;: {&#xA;      &#34;id&#34;: &#34;0gEzVf04N4WWI36MnLXr1w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23936&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the fetch API in Node.js that did not prevent CRLF injection in the &#39;host&#39; header. This issue could allow HTTP response splitting and HTTP header injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23936 https://bugzilla.redhat.com/show_bug.cgi?id=2172190 https://www.cve.org/CVERecord?id=CVE-2023-23936 https://nvd.nist.gov/vuln/detail/CVE-2023-23936 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23936.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0hxAfeI84l0pzeedcqmGpQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0hxAfeI84l0pzeedcqmGpQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-if&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:0.60.800-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0kDaqIpbO93XpnbaK6KFUg==&#34;: {&#xA;      &#34;id&#34;: &#34;0kDaqIpbO93XpnbaK6KFUg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24534&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24534 https://bugzilla.redhat.com/show_bug.cgi?id=2184483 https://www.cve.org/CVERecord?id=CVE-2023-24534 https://nvd.nist.gov/vuln/detail/CVE-2023-24534 https://go.dev/issue/58975 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24534.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0mCcBHbOVq3mhrs5PZYNvA==&#34;: {&#xA;      &#34;id&#34;: &#34;0mCcBHbOVq3mhrs5PZYNvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27138&#34;,&#xA;      &#34;description&#34;: &#34;A certificate validation flaw has been discovered in the golang crypto/x509 module. Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:28:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27138 https://bugzilla.redhat.com/show_bug.cgi?id=2445344 https://www.cve.org/CVERecord?id=CVE-2026-27138 https://nvd.nist.gov/vuln/detail/CVE-2026-27138 https://go.dev/cl/752183 https://go.dev/issue/77953 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://pkg.go.dev/vuln/GO-2026-4600 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27138.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0nQVynV3NMmwash6dBc+8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;0nQVynV3NMmwash6dBc+8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2731&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference flaw was found in Libtiff&#39;s LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2731 https://bugzilla.redhat.com/show_bug.cgi?id=2207635 https://www.cve.org/CVERecord?id=CVE-2023-2731 https://nvd.nist.gov/vuln/detail/CVE-2023-2731 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2731.json https://access.redhat.com/errata/RHSA-2023:6575&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0tfYnYhAiMREOXyqf/1Urw==&#34;: {&#xA;      &#34;id&#34;: &#34;0tfYnYhAiMREOXyqf/1Urw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35937&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35937 https://bugzilla.redhat.com/show_bug.cgi?id=1964125 https://www.cve.org/CVERecord?id=CVE-2021-35937 https://nvd.nist.gov/vuln/detail/CVE-2021-35937 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35937.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0u2Zo3eZYFAXhVSIZh+vXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0u2Zo3eZYFAXhVSIZh+vXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-16232&#34;,&#xA;      &#34;description&#34;: &#34;LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue&#34;,&#xA;      &#34;issued&#34;: &#34;2017-11-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2017-16232 https://bugzilla.redhat.com/show_bug.cgi?id=1516189 https://www.cve.org/CVERecord?id=CVE-2017-16232 https://nvd.nist.gov/vuln/detail/CVE-2017-16232 https://security.access.redhat.com/data/csaf/v2/vex/2017/cve-2017-16232.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0u9BhQlRGnXqmFj5VxmVgw==&#34;: {&#xA;      &#34;id&#34;: &#34;0u9BhQlRGnXqmFj5VxmVgw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7008&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222672 https://www.cve.org/CVERecord?id=CVE-2023-7008 https://nvd.nist.gov/vuln/detail/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222261 https://github.com/systemd/systemd/issues/25676 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7008.json https://access.redhat.com/errata/RHSA-2024:2463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-32.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0v5F4x1W0RxkklLvRs6NKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0v5F4x1W0RxkklLvRs6NKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0433&#34;,&#xA;      &#34;description&#34;: &#34;Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0433 https://bugzilla.redhat.com/show_bug.cgi?id=2163612 https://www.cve.org/CVERecord?id=CVE-2023-0433 https://nvd.nist.gov/vuln/detail/CVE-2023-0433 https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0433.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0w7yDxNwDisUMkIdlkUTZw==&#34;: {&#xA;      &#34;id&#34;: &#34;0w7yDxNwDisUMkIdlkUTZw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-53905&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T20:48:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-53905 https://bugzilla.redhat.com/show_bug.cgi?id=2380362 https://www.cve.org/CVERecord?id=CVE-2025-53905 https://nvd.nist.gov/vuln/detail/CVE-2025-53905 https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239 https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-53905.json https://access.redhat.com/errata/RHSA-2025:17742&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-22.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0wSMVHwI5T4EgYqkub8RhA==&#34;: {&#xA;      &#34;id&#34;: &#34;0wSMVHwI5T4EgYqkub8RhA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0wh4c9Z6sNxM5NAXtzaMNg==&#34;: {&#xA;      &#34;id&#34;: &#34;0wh4c9Z6sNxM5NAXtzaMNg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-51385&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. In certain circumstances, a remote attacker may be able to execute arbitrary OS commands by using expansion tokens, such as %u or %h, with user names or host names that contain shell metacharacters.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-51385 https://bugzilla.redhat.com/show_bug.cgi?id=2255271 https://www.cve.org/CVERecord?id=CVE-2023-51385 https://nvd.nist.gov/vuln/detail/CVE-2023-51385 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-51385.json https://access.redhat.com/errata/RHSA-2024:1130&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-34.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0yUB19C4Q870tLOnId/omg==&#34;: {&#xA;      &#34;id&#34;: &#34;0yUB19C4Q870tLOnId/omg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1525&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \&#34;Content-Length\&#34; and \&#34;content-length\&#34;). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T19:56:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1525 https://bugzilla.redhat.com/show_bug.cgi?id=2447144 https://www.cve.org/CVERecord?id=CVE-2026-1525 https://nvd.nist.gov/vuln/detail/CVE-2026-1525 https://cna.openjsf.org/security-advisories.html https://cwe.mitre.org/data/definitions/444.html https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm https://hackerone.com/reports/3556037 https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1525.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1/8/Mjb4nleg0SsOivHAww==&#34;: {&#xA;      &#34;id&#34;: &#34;1/8/Mjb4nleg0SsOivHAww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9820 https://bugzilla.redhat.com/show_bug.cgi?id=2392528 https://www.cve.org/CVERecord?id=CVE-2025-9820 https://nvd.nist.gov/vuln/detail/CVE-2025-9820 https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5 https://gitlab.com/gnutls/gnutls/-/issues/1732 https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9820.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1/PWApRfYh/rLEOR0JZLsw==&#34;: {&#xA;      &#34;id&#34;: &#34;1/PWApRfYh/rLEOR0JZLsw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1/xm1gDhSpcAv1vbsLnNhA==&#34;: {&#xA;      &#34;id&#34;: &#34;1/xm1gDhSpcAv1vbsLnNhA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35065&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35065 https://bugzilla.redhat.com/show_bug.cgi?id=2156324 https://www.cve.org/CVERecord?id=CVE-2021-35065 https://nvd.nist.gov/vuln/detail/CVE-2021-35065 https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35065.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;10T7L0U8GuP9Qhz3unCqvw==&#34;: {&#xA;      &#34;id&#34;: &#34;10T7L0U8GuP9Qhz3unCqvw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22871&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/http golang package. The net/http package incorrectly accepts messages that end with a line feed (LF) instead of the proper line ending. When used with another server that also misinterprets this, it can lead to request smuggling—where an attacker tricks the system to send hidden or unauthorized requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T20:04:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22871 https://bugzilla.redhat.com/show_bug.cgi?id=2358493 https://www.cve.org/CVERecord?id=CVE-2025-22871 https://nvd.nist.gov/vuln/detail/CVE-2025-22871 https://go.dev/cl/652998 https://go.dev/issue/71988 https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk https://pkg.go.dev/vuln/GO-2025-3563 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22871.json https://access.redhat.com/errata/RHSA-2025:8476&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.9-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;12PmpsYpKqbguwokcjBXqw==&#34;: {&#xA;      &#34;id&#34;: &#34;12PmpsYpKqbguwokcjBXqw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3627&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3627 https://bugzilla.redhat.com/show_bug.cgi?id=2142742 https://www.cve.org/CVERecord?id=CVE-2022-3627 https://nvd.nist.gov/vuln/detail/CVE-2022-3627 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3627.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1378JmiuKDjVj7PZAMUvLg==&#34;: {&#xA;      &#34;id&#34;: &#34;1378JmiuKDjVj7PZAMUvLg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25652&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security flaw occurs when feeding specially crafted input to `git apply --reject`; a path outside the working tree can be overwritten with partially controlled contents corresponding to the rejected hunk(s) from the given patch.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25652 https://bugzilla.redhat.com/show_bug.cgi?id=2188333 https://www.cve.org/CVERecord?id=CVE-2023-25652 https://nvd.nist.gov/vuln/detail/CVE-2023-25652 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25652.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;13Dkon5caDMIMuKn79Qskg==&#34;: {&#xA;      &#34;id&#34;: &#34;13Dkon5caDMIMuKn79Qskg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-42574&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the way Unicode standards are implemented in the context of development environments, which have specialized requirements for rendering text. An attacker could exploit this to deceive a human reviewer by creating a malicious patch containing well placed BiDi characters. The special handling and rendering of those characters can be then used in an attempt to hide unexpected and potentially dangerous behaviour from the reviewer.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-11-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-42574 https://bugzilla.redhat.com/show_bug.cgi?id=2005819 https://access.redhat.com/security/vulnerabilities/RHSB-2021-007 https://www.cve.org/CVERecord?id=CVE-2021-42574 https://nvd.nist.gov/vuln/detail/CVE-2021-42574 https://trojansource.codes/ https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing https://www.unicode.org/reports/tr39/ https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-42574.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;13fIhbDHRYF0KXmxmJIfiA==&#34;: {&#xA;      &#34;id&#34;: &#34;13fIhbDHRYF0KXmxmJIfiA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32465&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git in a full copy of a Git repository. A prerequisite for this vulnerability is for an unauthenticated attacker to place a specialized repository on their target&#39;s local system. If the victim were to clone this repository, it could result in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32465 https://bugzilla.redhat.com/show_bug.cgi?id=2280446 https://www.cve.org/CVERecord?id=CVE-2024-32465 https://nvd.nist.gov/vuln/detail/CVE-2024-32465 https://github.com/git/git/security/advisories/GHSA-vm9j-46j9-qvq4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32465.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;14EBaSYBL4fLL4zgayhBkg==&#34;: {&#xA;      &#34;id&#34;: &#34;14EBaSYBL4fLL4zgayhBkg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Class-Struct&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:0.66-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;14Etv/7765FAI8QbzsokBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;14Etv/7765FAI8QbzsokBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-24528&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in krb5. With incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file. This issue can trigger a process crash and lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-24528 https://bugzilla.redhat.com/show_bug.cgi?id=2342796 https://www.cve.org/CVERecord?id=CVE-2025-24528 https://nvd.nist.gov/vuln/detail/CVE-2025-24528 https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-24528.json https://access.redhat.com/errata/RHSA-2025:7067&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-6.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;15uVNLTcXPHEO0XVoOOwZw==&#34;: {&#xA;      &#34;id&#34;: &#34;15uVNLTcXPHEO0XVoOOwZw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28834&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28834 https://bugzilla.redhat.com/show_bug.cgi?id=2269228 https://www.cve.org/CVERecord?id=CVE-2024-28834 https://nvd.nist.gov/vuln/detail/CVE-2024-28834 https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html https://minerva.crocs.fi.muni.cz/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28834.json https://access.redhat.com/errata/RHSA-2024:2570&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-4.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;194woe53clmG4lfLXvwjcA==&#34;: {&#xA;      &#34;id&#34;: &#34;194woe53clmG4lfLXvwjcA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bsdtar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;19Kvl4LS7MCiBo2cRD5fxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;19Kvl4LS7MCiBo2cRD5fxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3974&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim. A possible use-after-free vulnerability could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-11-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3974 https://bugzilla.redhat.com/show_bug.cgi?id=2025061 https://www.cve.org/CVERecord?id=CVE-2021-3974 https://nvd.nist.gov/vuln/detail/CVE-2021-3974 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3974.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1BGBx+ICmx9ndSR1J6c9Rw==&#34;: {&#xA;      &#34;id&#34;: &#34;1BGBx+ICmx9ndSR1J6c9Rw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1CCABRgs/s9xxQcDgxw00A==&#34;: {&#xA;      &#34;id&#34;: &#34;1CCABRgs/s9xxQcDgxw00A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69645&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils, specifically in the `objdump` utility. A local attacker can exploit this vulnerability by providing a specially crafted binary file containing malformed DWARF (Debugging With Attributed Record Formats) debug information. This can lead to a logic error during the processing of DWARF compilation units, causing the `objdump` utility to crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69645 https://bugzilla.redhat.com/show_bug.cgi?id=2445261 https://www.cve.org/CVERecord?id=CVE-2025-69645 https://nvd.nist.gov/vuln/detail/CVE-2025-69645 https://sourceware.org/bugzilla/show_bug.cgi?id=33637 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cdb728d4da6184631989b192f1022c219dea7677 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69645.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1CDGyH/KaS7DctjOTuk4Gg==&#34;: {&#xA;      &#34;id&#34;: &#34;1CDGyH/KaS7DctjOTuk4Gg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32002&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32002 https://bugzilla.redhat.com/show_bug.cgi?id=2230948 https://www.cve.org/CVERecord?id=CVE-2023-32002 https://nvd.nist.gov/vuln/detail/CVE-2023-32002 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32002.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1I7VtxkB33ashDX0kB4Teg==&#34;: {&#xA;      &#34;id&#34;: &#34;1I7VtxkB33ashDX0kB4Teg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5889&#34;,&#xA;      &#34;description&#34;: &#34;A denial-of-service (DoS) vulnerability has been identified in the brace-expansion JavaScript package. This issue occurs due to inefficient regular expression complexity, which can be exploited by an attacker providing specially crafted input. Such input could lead to excessive processing time and resource consumption, rendering applications that utilize this package unresponsive and causing a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-09T18:16:01Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5889 https://bugzilla.redhat.com/show_bug.cgi?id=2371270 https://www.cve.org/CVERecord?id=CVE-2025-5889 https://nvd.nist.gov/vuln/detail/CVE-2025-5889 https://gist.github.com/mmmsssttt404/37a40ce7d6e5ca604858fe30814d9466 https://github.com/juliangruber/brace-expansion/pull/65/commits/a5b98a4f30d7813266b221435e1eaaf25a1b0ac5 https://vuldb.com/?ctiid.311660 https://vuldb.com/?id.311660 https://vuldb.com/?submit.585717 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5889.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1ICypZP/7UrDVdoDevopUA==&#34;: {&#xA;      &#34;id&#34;: &#34;1ICypZP/7UrDVdoDevopUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39319&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of \&#34;\u003cscript\&#34;, \&#34;\u003c!--\&#34;, and \&#34;\u003c/script\&#34; within JS literals in \u003cscript\u003e contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39319 https://bugzilla.redhat.com/show_bug.cgi?id=2237773 https://www.cve.org/CVERecord?id=CVE-2023-39319 https://nvd.nist.gov/vuln/detail/CVE-2023-39319 https://go.dev/cl/526157 https://go.dev/issue/62197 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2043.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39319.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1IGqkgWGwsavqCo3U8V2Jw==&#34;: {&#xA;      &#34;id&#34;: &#34;1IGqkgWGwsavqCo3U8V2Jw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:11802&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.16.0-2.module+el9.6.0+23339+d3c8acfa&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1KxLqY5vPHnDfUxdviejiw==&#34;: {&#xA;      &#34;id&#34;: &#34;1KxLqY5vPHnDfUxdviejiw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1LTKa378StuY8O3o3G26jw==&#34;: {&#xA;      &#34;id&#34;: &#34;1LTKa378StuY8O3o3G26jw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30589&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30589 https://bugzilla.redhat.com/show_bug.cgi?id=2219841 https://www.cve.org/CVERecord?id=CVE-2023-30589 https://nvd.nist.gov/vuln/detail/CVE-2023-30589 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30589.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.1-1.18.16.1.1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1PYvw1fdwe6hM2UBdw4Itw==&#34;: {&#xA;      &#34;id&#34;: &#34;1PYvw1fdwe6hM2UBdw4Itw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9900&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Libtiff. This vulnerability is a \&#34;write-what-where\&#34; condition, triggered when the library processes a specially crafted TIFF image file.\n\nBy providing an abnormally large image height value in the file&#39;s metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-22T14:29:35Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9900 https://bugzilla.redhat.com/show_bug.cgi?id=2392784 https://www.cve.org/CVERecord?id=CVE-2025-9900 https://nvd.nist.gov/vuln/detail/CVE-2025-9900 https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file https://gitlab.com/libtiff/libtiff/-/issues/704 https://gitlab.com/libtiff/libtiff/-/merge_requests/732 https://libtiff.gitlab.io/libtiff/releases/v4.7.1.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9900.json https://access.redhat.com/errata/RHSA-2025:19113&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-13.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1QQmDcMkRqvOte/bR8QEuQ==&#34;: {&#xA;      &#34;id&#34;: &#34;1QQmDcMkRqvOte/bR8QEuQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0797&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the _TIFFmemcpy function in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c, resulting in a Denial of Service and limited information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0797 https://bugzilla.redhat.com/show_bug.cgi?id=2170151 https://www.cve.org/CVERecord?id=CVE-2023-0797 https://nvd.nist.gov/vuln/detail/CVE-2023-0797 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0797.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1QnQnbNEHorQXFc0WpMmGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;1QnQnbNEHorQXFc0WpMmGQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26996&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-20T03:05:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26996 https://bugzilla.redhat.com/show_bug.cgi?id=2441268 https://www.cve.org/CVERecord?id=CVE-2026-26996 https://nvd.nist.gov/vuln/detail/CVE-2026-26996 https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26996.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.2-1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1SDdOQM609JpOnF4Vx/qwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;1SDdOQM609JpOnF4Vx/qwQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3277&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in SQLite’s `concat_ws()` function, where an integer overflow can be triggered. The resulting truncated integer can allocate a buffer. When SQLite writes the resulting string to the buffer, it uses the original, untruncated size, and a wild heap buffer overflow size of around 4GB can occur. This issue can result in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-14T16:50:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3277 https://bugzilla.redhat.com/show_bug.cgi?id=2359553 https://www.cve.org/CVERecord?id=CVE-2025-3277 https://nvd.nist.gov/vuln/detail/CVE-2025-3277 https://sqlite.org/src/info/498e3f1cf57f164f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3277.json https://access.redhat.com/errata/RHSA-2025:7433&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.15.0-1.module+el9.6.0+23062+9e7801b9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1V7JwcA/poy4b6C9OdWTZg==&#34;: {&#xA;      &#34;id&#34;: &#34;1V7JwcA/poy4b6C9OdWTZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59465&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been discovered in NodeJS. A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59465 https://bugzilla.redhat.com/show_bug.cgi?id=2431349 https://www.cve.org/CVERecord?id=CVE-2025-59465 https://nvd.nist.gov/vuln/detail/CVE-2025-59465 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59465.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1VKGbptJGVhPmMaic8aidg==&#34;: {&#xA;      &#34;id&#34;: &#34;1VKGbptJGVhPmMaic8aidg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29491&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in ncurses and occurs when used by a setuid application. This flaw allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29491 https://bugzilla.redhat.com/show_bug.cgi?id=2191704 https://www.cve.org/CVERecord?id=CVE-2023-29491 https://nvd.nist.gov/vuln/detail/CVE-2023-29491 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29491.json https://access.redhat.com/errata/RHSA-2023:6698&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:6.2-10.20210508.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1WQ/LJu/kefEuHRv58l0Lw==&#34;: {&#xA;      &#34;id&#34;: &#34;1WQ/LJu/kefEuHRv58l0Lw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4734&#34;,&#xA;      &#34;description&#34;: &#34;Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1846.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4734 https://bugzilla.redhat.com/show_bug.cgi?id=2237161 https://www.cve.org/CVERecord?id=CVE-2023-4734 https://nvd.nist.gov/vuln/detail/CVE-2023-4734 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4734.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1XwPa50Si6EKs+Oms8SLUA==&#34;: {&#xA;      &#34;id&#34;: &#34;1XwPa50Si6EKs+Oms8SLUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25193&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found HarfBuzz. This flaw allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25193 https://bugzilla.redhat.com/show_bug.cgi?id=2167254 https://www.cve.org/CVERecord?id=CVE-2023-25193 https://nvd.nist.gov/vuln/detail/CVE-2023-25193 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25193.json https://access.redhat.com/errata/RHSA-2024:2410&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;harfbuzz-icu&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.7.4-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1aPjlkabj3eUY8WGb+gz+g==&#34;: {&#xA;      &#34;id&#34;: &#34;1aPjlkabj3eUY8WGb+gz+g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22025&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22025 https://bugzilla.redhat.com/show_bug.cgi?id=2270559 https://www.cve.org/CVERecord?id=CVE-2024-22025 https://nvd.nist.gov/vuln/detail/CVE-2024-22025 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22025.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.2.8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1aeaK9IMMvYHnuzRhdxEbA==&#34;: {&#xA;      &#34;id&#34;: &#34;1aeaK9IMMvYHnuzRhdxEbA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59465&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been discovered in NodeJS. A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59465 https://bugzilla.redhat.com/show_bug.cgi?id=2431349 https://www.cve.org/CVERecord?id=CVE-2025-59465 https://nvd.nist.gov/vuln/detail/CVE-2025-59465 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59465.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1cpz1Hzz2hsR9fx5YrxP3g==&#34;: {&#xA;      &#34;id&#34;: &#34;1cpz1Hzz2hsR9fx5YrxP3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6176&#34;,&#xA;      &#34;description&#34;: &#34;Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-31T00:00:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6176 https://bugzilla.redhat.com/show_bug.cgi?id=2408762 https://www.cve.org/CVERecord?id=CVE-2025-6176 https://nvd.nist.gov/vuln/detail/CVE-2025-6176 https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6176.json https://access.redhat.com/errata/RHSA-2026:2042&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;brotli-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.0.9-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1eXmoeT5Qd9M0GiSJ3z2mg==&#34;: {&#xA;      &#34;id&#34;: &#34;1eXmoeT5Qd9M0GiSJ3z2mg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30589&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30589 https://bugzilla.redhat.com/show_bug.cgi?id=2219841 https://www.cve.org/CVERecord?id=CVE-2023-30589 https://nvd.nist.gov/vuln/detail/CVE-2023-30589 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30589.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.16.1-1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1geoBO6lBMXVRM+dfApwgw==&#34;: {&#xA;      &#34;id&#34;: &#34;1geoBO6lBMXVRM+dfApwgw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32776&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing specially crafted XML content with empty external parameter entities. This could lead to a NULL pointer dereference, causing the application to crash and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T06:54:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32776 https://bugzilla.redhat.com/show_bug.cgi?id=2447888 https://www.cve.org/CVERecord?id=CVE-2026-32776 https://nvd.nist.gov/vuln/detail/CVE-2026-32776 https://github.com/libexpat/libexpat/pull/1158 https://github.com/libexpat/libexpat/pull/1159 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32776.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;: {&#xA;      &#34;id&#34;: &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-14T21:01:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0861 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://www.cve.org/CVERecord?id=CVE-2026-0861 https://nvd.nist.gov/vuln/detail/CVE-2026-0861 https://sourceware.org/bugzilla/show_bug.cgi?id=33796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0861.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1lRtJofWFCTkQi0dreTmvg==&#34;: {&#xA;      &#34;id&#34;: &#34;1lRtJofWFCTkQi0dreTmvg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29491&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in ncurses and occurs when used by a setuid application. This flaw allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29491 https://bugzilla.redhat.com/show_bug.cgi?id=2191704 https://www.cve.org/CVERecord?id=CVE-2023-29491 https://nvd.nist.gov/vuln/detail/CVE-2023-29491 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29491.json https://access.redhat.com/errata/RHSA-2023:6698&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:6.2-10.20210508.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1nX4t0Z3G1H45fqJox3f4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;1nX4t0Z3G1H45fqJox3f4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38545&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \&#34;let the host resolve the name\&#34; could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38545 https://bugzilla.redhat.com/show_bug.cgi?id=2241933 https://www.cve.org/CVERecord?id=CVE-2023-38545 https://nvd.nist.gov/vuln/detail/CVE-2023-38545 https://curl.se/docs/CVE-2023-38545.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38545.json https://access.redhat.com/errata/RHSA-2023:5763&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;: {&#xA;      &#34;id&#34;: &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in zlib. An attacker providing specially crafted input to the `crc32_combine64` or `crc32_combine_gen64` functions could trigger an infinite loop within the `x2nmodp` function. This leads to excessive CPU consumption, which can result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-18T02:36:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27171 https://bugzilla.redhat.com/show_bug.cgi?id=2440530 https://www.cve.org/CVERecord?id=CVE-2026-27171 https://nvd.nist.gov/vuln/detail/CVE-2026-27171 https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/ https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf https://github.com/madler/zlib/issues/904 https://github.com/madler/zlib/releases/tag/v1.3.2 https://ostif.org/zlib-audit-complete/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27171.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1oKL9ZSv1M4CmxUhNFjpmg==&#34;: {&#xA;      &#34;id&#34;: &#34;1oKL9ZSv1M4CmxUhNFjpmg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-46835&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the git GUI package. When a user clones an untrusted repository and edits a file located in a maliciously named directory, git GUI may end up creating or overwriting arbitrary files for the running user has written permission. This flaw allows an attacker to modify the content of target files without the affected user&#39;s intent, resulting in a data integrity issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T15:09:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-46835 https://bugzilla.redhat.com/show_bug.cgi?id=2379326 https://www.cve.org/CVERecord?id=CVE-2025-46835 https://nvd.nist.gov/vuln/detail/CVE-2025-46835 https://github.com/j6t/git-gui/compare/dcda716dbc9c90bcac4611bd1076747671ee0906..a437f5bc93330a70b42a230e52f3bd036ca1b1da https://github.com/j6t/git-gui/security/advisories/GHSA-xfx7-68v4-v8fg https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-46835.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1q7YjyB3mR25zvqxJ6Zk3w==&#34;: {&#xA;      &#34;id&#34;: &#34;1q7YjyB3mR25zvqxJ6Zk3w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48554&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in file, a program used to identify a particular file according to the type of data contained by the file. This issue occurs when processing a specially crafted file, causing a stack-based buffer over-read, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-48554 https://bugzilla.redhat.com/show_bug.cgi?id=2235714 https://www.cve.org/CVERecord?id=CVE-2022-48554 https://nvd.nist.gov/vuln/detail/CVE-2022-48554 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-48554.json https://access.redhat.com/errata/RHSA-2024:2512&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:5.39-16.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1qsA4RvCYZB2uDwgIo8TuQ==&#34;: {&#xA;      &#34;id&#34;: &#34;1qsA4RvCYZB2uDwgIo8TuQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2024-3106&#34;,&#xA;      &#34;description&#34;: &#34;Stack exhaustion in Decoder.Decode in encoding/gob&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T19:15:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/611239 https://go.dev/issue/69139 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.22.7&#34;&#xA;    },&#xA;    &#34;1r5b1oLl7viNgjtnEVfEyw==&#34;: {&#xA;      &#34;id&#34;: &#34;1r5b1oLl7viNgjtnEVfEyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1sD6TJmtoMKm89Mo2ka5lA==&#34;: {&#xA;      &#34;id&#34;: &#34;1sD6TJmtoMKm89Mo2ka5lA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1uk6R7fJdNFj2gxMFc6jOA==&#34;: {&#xA;      &#34;id&#34;: &#34;1uk6R7fJdNFj2gxMFc6jOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69652&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted ELF binary file containing malformed DWARF abbrev or debug information with the readelf program using the -w abbrev command line option can trigger an abort, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69652 https://bugzilla.redhat.com/show_bug.cgi?id=2445296 https://www.cve.org/CVERecord?id=CVE-2025-69652 https://nvd.nist.gov/vuln/detail/CVE-2025-69652 https://sourceware.org/bugzilla/show_bug.cgi?id=33701 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=44b79abd0fa12e7947252eb4c6e5d16ed6033e01 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69652.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1w+glHHFE32ql3XJuIAYWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;1w+glHHFE32ql3XJuIAYWQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66862&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted PE file with cxxfilt can trigger a heap-based buffer over-read in the gnu_special function in the cplus-dem.c file, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66862 https://bugzilla.redhat.com/show_bug.cgi?id=2425825 https://www.cve.org/CVERecord?id=CVE-2025-66862 https://nvd.nist.gov/vuln/detail/CVE-2025-66862 https://github.com/caozhzh/CRGF-Vul/blob/main/cxxfilt/crash3.md https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66862.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1xlP6pB26ufMu9nE2My5Iw==&#34;: {&#xA;      &#34;id&#34;: &#34;1xlP6pB26ufMu9nE2My5Iw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64720&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow flaw has been discovered in libpng. An out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:45:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64720 https://bugzilla.redhat.com/show_bug.cgi?id=2416904 https://www.cve.org/CVERecord?id=CVE-2025-64720 https://nvd.nist.gov/vuln/detail/CVE-2025-64720 https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643 https://github.com/pnggroup/libpng/issues/686 https://github.com/pnggroup/libpng/pull/751 https://github.com/pnggroup/libpng/security/advisories/GHSA-hfc7-ph9c-wcww https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64720.json https://access.redhat.com/errata/RHSA-2026:0238&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1ylYMOLaPUA6xIkqwKBb9w==&#34;: {&#xA;      &#34;id&#34;: &#34;1ylYMOLaPUA6xIkqwKBb9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28321&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. An incorrect International Domain Name (IDN) wildcard match may lead to improper certificate validation.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28321 https://bugzilla.redhat.com/show_bug.cgi?id=2196786 https://www.cve.org/CVERecord?id=CVE-2023-28321 https://nvd.nist.gov/vuln/detail/CVE-2023-28321 https://curl.se/docs/CVE-2023-28321.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28321.json https://access.redhat.com/errata/RHSA-2023:4354&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2+grY6RsLOFJVlzFN96AuQ==&#34;: {&#xA;      &#34;id&#34;: &#34;2+grY6RsLOFJVlzFN96AuQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4403&#34;,&#xA;      &#34;description&#34;: &#34;Improper access to parent directory of root in os&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-04T22:42:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/670036 https://go.dev/issue/73555 https://groups.google.com/g/golang-announce/c/UZoIkUT367A/m/5WDxKizJAQAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.23.9&#34;&#xA;    },&#xA;    &#34;2/I3PyWTnfJdMedKAemp8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;2/I3PyWTnfJdMedKAemp8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24536&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an issue during multipart form parsing. By sending a specially crafted input, a remote attacker can consume large amounts of CPU and memory, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24536 https://bugzilla.redhat.com/show_bug.cgi?id=2184482 https://www.cve.org/CVERecord?id=CVE-2023-24536 https://nvd.nist.gov/vuln/detail/CVE-2023-24536 https://go.dev/issue/59153 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24536.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2/tA0uwDqjzRb7JZP+f4Mw==&#34;: {&#xA;      &#34;id&#34;: &#34;2/tA0uwDqjzRb7JZP+f4Mw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32280&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32280 https://bugzilla.redhat.com/show_bug.cgi?id=2456339 https://www.cve.org/CVERecord?id=CVE-2026-32280 https://nvd.nist.gov/vuln/detail/CVE-2026-32280 https://go.dev/cl/758320 https://go.dev/issue/78282 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4947 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32280.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;241S2RmgJzaFxfQcayo1Pw==&#34;: {&#xA;      &#34;id&#34;: &#34;241S2RmgJzaFxfQcayo1Pw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6100&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s decompression modules, including `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile`. This vulnerability, a use-after-free, can occur if a program attempts to re-use a decompression object after a memory allocation error, especially when the system is experiencing high memory usage. Exploitation of this flaw could potentially allow an attacker to execute arbitrary code or access sensitive data. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T17:15:47Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6100 https://bugzilla.redhat.com/show_bug.cgi?id=2457932 https://www.cve.org/CVERecord?id=CVE-2026-6100 https://nvd.nist.gov/vuln/detail/CVE-2026-6100 https://github.com/python/cpython/commit/6a5f79c8d7bbf22b083b240910c7a8781a59437d https://github.com/python/cpython/commit/8fc66aef6d7b3ae58f43f5c66f9366cc8cbbfcd2 https://github.com/python/cpython/commit/c3cf71c3366fe49acb776a639405c0eea6169c20 https://github.com/python/cpython/issues/148395 https://github.com/python/cpython/pull/148396 https://mail.python.org/archives/list/security-announce@python.org/thread/HTWB2Z6KT5QQX4RYEZAFININDHNOSIF3/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6100.json https://access.redhat.com/errata/RHSA-2026:10949&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2432H9ZBrMWDJ7HhyQT63A==&#34;: {&#xA;      &#34;id&#34;: &#34;2432H9ZBrMWDJ7HhyQT63A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;24Paca4PaySz9eM+VJu4ew==&#34;: {&#xA;      &#34;id&#34;: &#34;24Paca4PaySz9eM+VJu4ew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2398&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an application configures libcurl to use HTTP/2 server push and the amount of received headers for the push surpasses the maximum allowed limit, libcurl aborts the server push. When aborting, libcurl does not free all the previously allocated headers, resulting in a memory leak.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2398 https://bugzilla.redhat.com/show_bug.cgi?id=2270498 https://www.cve.org/CVERecord?id=CVE-2024-2398 https://nvd.nist.gov/vuln/detail/CVE-2024-2398 https://curl.se/docs/CVE-2024-2398.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2398.json https://access.redhat.com/errata/RHSA-2024:5529&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-29.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;24Ysg4Ma/AJz8Z93D2PzNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;24Ysg4Ma/AJz8Z93D2PzNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1255&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security flaw occurs because the AES-XTS cipher decryption implementation for the 64-bit ARM platform contains an issue that could cause it to read past the input buffer, leading to a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1255 https://bugzilla.redhat.com/show_bug.cgi?id=2188461 https://www.cve.org/CVERecord?id=CVE-2023-1255 https://nvd.nist.gov/vuln/detail/CVE-2023-1255 https://www.openssl.org/news/secadv/20230420.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1255.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;269Lb6JhyjdTwif2gzpsMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;269Lb6JhyjdTwif2gzpsMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;26JRymquUeoxtDSKcKSDSg==&#34;: {&#xA;      &#34;id&#34;: &#34;26JRymquUeoxtDSKcKSDSg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5535&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the &#39;no overlap&#39; response in ALPN or uses the output as the opportunistic protocol in NPN.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-5535 https://bugzilla.redhat.com/show_bug.cgi?id=2294581 https://www.cve.org/CVERecord?id=CVE-2024-5535 https://nvd.nist.gov/vuln/detail/CVE-2024-5535 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-5535.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;27u7kvLvlu7kh99wyuxQrg==&#34;: {&#xA;      &#34;id&#34;: &#34;27u7kvLvlu7kh99wyuxQrg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5222&#34;,&#xA;      &#34;description&#34;: &#34;A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the &#39;subtag&#39; struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5222 https://bugzilla.redhat.com/show_bug.cgi?id=2368600 https://www.cve.org/CVERecord?id=CVE-2025-5222 https://nvd.nist.gov/vuln/detail/CVE-2025-5222 https://unicode-org.atlassian.net/jira/software/c/projects/ICU/issues/ICU-22957 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5222.json https://access.redhat.com/errata/RHSA-2025:12083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libicu&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:67.1-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;29Fo/GOP7MILPepOrnMgjA==&#34;: {&#xA;      &#34;id&#34;: &#34;29Fo/GOP7MILPepOrnMgjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43786&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43786 https://bugzilla.redhat.com/show_bug.cgi?id=2242253 https://www.cve.org/CVERecord?id=CVE-2023-43786 https://nvd.nist.gov/vuln/detail/CVE-2023-43786 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43786.json https://access.redhat.com/errata/RHSA-2024:2145&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;29JfppZedoclZHW2coehcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;29JfppZedoclZHW2coehcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24540&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set \&#34;\\t\\n\\f\\r\\u0020\\u2028\\u2029\&#34; in JavaScript contexts that also contain actions may not be properly sanitized during execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24540 https://bugzilla.redhat.com/show_bug.cgi?id=2196027 https://www.cve.org/CVERecord?id=CVE-2023-24540 https://nvd.nist.gov/vuln/detail/CVE-2023-24540 https://go.dev/issue/59721 https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24540.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2A2BjgErU1GldRQi2g+XQg==&#34;: {&#xA;      &#34;id&#34;: &#34;2A2BjgErU1GldRQi2g+XQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-45939&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Etags, the Ctags implementation of Emacs. A file with a crafted filename may result in arbitrary command execution when processed by Etags.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-11-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-45939 https://bugzilla.redhat.com/show_bug.cgi?id=2149380 https://www.cve.org/CVERecord?id=CVE-2022-45939 https://nvd.nist.gov/vuln/detail/CVE-2022-45939 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-45939.json https://access.redhat.com/errata/RHSA-2023:2366&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:27.2-8.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2CBaGFwc5Pbj3yR6Gim3fA==&#34;: {&#xA;      &#34;id&#34;: &#34;2CBaGFwc5Pbj3yR6Gim3fA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25679&#34;,&#xA;      &#34;description&#34;: &#34;The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:28:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25679 https://bugzilla.redhat.com/show_bug.cgi?id=2445356 https://www.cve.org/CVERecord?id=CVE-2026-25679 https://nvd.nist.gov/vuln/detail/CVE-2026-25679 https://go.dev/cl/752180 https://go.dev/issue/77578 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://pkg.go.dev/vuln/GO-2026-4601 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25679.json https://access.redhat.com/errata/RHSA-2026:5942&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.8-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2DPl1NLEsHotw7kYOPR/8A==&#34;: {&#xA;      &#34;id&#34;: &#34;2DPl1NLEsHotw7kYOPR/8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2GOqqUt4mwKng/FA0FV67w==&#34;: {&#xA;      &#34;id&#34;: &#34;2GOqqUt4mwKng/FA0FV67w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32665&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32665 https://bugzilla.redhat.com/show_bug.cgi?id=2211827 https://www.cve.org/CVERecord?id=CVE-2023-32665 https://nvd.nist.gov/vuln/detail/CVE-2023-32665 https://gitlab.gnome.org/GNOME/glib/-/issues/2121 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32665.json https://access.redhat.com/errata/RHSA-2023:6631&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2I/0B+uXhxpPJWXGwNGlLw==&#34;: {&#xA;      &#34;id&#34;: &#34;2I/0B+uXhxpPJWXGwNGlLw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5344&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow vulnerability was found in Vim&#39;s trunc_string() function of the src/message.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap-based buffer overflow that causes an application to crash, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5344 https://bugzilla.redhat.com/show_bug.cgi?id=2242141 https://www.cve.org/CVERecord?id=CVE-2023-5344 https://nvd.nist.gov/vuln/detail/CVE-2023-5344 https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5344.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2IUiS8eDJ2evZHzBkLGqPw==&#34;: {&#xA;      &#34;id&#34;: &#34;2IUiS8eDJ2evZHzBkLGqPw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4285&#34;,&#xA;      &#34;description&#34;: &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4285 https://bugzilla.redhat.com/show_bug.cgi?id=2150768 https://www.cve.org/CVERecord?id=CVE-2022-4285 https://nvd.nist.gov/vuln/detail/CVE-2022-4285 https://sourceware.org/bugzilla/show_bug.cgi?id=29699 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5c831a3c7f3ca98d6aba1200353311e1a1f84c70 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4285.json https://access.redhat.com/errata/RHSA-2023:6593&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.35.2-42.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2Jpm8Zc5oiON+VhscwC/4w==&#34;: {&#xA;      &#34;id&#34;: &#34;2Jpm8Zc5oiON+VhscwC/4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2M5CwoqtCrF9ix+6ghISOg==&#34;: {&#xA;      &#34;id&#34;: &#34;2M5CwoqtCrF9ix+6ghISOg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6923&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the email module that uses Python language. The email module doesn&#39;t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6923 https://bugzilla.redhat.com/show_bug.cgi?id=2302255 https://www.cve.org/CVERecord?id=CVE-2024-6923 https://nvd.nist.gov/vuln/detail/CVE-2024-6923 https://github.com/python/cpython/issues/121650 https://github.com/python/cpython/pull/122233 https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6923.json https://access.redhat.com/errata/RHSA-2024:6163&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2No3jCnnmCwOEpCbk+TZGA==&#34;: {&#xA;      &#34;id&#34;: &#34;2No3jCnnmCwOEpCbk+TZGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25646&#34;,&#xA;      &#34;description&#34;: &#34;A heap based buffer overflow flaw has been discovered in LibPNG. Prior to version 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user&#39;s display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T17:04:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25646 https://bugzilla.redhat.com/show_bug.cgi?id=2438542 https://www.cve.org/CVERecord?id=CVE-2026-25646 https://nvd.nist.gov/vuln/detail/CVE-2026-25646 http://www.openwall.com/lists/oss-security/2026/02/09/7 https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88 https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25646.json https://access.redhat.com/errata/RHSA-2026:3405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2QjZksAOTEJVwk59l2QYOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;2QjZksAOTEJVwk59l2QYOQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8088&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s zipfile module. When iterating over the entries of a zip archive, the process can enter into an infinite loop state and become unresponsive. This flaw allows an attacker to craft a malicious ZIP archive, leading to a denial of service from the application consuming the zipfile module. Only applications that handle user-controlled zip archives are affected by this vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-22T19:15:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-8088 https://bugzilla.redhat.com/show_bug.cgi?id=2307370 https://www.cve.org/CVERecord?id=CVE-2024-8088 https://nvd.nist.gov/vuln/detail/CVE-2024-8088 https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64 https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea https://github.com/python/cpython/issues/122905 https://github.com/python/cpython/pull/122906 https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8088.json https://access.redhat.com/errata/RHSA-2024:9371&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.19-8.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2RZ3u6UmceVG9iB/xb73SA==&#34;: {&#xA;      &#34;id&#34;: &#34;2RZ3u6UmceVG9iB/xb73SA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2206&#34;,&#xA;      &#34;description&#34;: &#34;Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2206 https://bugzilla.redhat.com/show_bug.cgi?id=2102188 https://www.cve.org/CVERecord?id=CVE-2022-2206 https://nvd.nist.gov/vuln/detail/CVE-2022-2206 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2206.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;: {&#xA;      &#34;id&#34;: &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-13176&#34;,&#xA;      &#34;description&#34;: &#34;A timing side-channel vulnerability was found in OpenSSL. This vulnerability allows an attacker to recover the private key. However, measuring the timing would require local access to the signing application or a fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This issue can happen with significant probability only for some of the supported elliptic curves. In particular, the NIST P-521 curve is affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-20T13:29:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-13176 https://bugzilla.redhat.com/show_bug.cgi?id=2338999 https://www.cve.org/CVERecord?id=CVE-2024-13176 https://nvd.nist.gov/vuln/detail/CVE-2024-13176 https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-13176.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2UHqEqfMIIn53NkDlDEppQ==&#34;: {&#xA;      &#34;id&#34;: &#34;2UHqEqfMIIn53NkDlDEppQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2923&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim, where it is vulnerable to a NULL pointer dereference in the sug_filltree function. This flaw allows a specially crafted file to crash the software.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2923 https://bugzilla.redhat.com/show_bug.cgi?id=2120989 https://www.cve.org/CVERecord?id=CVE-2022-2923 https://nvd.nist.gov/vuln/detail/CVE-2022-2923 https://huntr.dev/bounties/fd3a3ab8-ab0f-452f-afea-8c613e283fd2 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2923.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2UhjmcPUkGmILpYJPZEiNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;2UhjmcPUkGmILpYJPZEiNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35938&#34;,&#xA;      &#34;description&#34;: &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35938 https://bugzilla.redhat.com/show_bug.cgi?id=1964114 https://www.cve.org/CVERecord?id=CVE-2021-35938 https://nvd.nist.gov/vuln/detail/CVE-2021-35938 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35938.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-build-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2VowcBblBj36IfwmFRwcwg==&#34;: {&#xA;      &#34;id&#34;: &#34;2VowcBblBj36IfwmFRwcwg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29007&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security flaw occurs when renaming or deleting a section from a configuration file, where certain malicious configuration values may be misinterpreted as the beginning of a new configuration section. This flaw leads to arbitrary configuration injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29007 https://bugzilla.redhat.com/show_bug.cgi?id=2188338 https://www.cve.org/CVERecord?id=CVE-2023-29007 https://nvd.nist.gov/vuln/detail/CVE-2023-29007 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29007.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2Yo5V5wVVXhJ0VU+H57P9g==&#34;: {&#xA;      &#34;id&#34;: &#34;2Yo5V5wVVXhJ0VU+H57P9g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1299&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the email module in the Python standard library. When serializing an email message, the BytesGenerator class fails to properly quote newline characters for email headers. This issue is exploitable when the LiteralHeader class is used as it does not respect email folding rules, allowing an attacker to inject email headers and potentially modify message recipients or the email body, and spoof sender information.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-23T16:27:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1299 https://bugzilla.redhat.com/show_bug.cgi?id=2432437 https://www.cve.org/CVERecord?id=CVE-2026-1299 https://nvd.nist.gov/vuln/detail/CVE-2026-1299 https://cve.org/CVERecord?id=CVE-2024-6923 https://github.com/python/cpython/commit/052e55e7d44718fe46cbba0ca995cb8fcc359413 https://github.com/python/cpython/issues/144125 https://github.com/python/cpython/pull/144126 https://mail.python.org/archives/list/security-announce@python.org/thread/6ZZULGALJTITEAGEXLDJE2C6FORDXPBT/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1299.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2Z/NA7sGgadio/qisfiC3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;2Z/NA7sGgadio/qisfiC3Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48339&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Emacs package. If a file name or directory name contains shell metacharacters, arbitrary code may be executed.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-48339 https://bugzilla.redhat.com/show_bug.cgi?id=2171989 https://www.cve.org/CVERecord?id=CVE-2022-48339 https://nvd.nist.gov/vuln/detail/CVE-2022-48339 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-48339.json https://access.redhat.com/errata/RHSA-2023:2626&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:27.2-8.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2bOVXniSdlE0fZB1iot4yQ==&#34;: {&#xA;      &#34;id&#34;: &#34;2bOVXniSdlE0fZB1iot4yQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2eI6vtB1jD43elLjnJ5clw==&#34;: {&#xA;      &#34;id&#34;: &#34;2eI6vtB1jD43elLjnJ5clw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55132&#34;,&#xA;      &#34;description&#34;: &#34;A file access flaw has been discovered in NodeJS. A file&#39;s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55132 https://bugzilla.redhat.com/show_bug.cgi?id=2431338 https://www.cve.org/CVERecord?id=CVE-2025-55132 https://nvd.nist.gov/vuln/detail/CVE-2025-55132 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55132.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2j4vw/Ef1McLxa/C6FEQvA==&#34;: {&#xA;      &#34;id&#34;: &#34;2j4vw/Ef1McLxa/C6FEQvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25883&#34;,&#xA;      &#34;description&#34;: &#34;A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the &#39;new Range&#39; function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25883 https://bugzilla.redhat.com/show_bug.cgi?id=2216475 https://www.cve.org/CVERecord?id=CVE-2022-25883 https://nvd.nist.gov/vuln/detail/CVE-2022-25883 https://github.com/advisories/GHSA-c2qf-rxjj-qqgw https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25883.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.17.1-1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2k/PqFfUaKNy33VkAbVD6g==&#34;: {&#xA;      &#34;id&#34;: &#34;2k/PqFfUaKNy33VkAbVD6g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-24765&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw occurs due to Git not checking the ownership of directories in a local multi-user system when running commands specified in the local repository configuration.  This allows the owner of the repository to cause arbitrary commands to be executed by other users who access the repository.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-04-12T10:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-24765 https://bugzilla.redhat.com/show_bug.cgi?id=2073414 https://www.cve.org/CVERecord?id=CVE-2022-24765 https://nvd.nist.gov/vuln/detail/CVE-2022-24765 https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-24765.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2luu38jiVQvy6qOXHFgpAg==&#34;: {&#xA;      &#34;id&#34;: &#34;2luu38jiVQvy6qOXHFgpAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2042&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free vulnerability was found in Vim&#39;s skipwhite() function of the src/charset.c file. This flaw occurs because of an uninitialized attribute value and freed memory in the spell command. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash and corrupt memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2042 https://bugzilla.redhat.com/show_bug.cgi?id=2097768 https://www.cve.org/CVERecord?id=CVE-2022-2042 https://nvd.nist.gov/vuln/detail/CVE-2022-2042 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2042.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2n2n++65Q4X6kZeNZUZXMw==&#34;: {&#xA;      &#34;id&#34;: &#34;2n2n++65Q4X6kZeNZUZXMw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27533&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27533 https://bugzilla.redhat.com/show_bug.cgi?id=2179062 https://www.cve.org/CVERecord?id=CVE-2023-27533 https://nvd.nist.gov/vuln/detail/CVE-2023-27533 https://curl.se/docs/CVE-2023-27533.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27533.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2oTX17kDUCTK4lHB98r0SQ==&#34;: {&#xA;      &#34;id&#34;: &#34;2oTX17kDUCTK4lHB98r0SQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-base&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.27-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2pofu/QdlV4xoXosgfKRNw==&#34;: {&#xA;      &#34;id&#34;: &#34;2pofu/QdlV4xoXosgfKRNw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2s0qmbyWNwDtt7UJcKOirQ==&#34;: {&#xA;      &#34;id&#34;: &#34;2s0qmbyWNwDtt7UJcKOirQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1528&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici&#39;s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:21:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1528 https://bugzilla.redhat.com/show_bug.cgi?id=2447145 https://www.cve.org/CVERecord?id=CVE-2026-1528 https://nvd.nist.gov/vuln/detail/CVE-2026-1528 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj https://hackerone.com/reports/3537648 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1528.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2sm08sXcjWtT2Gtu3CdSug==&#34;: {&#xA;      &#34;id&#34;: &#34;2sm08sXcjWtT2Gtu3CdSug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-1725&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference vulnerability was found in Vim&#39;s vim_regexec_string() function of the src/regexp.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL pointer dereference that causes a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-1725 https://bugzilla.redhat.com/show_bug.cgi?id=2132561 https://www.cve.org/CVERecord?id=CVE-2022-1725 https://nvd.nist.gov/vuln/detail/CVE-2022-1725 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1725.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2t1KBK7sA8rKgVHavF6SZA==&#34;: {&#xA;      &#34;id&#34;: &#34;2t1KBK7sA8rKgVHavF6SZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52355&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-52355 https://bugzilla.redhat.com/show_bug.cgi?id=2251326 https://www.cve.org/CVERecord?id=CVE-2023-52355 https://nvd.nist.gov/vuln/detail/CVE-2023-52355 https://gitlab.com/libtiff/libtiff/-/issues/621 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-52355.json https://access.redhat.com/errata/RHSA-2025:20801&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-15.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2tFr9TQJkcgsTrNAQX0kdw==&#34;: {&#xA;      &#34;id&#34;: &#34;2tFr9TQJkcgsTrNAQX0kdw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39319&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of \&#34;\u003cscript\&#34;, \&#34;\u003c!--\&#34;, and \&#34;\u003c/script\&#34; within JS literals in \u003cscript\u003e contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39319 https://bugzilla.redhat.com/show_bug.cgi?id=2237773 https://www.cve.org/CVERecord?id=CVE-2023-39319 https://nvd.nist.gov/vuln/detail/CVE-2023-39319 https://go.dev/cl/526157 https://go.dev/issue/62197 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2043.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39319.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2usQa32fSqIDVo0qKM7RFA==&#34;: {&#xA;      &#34;id&#34;: &#34;2usQa32fSqIDVo0qKM7RFA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-58190&#34;,&#xA;      &#34;description&#34;: &#34;The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) in an exposed go application if an attacker provides specially crafted HTML content.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T17:48:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-58190 https://bugzilla.redhat.com/show_bug.cgi?id=2437110 https://www.cve.org/CVERecord?id=CVE-2025-58190 https://nvd.nist.gov/vuln/detail/CVE-2025-58190 https://github.com/golang/vulndb/issues/4441 https://go.dev/cl/709875 https://groups.google.com/g/golang-announce/c/jnQcOYpiR2c https://pkg.go.dev/vuln/GO-2026-4441 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-58190.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2vdCDySzHer9qKv7EOUGqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;2vdCDySzHer9qKv7EOUGqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12085&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T15:06:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12085 https://bugzilla.redhat.com/show_bug.cgi?id=2330539 https://www.cve.org/CVERecord?id=CVE-2024-12085 https://nvd.nist.gov/vuln/detail/CVE-2024-12085 https://kb.cert.org/vuls/id/952657 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12085.json https://access.redhat.com/errata/RHSA-2025:0324&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.2.3-20.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2vidY7qxU0KDMpAzTaXQCw==&#34;: {&#xA;      &#34;id&#34;: &#34;2vidY7qxU0KDMpAzTaXQCw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29187&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw occurs due to Git not checking the ownership of directories in a local multi-user system when running commands specified in the local repository configuration. This issue allows the owner of the repository to cause arbitrary commands to be executed by other users who access the repository.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-29187 https://bugzilla.redhat.com/show_bug.cgi?id=2107439 https://www.cve.org/CVERecord?id=CVE-2022-29187 https://nvd.nist.gov/vuln/detail/CVE-2022-29187 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-29187.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2wnmmIxGcmTTQ7kdV4Q55Q==&#34;: {&#xA;      &#34;id&#34;: &#34;2wnmmIxGcmTTQ7kdV4Q55Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.2.8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;2y2LXrQ+Jdr+fioSazFF4w==&#34;: {&#xA;      &#34;id&#34;: &#34;2y2LXrQ+Jdr+fioSazFF4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-58183&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T22:10:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-58183 https://bugzilla.redhat.com/show_bug.cgi?id=2407258 https://www.cve.org/CVERecord?id=CVE-2025-58183 https://nvd.nist.gov/vuln/detail/CVE-2025-58183 https://go.dev/cl/709861 https://go.dev/issue/75677 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://pkg.go.dev/vuln/GO-2025-4014 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-58183.json https://access.redhat.com/errata/RHSA-2025:21815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.3-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3+pow+WXSexmxDv966vMqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;3+pow+WXSexmxDv966vMqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21716&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. An incomplete security fix allows code operating under restricted file system write permissions to bypass these limitations. This vulnerability enables the modification of file permissions and ownership on already-open files, even when explicit write access is denied. Such a bypass could lead to unauthorized changes to system files.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21716 https://bugzilla.redhat.com/show_bug.cgi?id=2453157 https://www.cve.org/CVERecord?id=CVE-2026-21716 https://nvd.nist.gov/vuln/detail/CVE-2026-21716 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21716.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;31lRdk8cNY+AWoLVxQqBUw==&#34;: {&#xA;      &#34;id&#34;: &#34;31lRdk8cNY+AWoLVxQqBUw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12797&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL&#39;s RFC7250 Raw Public Key (RPK) authentication. This vulnerability allows man-in-the-middle (MITM) attacks via failure to abort TLS/DTLS handshakes when the server&#39;s RPK does not match the expected key despite the SSL_VERIFY_PEER verification mode being set.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-11T15:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12797 https://bugzilla.redhat.com/show_bug.cgi?id=2342757 https://www.cve.org/CVERecord?id=CVE-2024-12797 https://nvd.nist.gov/vuln/detail/CVE-2024-12797 https://openssl-library.org/news/secadv/20250211.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12797.json https://access.redhat.com/errata/RHSA-2025:1330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;32PT0J5usgv3laBJ37g1fA==&#34;: {&#xA;      &#34;id&#34;: &#34;32PT0J5usgv3laBJ37g1fA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39615&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Libxml2, where it contains a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a denial of service (DoS) by supplying a crafted XML file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39615 https://bugzilla.redhat.com/show_bug.cgi?id=2235864 https://www.cve.org/CVERecord?id=CVE-2023-39615 https://nvd.nist.gov/vuln/detail/CVE-2023-39615 https://gitlab.gnome.org/GNOME/libxml2/-/issues/535 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39615.json https://access.redhat.com/errata/RHSA-2023:7747&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-5.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;34BcC5oWRD1/7/1kuocy1g==&#34;: {&#xA;      &#34;id&#34;: &#34;34BcC5oWRD1/7/1kuocy1g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55130&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55130 https://bugzilla.redhat.com/show_bug.cgi?id=2431352 https://www.cve.org/CVERecord?id=CVE-2025-55130 https://nvd.nist.gov/vuln/detail/CVE-2025-55130 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55130.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;372OESqFjEs8/4MHn0xr+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;372OESqFjEs8/4MHn0xr+Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libblkid-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;39KBEdrZX0FwGoQxYgkupQ==&#34;: {&#xA;      &#34;id&#34;: &#34;39KBEdrZX0FwGoQxYgkupQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23083&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js diagnostics_channel. This vulnerability allows an attacker to reinstate and misuse worker constructors, potentially bypassing the Permission Model via hooking into events when a worker thread is created.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T01:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23083 https://bugzilla.redhat.com/show_bug.cgi?id=2339392 https://www.cve.org/CVERecord?id=CVE-2025-23083 https://nvd.nist.gov/vuln/detail/CVE-2025-23083 https://nodejs.org/en/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23083.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.13.1-1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3A+d+ITPUBtAGX1jTlLhKg==&#34;: {&#xA;      &#34;id&#34;: &#34;3A+d+ITPUBtAGX1jTlLhKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6129&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in in the POLY1305 MAC (message authentication code) implementation in OpenSSL, affecting applications running on PowerPC CPU-based platforms that utilize vector instructions, and has the potential to corrupt the internal state of these applications. If an attacker can manipulate the utilization of the POLY1305 MAC algorithm, it may lead to the corruption of the application state, resulting in various application-dependent consequences, often resulting in a crash and leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6129 https://bugzilla.redhat.com/show_bug.cgi?id=2257571 https://www.cve.org/CVERecord?id=CVE-2023-6129 https://nvd.nist.gov/vuln/detail/CVE-2023-6129 https://www.openssl.org/news/secadv/20240109.txt https://www.openwall.com/lists/oss-security/2024/01/09/1 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6129.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3A/kVsDzDDwZXdM+JpfWlA==&#34;: {&#xA;      &#34;id&#34;: &#34;3A/kVsDzDDwZXdM+JpfWlA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32288&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s `archive/tar` package. A remote attacker could exploit this vulnerability by providing a maliciously-crafted archive file. When the `tar.Reader` processes an archive containing a large number of sparse regions in the \&#34;old GNU sparse map\&#34; format, it can lead to unbounded memory allocation. This can result in a Denial of Service (DoS) condition, making the affected application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32288 https://bugzilla.redhat.com/show_bug.cgi?id=2456332 https://www.cve.org/CVERecord?id=CVE-2026-32288 https://nvd.nist.gov/vuln/detail/CVE-2026-32288 https://go.dev/cl/763766 https://go.dev/issue/78301 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4869 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32288.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3AbYXrLwWtddQg0NqJQudw==&#34;: {&#xA;      &#34;id&#34;: &#34;3AbYXrLwWtddQg0NqJQudw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22020&#34;,&#xA;      &#34;description&#34;: &#34;No description is available for this CVE.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-21T20:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22020 https://bugzilla.redhat.com/show_bug.cgi?id=2460045 https://www.cve.org/CVERecord?id=CVE-2026-22020 https://nvd.nist.gov/vuln/detail/CVE-2026-22020 https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22020.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3BY1OD4rYtX6LEFO6X+/Yw==&#34;: {&#xA;      &#34;id&#34;: &#34;3BY1OD4rYtX6LEFO6X+/Yw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24329&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24329 https://bugzilla.redhat.com/show_bug.cgi?id=2173917 https://www.cve.org/CVERecord?id=CVE-2023-24329 https://nvd.nist.gov/vuln/detail/CVE-2023-24329 https://pointernull.com/security/python-url-parse-problem.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24329.json https://access.redhat.com/errata/RHSA-2023:3595&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.16-1.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3CUrg7YVjtx0L5aX+iMRxA==&#34;: {&#xA;      &#34;id&#34;: &#34;3CUrg7YVjtx0L5aX+iMRxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9287&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been found in the Python `venv` module and CLI. Path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \&#34;activation\&#34; scripts, for example, \&#34;source venv/bin/activate\&#34;. This flaw allows attacker-controlled virtual environments to run commands when the virtual environment is activated.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-10-22T16:34:39Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9287 https://bugzilla.redhat.com/show_bug.cgi?id=2321440 https://www.cve.org/CVERecord?id=CVE-2024-9287 https://nvd.nist.gov/vuln/detail/CVE-2024-9287 https://github.com/python/cpython/issues/124651 https://github.com/python/cpython/pull/124712 https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9287.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3D/COcmVFbxgINNliqKHgw==&#34;: {&#xA;      &#34;id&#34;: &#34;3D/COcmVFbxgINNliqKHgw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23916&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. A malicious server can insert an unlimited number of compression steps. This decompression chain could result in out-of-memory errors.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23916 https://bugzilla.redhat.com/show_bug.cgi?id=2167815 https://www.cve.org/CVERecord?id=CVE-2023-23916 https://nvd.nist.gov/vuln/detail/CVE-2023-23916 https://curl.se/docs/CVE-2023-23916.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23916.json https://access.redhat.com/errata/RHSA-2023:1701&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-19.el9_1.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3DJmtryLboz5D1RmZn6WTw==&#34;: {&#xA;      &#34;id&#34;: &#34;3DJmtryLboz5D1RmZn6WTw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8194&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python tarfile module. Processing a specially crafted tar archive, specifically an archive with negative offsets, can cause an infinite loop and deadlock. This issue results in a denial of service in the Python application using the tarfile module.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-28T18:42:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8194 https://bugzilla.redhat.com/show_bug.cgi?id=2384043 https://www.cve.org/CVERecord?id=CVE-2025-8194 https://nvd.nist.gov/vuln/detail/CVE-2025-8194 https://github.com/python/cpython/issues/130577 https://github.com/python/cpython/pull/137027 https://mail.python.org/archives/list/security-announce@python.org/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8194.json https://access.redhat.com/errata/RHSA-2025:15019&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3E/EPC1OcoKQToPb+efdaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;3E/EPC1OcoKQToPb+efdaQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3358&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL, where it incorrectly handles legacy custom ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other similarly named encryption and decryption initialization functions). Instead of using the custom cipher directly, it incorrectly tries to fetch an equivalent cipher from the available providers. An equivalent cipher is found based on the NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a given cipher. However, it is possible for an application to incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef is used this way, the OpenSSL encryption/decryption initialization function will match the NULL cipher as equivalent and fetch this from the available providers. This is successful if the default provider has been loaded (or if a third-party provider has been loaded that offers this cipher). Using the NULL cipher means that the plaintext is emitted as the ciphertext.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3358 https://bugzilla.redhat.com/show_bug.cgi?id=2134740 https://www.cve.org/CVERecord?id=CVE-2022-3358 https://nvd.nist.gov/vuln/detail/CVE-2022-3358 https://www.openssl.org/news/secadv/20221011.txt https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3358.json https://access.redhat.com/errata/RHSA-2023:2523&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-6.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3E5wmOETiTx03Y24iDJEUg==&#34;: {&#xA;      &#34;id&#34;: &#34;3E5wmOETiTx03Y24iDJEUg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22866&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-06T16:54:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22866 https://bugzilla.redhat.com/show_bug.cgi?id=2344219 https://www.cve.org/CVERecord?id=CVE-2025-22866 https://nvd.nist.gov/vuln/detail/CVE-2025-22866 https://go.dev/cl/643735 https://go.dev/issue/71383 https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k https://pkg.go.dev/vuln/GO-2025-3447 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22866.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3FdyvSRS+ECfT74KYiCcLA==&#34;: {&#xA;      &#34;id&#34;: &#34;3FdyvSRS+ECfT74KYiCcLA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-22490&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. Using a specially-crafted repository, Git can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source $GIT_DIR/objects directory contains symbolic links (CVE-2022-39253), the objects directory may still be a symbolic link.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-22490 https://bugzilla.redhat.com/show_bug.cgi?id=2168160 https://www.cve.org/CVERecord?id=CVE-2023-22490 https://nvd.nist.gov/vuln/detail/CVE-2023-22490 https://github.blog/2023-02-14-git-security-vulnerabilities-announced-3/ https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-22490.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3FpQibjt3OzhrwoSJ9I0Mg==&#34;: {&#xA;      &#34;id&#34;: &#34;3FpQibjt3OzhrwoSJ9I0Mg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3KVKKCxdWl+iCbo/o6cUCw==&#34;: {&#xA;      &#34;id&#34;: &#34;3KVKKCxdWl+iCbo/o6cUCw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61984&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH where control characters in usernames were not properly validated when sourced from untrusted inputs like the command line or configuration expansion. If a ProxyCommand is used, these control characters could modify command behavior, potentially leading to code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61984 https://bugzilla.redhat.com/show_bug.cgi?id=2401960 https://www.cve.org/CVERecord?id=CVE-2025-61984 https://nvd.nist.gov/vuln/detail/CVE-2025-61984 https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2 https://www.openssh.com/releasenotes.html#10.1p1 https://www.openwall.com/lists/oss-security/2025/10/06/1 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61984.json https://access.redhat.com/errata/RHSA-2025:23480&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-47.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3Lvdmj//2sze9S8I3n8yrw==&#34;: {&#xA;      &#34;id&#34;: &#34;3Lvdmj//2sze9S8I3n8yrw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0288&#34;,&#xA;      &#34;description&#34;: &#34;Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1189.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0288 https://bugzilla.redhat.com/show_bug.cgi?id=2163130 https://www.cve.org/CVERecord?id=CVE-2023-0288 https://nvd.nist.gov/vuln/detail/CVE-2023-0288 https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0288.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3NsOBlWsKnPW4267fh2nUA==&#34;: {&#xA;      &#34;id&#34;: &#34;3NsOBlWsKnPW4267fh2nUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5914&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5914 https://bugzilla.redhat.com/show_bug.cgi?id=2370861 https://www.cve.org/CVERecord?id=CVE-2025-5914 https://nvd.nist.gov/vuln/detail/CVE-2025-5914 https://github.com/libarchive/libarchive/pull/2598 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5914.json https://access.redhat.com/errata/RHSA-2025:14130&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bsdtar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-6.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3O4R28kD2w0Acw7XQvAZ3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;3O4R28kD2w0Acw7XQvAZ3Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-interpreter&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;4:5.32.1-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3R40oInfBrzPyywU8VZGOA==&#34;: {&#xA;      &#34;id&#34;: &#34;3R40oInfBrzPyywU8VZGOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61985&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH where the SSH client accepted \\0 (null) characters in ssh:// URIs. When a ProxyCommand is configured, these characters could alter how the command is parsed, potentially leading to code execution depending on how the proxy is set up.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61985 https://bugzilla.redhat.com/show_bug.cgi?id=2401962 https://www.cve.org/CVERecord?id=CVE-2025-61985 https://nvd.nist.gov/vuln/detail/CVE-2025-61985 https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2 https://www.openssh.com/releasenotes.html#10.1p1 https://www.openwall.com/lists/oss-security/2025/10/06/1 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61985.json https://access.redhat.com/errata/RHSA-2025:23480&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-47.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3S91ZYwiienVlUnFeIzkRw==&#34;: {&#xA;      &#34;id&#34;: &#34;3S91ZYwiienVlUnFeIzkRw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8941&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a \&#34;complete\&#34; fix for CVE-2025-6020.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8941 https://bugzilla.redhat.com/show_bug.cgi?id=2388220 https://www.cve.org/CVERecord?id=CVE-2025-8941 https://nvd.nist.gov/vuln/detail/CVE-2025-8941 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8941.json https://access.redhat.com/errata/RHSA-2025:15099&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.5.1-26.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3UFdmogC8LxBJ8vh97CLKg==&#34;: {&#xA;      &#34;id&#34;: &#34;3UFdmogC8LxBJ8vh97CLKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33812&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang.org/x/image. A remote attacker could exploit this vulnerability by providing a specially crafted font file. Parsing this malicious file can lead to excessive memory allocation, which may result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-21T19:21:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33812 https://bugzilla.redhat.com/show_bug.cgi?id=2460227 https://www.cve.org/CVERecord?id=CVE-2026-33812 https://nvd.nist.gov/vuln/detail/CVE-2026-33812 https://go.dev/cl/761180 https://go.dev/issue/78382 https://pkg.go.dev/vuln/GO-2026-4962 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33812.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;: {&#xA;      &#34;id&#34;: &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3783&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3783 https://bugzilla.redhat.com/show_bug.cgi?id=2446450 https://www.cve.org/CVERecord?id=CVE-2026-3783 https://nvd.nist.gov/vuln/detail/CVE-2026-3783 http://www.openwall.com/lists/oss-security/2026/03/11/2 https://curl.se/docs/CVE-2026-3783.html https://curl.se/docs/CVE-2026-3783.json https://hackerone.com/reports/3583983 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3783.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3WRC4Vl08/leTJ1MFHuCEg==&#34;: {&#xA;      &#34;id&#34;: &#34;3WRC4Vl08/leTJ1MFHuCEg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3297&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free vulnerability was found in Vim&#39;s process_next_cpt_value() function of the src/insexpand.c file. This flaw occurs due to the usage of freed memory when &#39;tagfunc&#39; wipes out the buffer that holds &#39;complete.&#39; This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free issue that causes an application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3297 https://bugzilla.redhat.com/show_bug.cgi?id=2129838 https://www.cve.org/CVERecord?id=CVE-2022-3297 https://nvd.nist.gov/vuln/detail/CVE-2022-3297 https://huntr.dev/bounties/1aa9ec92-0355-4710-bf85-5bce9effa01c https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3297.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3XIBdvUrBg0m5KBpdJCHaA==&#34;: {&#xA;      &#34;id&#34;: &#34;3XIBdvUrBg0m5KBpdJCHaA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21710&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21710 https://bugzilla.redhat.com/show_bug.cgi?id=2453151 https://www.cve.org/CVERecord?id=CVE-2026-21710 https://nvd.nist.gov/vuln/detail/CVE-2026-21710 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21710.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3a2lYBlaR2GDen/lmTlCyg==&#34;: {&#xA;      &#34;id&#34;: &#34;3a2lYBlaR2GDen/lmTlCyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici package for Node.js. Undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If an app has a mechanism that sends multipart requests to an attacker-controlled website, it can leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T17:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22150 https://bugzilla.redhat.com/show_bug.cgi?id=2339176 https://www.cve.org/CVERecord?id=CVE-2025-22150 https://nvd.nist.gov/vuln/detail/CVE-2025-22150 https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113 https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0 https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385 https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975 https://hackerone.com/reports/2913312 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22150.json https://access.redhat.com/errata/RHSA-2025:1443&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.18.2-1.module+el9.5.0+22758+4ad2c198&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3bb0a18NQSPWO0aeq9twVw==&#34;: {&#xA;      &#34;id&#34;: &#34;3bb0a18NQSPWO0aeq9twVw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3cVM/UH6o+8G2FMQ1Gl/Ww==&#34;: {&#xA;      &#34;id&#34;: &#34;3cVM/UH6o+8G2FMQ1Gl/Ww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4603&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use the EVP_PKEY_param_check() or EVP_PKEY_public_check() function to check a DSA public key or DSA parameters may experience long delays when checking excessively long DSA keys or parameters.  In applications that allow untrusted sources to provide the key or parameters that are checked, an attacker may be able to cause a denial of service. These functions are not called by OpenSSL on untrusted DSA keys. The applications that directly call these functions are the ones that may be vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4603 https://bugzilla.redhat.com/show_bug.cgi?id=2281029 https://www.cve.org/CVERecord?id=CVE-2024-4603 https://nvd.nist.gov/vuln/detail/CVE-2024-4603 https://www.openssl.org/news/secadv/20240516.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4603.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3ehQjUp3PMzo2i+ZXMC7RA==&#34;: {&#xA;      &#34;id&#34;: &#34;3ehQjUp3PMzo2i+ZXMC7RA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3f5N5l71YgnMV/U9whrIuA==&#34;: {&#xA;      &#34;id&#34;: &#34;3f5N5l71YgnMV/U9whrIuA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0803&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds write in the extractContigSamplesShifted16bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited data modification.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0803 https://bugzilla.redhat.com/show_bug.cgi?id=2170187 https://www.cve.org/CVERecord?id=CVE-2023-0803 https://nvd.nist.gov/vuln/detail/CVE-2023-0803 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0803.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3k2lNJd2kR3VB6gGhj547g==&#34;: {&#xA;      &#34;id&#34;: &#34;3k2lNJd2kR3VB6gGhj547g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-c++&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3skSbDjTQ02+eNiFJz716g==&#34;: {&#xA;      &#34;id&#34;: &#34;3skSbDjTQ02+eNiFJz716g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45143&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Undici node package due to the occurrence of Cross-origin requests, possibly leading to a cookie header leakage. By default, cookie headers are forbidden request headers, and they must be enabled. This flaw allows a malicious user to access this leaked cookie if they have control of the redirection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45143 https://bugzilla.redhat.com/show_bug.cgi?id=2244104 https://www.cve.org/CVERecord?id=CVE-2023-45143 https://nvd.nist.gov/vuln/detail/CVE-2023-45143 https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45143.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3w8o+aWAdmG4VgeVZcWXSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;3w8o+aWAdmG4VgeVZcWXSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47906&#34;,&#xA;      &#34;description&#34;: &#34;A path handling flaw has been discovered in the os/exec go package. If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\&#34;\&#34;, \&#34;.\&#34;, and \&#34;..\&#34;), can result in the binaries listed in the PATH being unexpectedly returned.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-18T18:41:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47906 https://bugzilla.redhat.com/show_bug.cgi?id=2396546 https://www.cve.org/CVERecord?id=CVE-2025-47906 https://nvd.nist.gov/vuln/detail/CVE-2025-47906 https://go.dev/cl/691775 https://go.dev/issue/74466 https://groups.google.com/g/golang-announce/c/x5MKroML2yM https://pkg.go.dev/vuln/GO-2025-3956 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47906.json https://access.redhat.com/errata/RHSA-2025:13935&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.6-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3wP/Eggf7Bu35MpzNr1Fog==&#34;: {&#xA;      &#34;id&#34;: &#34;3wP/Eggf7Bu35MpzNr1Fog==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-31498&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This vulnerability allows a remote or local attacker to cause a use-after-free, potentially leading to application-level denial of service or other unexpected behavior via manipulation of DNS responses or network conditions during query processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T13:53:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-31498 https://bugzilla.redhat.com/show_bug.cgi?id=2358271 https://www.cve.org/CVERecord?id=CVE-2025-31498 https://nvd.nist.gov/vuln/detail/CVE-2025-31498 https://github.com/c-ares/c-ares/commit/29d38719112639d8c0ba910254a3dd4f482ea2d1 https://github.com/c-ares/c-ares/pull/821 https://github.com/c-ares/c-ares/security/advisories/GHSA-6hxc-62jh-p29v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-31498.json https://access.redhat.com/errata/RHSA-2025:7433&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.15.0-1.module+el9.6.0+23062+9e7801b9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3wYf+EaP3IAW5wHFWATuaw==&#34;: {&#xA;      &#34;id&#34;: &#34;3wYf+EaP3IAW5wHFWATuaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32067&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32067 https://bugzilla.redhat.com/show_bug.cgi?id=2209502 https://www.cve.org/CVERecord?id=CVE-2023-32067 https://nvd.nist.gov/vuln/detail/CVE-2023-32067 https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32067.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3wnJ6TxCGJITikNK4m6q+g==&#34;: {&#xA;      &#34;id&#34;: &#34;3wnJ6TxCGJITikNK4m6q+g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4330&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython&#39;s tarfile module. This vulnerability allows bypassing of extraction filters, enabling symlink traversal outside the intended extraction directory and potential modification of file metadata via malicious tar archives using TarFile.extractall() or TarFile.extract() with the filter=\&#34;data\&#34; or filter=\&#34;tar\&#34; parameters. This issue leads to potentially overwriting or modifying system files and metadata.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:58:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4330 https://bugzilla.redhat.com/show_bug.cgi?id=2370014 https://www.cve.org/CVERecord?id=CVE-2025-4330 https://nvd.nist.gov/vuln/detail/CVE-2025-4330 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4330.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3xBuQnj5DELjtk3GymuBTw==&#34;: {&#xA;      &#34;id&#34;: &#34;3xBuQnj5DELjtk3GymuBTw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;3yaDBYST3GIWj+F89QlkNw==&#34;: {&#xA;      &#34;id&#34;: &#34;3yaDBYST3GIWj+F89QlkNw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-26T01:07:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27904 https://bugzilla.redhat.com/show_bug.cgi?id=2442922 https://www.cve.org/CVERecord?id=CVE-2026-27904 https://nvd.nist.gov/vuln/detail/CVE-2026-27904 https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27904.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;: {&#xA;      &#34;id&#34;: &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;43uaBOp3I4s6BbwM75Dtcg==&#34;: {&#xA;      &#34;id&#34;: &#34;43uaBOp3I4s6BbwM75Dtcg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25629&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25629 https://bugzilla.redhat.com/show_bug.cgi?id=2265713 https://www.cve.org/CVERecord?id=CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629 https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25629.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;49jEi4xCgfg8T8qzhNobIA==&#34;: {&#xA;      &#34;id&#34;: &#34;49jEi4xCgfg8T8qzhNobIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21891&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwritten with user-defined implementations, leading to a filesystem permission model bypass through a path traversal attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21891 https://bugzilla.redhat.com/show_bug.cgi?id=2265720 https://www.cve.org/CVERecord?id=CVE-2024-21891 https://nvd.nist.gov/vuln/detail/CVE-2024-21891 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21891.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4CRDu/yV+Tfg3mSUobPIUg==&#34;: {&#xA;      &#34;id&#34;: &#34;4CRDu/yV+Tfg3mSUobPIUg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4Gs7xCHPPMrNepkQNCPnkg==&#34;: {&#xA;      &#34;id&#34;: &#34;4Gs7xCHPPMrNepkQNCPnkg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23946&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security issue occurs when feeding a crafted input to \&#34;git apply.\&#34; A path outside the working tree can be overwritten by the user running \&#34;git apply.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23946 https://bugzilla.redhat.com/show_bug.cgi?id=2168161 https://www.cve.org/CVERecord?id=CVE-2023-23946 https://nvd.nist.gov/vuln/detail/CVE-2023-23946 https://github.blog/2023-02-14-git-security-vulnerabilities-announced-3/ https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23946.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4H2TsDPy1XcHidTqNqeZpg==&#34;: {&#xA;      &#34;id&#34;: &#34;4H2TsDPy1XcHidTqNqeZpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4519&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The `webbrowser.open()` API, used to launch web browsers, does not properly sanitize input. This allows a remote attacker to craft a malicious URL containing leading dashes. When such a URL is opened, certain web browsers may interpret these dashes as command-line options, which could lead to unexpected behavior, information disclosure, or potentially arbitrary code execution, impacting the integrity of the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T15:08:32Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4519 https://bugzilla.redhat.com/show_bug.cgi?id=2449649 https://www.cve.org/CVERecord?id=CVE-2026-4519 https://nvd.nist.gov/vuln/detail/CVE-2026-4519 https://github.com/python/cpython/issues/143930 https://github.com/python/cpython/pull/143931 https://mail.python.org/archives/list/security-announce@python.org/thread/AY5NDSS433JK56Q7Q5IS7B37QFZVVOUS/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4519.json https://access.redhat.com/errata/RHSA-2026:6766&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4Ir8FDWM4WPrO3dybbfnYQ==&#34;: {&#xA;      &#34;id&#34;: &#34;4Ir8FDWM4WPrO3dybbfnYQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13837&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the plistlib module in the Python standard library. The amount of data to read from a Plist file is specified in the file itself. This issue allows a specially crafted Plist file to cause an application to allocate a large amount of memory, potentially resulting in allocations errors, swapping, out-of-memory conditions or even system freezes.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-01T18:13:32Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13837 https://bugzilla.redhat.com/show_bug.cgi?id=2418084 https://www.cve.org/CVERecord?id=CVE-2025-13837 https://nvd.nist.gov/vuln/detail/CVE-2025-13837 https://github.com/python/cpython/issues/119342 https://github.com/python/cpython/pull/119343 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13837.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4IznDha57aCNWoI0Hc828Q==&#34;: {&#xA;      &#34;id&#34;: &#34;4IznDha57aCNWoI0Hc828Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4JIGhO7+fAz+LPTFEuBHUg==&#34;: {&#xA;      &#34;id&#34;: &#34;4JIGhO7+fAz+LPTFEuBHUg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24329&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24329 https://bugzilla.redhat.com/show_bug.cgi?id=2173917 https://www.cve.org/CVERecord?id=CVE-2023-24329 https://nvd.nist.gov/vuln/detail/CVE-2023-24329 https://pointernull.com/security/python-url-parse-problem.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24329.json https://access.redhat.com/errata/RHSA-2023:3595&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.16-1.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4Jo5xwEh2K91Sr9xMmwzcw==&#34;: {&#xA;      &#34;id&#34;: &#34;4Jo5xwEh2K91Sr9xMmwzcw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25547&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-04T21:51:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25547 https://bugzilla.redhat.com/show_bug.cgi?id=2436942 https://www.cve.org/CVERecord?id=CVE-2026-25547 https://nvd.nist.gov/vuln/detail/CVE-2026-25547 https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25547.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4JsZIRvQ+13IMgBIUPH0jA==&#34;: {&#xA;      &#34;id&#34;: &#34;4JsZIRvQ+13IMgBIUPH0jA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7008&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222672 https://www.cve.org/CVERecord?id=CVE-2023-7008 https://nvd.nist.gov/vuln/detail/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222261 https://github.com/systemd/systemd/issues/25676 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7008.json https://access.redhat.com/errata/RHSA-2024:2463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-32.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4K1RYkumn7qw6Pk7lwpfbA==&#34;: {&#xA;      &#34;id&#34;: &#34;4K1RYkumn7qw6Pk7lwpfbA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-11168&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The `urllib.parse.urlsplit()` and `urlparse()` functions improperly validated bracketed hosts (`[]`), allowing hosts that weren&#39;t IPv6 or IPvFuture compliant. This behavior was not conformant to RFC 3986 and was potentially vulnerable to server-side request forgery (SSRF) if a URL is processed by more than one URL parser.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-12T21:22:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-11168 https://bugzilla.redhat.com/show_bug.cgi?id=2325776 https://www.cve.org/CVERecord?id=CVE-2024-11168 https://nvd.nist.gov/vuln/detail/CVE-2024-11168 https://github.com/python/cpython/commit/29f348e232e82938ba2165843c448c2b291504c5 https://github.com/python/cpython/commit/b2171a2fd41416cf68afd67460578631d755a550 https://github.com/python/cpython/issues/103848 https://github.com/python/cpython/pull/103849 https://mail.python.org/archives/list/security-announce@python.org/thread/XPWB6XVZ5G5KGEI63M4AWLIEUF5BPH4T/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11168.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4K4SQ2PlDqXihbvwEXiB/w==&#34;: {&#xA;      &#34;id&#34;: &#34;4K4SQ2PlDqXihbvwEXiB/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3618&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3618 https://bugzilla.redhat.com/show_bug.cgi?id=2215865 https://www.cve.org/CVERecord?id=CVE-2023-3618 https://nvd.nist.gov/vuln/detail/CVE-2023-3618 https://gitlab.com/libtiff/libtiff/-/issues/529 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3618.json https://access.redhat.com/errata/RHSA-2024:2289&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-12.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4K7cGcsZltSw5Ayu8+A5rA==&#34;: {&#xA;      &#34;id&#34;: &#34;4K7cGcsZltSw5Ayu8+A5rA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2731&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference flaw was found in Libtiff&#39;s LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2731 https://bugzilla.redhat.com/show_bug.cgi?id=2207635 https://www.cve.org/CVERecord?id=CVE-2023-2731 https://nvd.nist.gov/vuln/detail/CVE-2023-2731 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2731.json https://access.redhat.com/errata/RHSA-2023:6575&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4L3dk768qs7Sg3jWyr+5Ug==&#34;: {&#xA;      &#34;id&#34;: &#34;4L3dk768qs7Sg3jWyr+5Ug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4LZWGm07jnOHHBGX2FzAwg==&#34;: {&#xA;      &#34;id&#34;: &#34;4LZWGm07jnOHHBGX2FzAwg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1153&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-10T19:00:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1153 https://bugzilla.redhat.com/show_bug.cgi?id=2344743 https://www.cve.org/CVERecord?id=CVE-2025-1153 https://nvd.nist.gov/vuln/detail/CVE-2025-1153 https://sourceware.org/bugzilla/show_bug.cgi?id=32603 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150 https://vuldb.com/?ctiid.295057 https://vuldb.com/?id.295057 https://vuldb.com/?submit.489991 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1153.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4MoaZecth+9t4X3jdykhZg==&#34;: {&#xA;      &#34;id&#34;: &#34;4MoaZecth+9t4X3jdykhZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43789&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43789 https://bugzilla.redhat.com/show_bug.cgi?id=2242249 https://www.cve.org/CVERecord?id=CVE-2023-43789 https://nvd.nist.gov/vuln/detail/CVE-2023-43789 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43789.json https://access.redhat.com/errata/RHSA-2024:2146&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libXpm-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.13-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4N3POA/rTFsL9RdGINkq1A==&#34;: {&#xA;      &#34;id&#34;: &#34;4N3POA/rTFsL9RdGINkq1A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js due to a lack of safeguards on chunk extension bytes. The server may read an unbounded number of bytes from a single connection, which can allow an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22019 https://bugzilla.redhat.com/show_bug.cgi?id=2264574 https://www.cve.org/CVERecord?id=CVE-2024-22019 https://nvd.nist.gov/vuln/detail/CVE-2024-22019 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22019.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4Oz54fEBFyAJBdTJ/p2wxA==&#34;: {&#xA;      &#34;id&#34;: &#34;4Oz54fEBFyAJBdTJ/p2wxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2236&#34;,&#xA;      &#34;description&#34;: &#34;A timing-based side-channel flaw was found in libgcrypt&#39;s RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2236 https://bugzilla.redhat.com/show_bug.cgi?id=2245218 https://www.cve.org/CVERecord?id=CVE-2024-2236 https://nvd.nist.gov/vuln/detail/CVE-2024-2236 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2236.json https://access.redhat.com/errata/RHSA-2024:9404&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.10.0-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4PIM0/eLiUwExdFACTKEEw==&#34;: {&#xA;      &#34;id&#34;: &#34;4PIM0/eLiUwExdFACTKEEw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32281&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s `crypto/x509` package. A remote attacker could exploit this by presenting a specially crafted certificate chain containing a large number of policy mappings. This inefficient validation process consumes excessive resources, which can lead to a denial of service (DoS) for applications or systems performing certificate validation.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32281 https://bugzilla.redhat.com/show_bug.cgi?id=2456333 https://www.cve.org/CVERecord?id=CVE-2026-32281 https://nvd.nist.gov/vuln/detail/CVE-2026-32281 https://go.dev/cl/758061 https://go.dev/issue/78281 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4946 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32281.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4PW1pGs0HJlG6XNR1xk0ZA==&#34;: {&#xA;      &#34;id&#34;: &#34;4PW1pGs0HJlG6XNR1xk0ZA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-3447&#34;,&#xA;      &#34;description&#34;: &#34;Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-06T16:38:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/643735 https://go.dev/issue/71383 https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.22.12&#34;&#xA;    },&#xA;    &#34;4PXcy6CSX2EaPwYEdLkfbw==&#34;: {&#xA;      &#34;id&#34;: &#34;4PXcy6CSX2EaPwYEdLkfbw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28322&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free flaw was found in the Curl package. This issue may lead to unintended information disclosure by the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28322 https://bugzilla.redhat.com/show_bug.cgi?id=2196793 https://www.cve.org/CVERecord?id=CVE-2023-28322 https://nvd.nist.gov/vuln/detail/CVE-2023-28322 https://curl.se/docs/CVE-2023-28322.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28322.json https://access.redhat.com/errata/RHSA-2023:4354&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4QiWtYafAt/cFOvYpyJONw==&#34;: {&#xA;      &#34;id&#34;: &#34;4QiWtYafAt/cFOvYpyJONw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4RaJ63cwUpp+QWj0IKysEw==&#34;: {&#xA;      &#34;id&#34;: &#34;4RaJ63cwUpp+QWj0IKysEw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38545&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \&#34;let the host resolve the name\&#34; could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38545 https://bugzilla.redhat.com/show_bug.cgi?id=2241933 https://www.cve.org/CVERecord?id=CVE-2023-38545 https://nvd.nist.gov/vuln/detail/CVE-2023-38545 https://curl.se/docs/CVE-2023-38545.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38545.json https://access.redhat.com/errata/RHSA-2023:6745&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4TUE8wYBdfhOKrJqWCYBNg==&#34;: {&#xA;      &#34;id&#34;: &#34;4TUE8wYBdfhOKrJqWCYBNg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66293&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read vulnerability has been discovered in libpng. This vulnerability is in libpng&#39;s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng&#39;s internal state management.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-03T20:33:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66293 https://bugzilla.redhat.com/show_bug.cgi?id=2418711 https://www.cve.org/CVERecord?id=CVE-2025-66293 https://nvd.nist.gov/vuln/detail/CVE-2025-66293 https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1 https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a https://github.com/pnggroup/libpng/issues/764 https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66293.json https://access.redhat.com/errata/RHSA-2026:0238&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4TbG63vud59mo+N/aCOqpg==&#34;: {&#xA;      &#34;id&#34;: &#34;4TbG63vud59mo+N/aCOqpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15367&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the poplib module in the Python standard library. The poplib module does not reject control characters, such as newlines, in user-controlled input passed to POP3 commands. This issue allows an attacker to inject additional commands to be executed in the POP3 server.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:47:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15367 https://bugzilla.redhat.com/show_bug.cgi?id=2431373 https://www.cve.org/CVERecord?id=CVE-2025-15367 https://nvd.nist.gov/vuln/detail/CVE-2025-15367 https://github.com/python/cpython/issues/143923 https://github.com/python/cpython/pull/143924 https://mail.python.org/archives/list/security-announce@python.org/thread/CBFBOWVGGUJFSGITQCCBZS4GEYYZ7ZNE/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15367.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4Uca8szOo7gGoVgv+DjeUA==&#34;: {&#xA;      &#34;id&#34;: &#34;4Uca8szOo7gGoVgv+DjeUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4Utc/6C5f6+A3gsr9KU/IA==&#34;: {&#xA;      &#34;id&#34;: &#34;4Utc/6C5f6+A3gsr9KU/IA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25881&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25881 https://bugzilla.redhat.com/show_bug.cgi?id=2165824 https://www.cve.org/CVERecord?id=CVE-2022-25881 https://nvd.nist.gov/vuln/detail/CVE-2022-25881 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25881.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4WgtH2AC4w3jDaPCHFqEaw==&#34;: {&#xA;      &#34;id&#34;: &#34;4WgtH2AC4w3jDaPCHFqEaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11494&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the GNU Binutils package. The impacted function is _bfd_x86_elf_late_size_sections of the file bfd/elfxx-x86.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-08T19:32:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11494 https://bugzilla.redhat.com/show_bug.cgi?id=2402559 https://www.cve.org/CVERecord?id=CVE-2025-11494 https://nvd.nist.gov/vuln/detail/CVE-2025-11494 https://sourceware.org/bugzilla/attachment.cgi?id=16389 https://sourceware.org/bugzilla/show_bug.cgi?id=33499 https://sourceware.org/bugzilla/show_bug.cgi?id=33499#c2 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a https://vuldb.com/?ctiid.327619 https://vuldb.com/?id.327619 https://vuldb.com/?submit.668281 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11494.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4XOA2zoAqaqRnsk9Cc57Xw==&#34;: {&#xA;      &#34;id&#34;: &#34;4XOA2zoAqaqRnsk9Cc57Xw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4YMcCEsfWO5KpctoAqwrFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;4YMcCEsfWO5KpctoAqwrFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-24928&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a stack-based buffer overflow via DTD validation of an untrusted document or untrusted DTD.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-24928 https://bugzilla.redhat.com/show_bug.cgi?id=2346421 https://www.cve.org/CVERecord?id=CVE-2025-24928 https://nvd.nist.gov/vuln/detail/CVE-2025-24928 https://gitlab.gnome.org/GNOME/libxml2/-/issues/847 https://issues.oss-fuzz.com/issues/392687022 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-24928.json https://access.redhat.com/errata/RHSA-2025:2679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_5.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4ZTG400o6y5du1mo17bLtg==&#34;: {&#xA;      &#34;id&#34;: &#34;4ZTG400o6y5du1mo17bLtg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2581&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Undici. When the `interceptors.deduplicate()` feature is enabled, response data for deduplicated requests can accumulate in memory. A remote attacker, by sending large or chunked responses and concurrent identical requests from an untrusted endpoint, can exploit this uncontrolled resource consumption. This leads to high memory usage and potential Out-Of-Memory (OOM) process termination, resulting in a Denial of Service (DoS) for the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:13:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2581 https://bugzilla.redhat.com/show_bug.cgi?id=2447140 https://www.cve.org/CVERecord?id=CVE-2026-2581 https://nvd.nist.gov/vuln/detail/CVE-2026-2581 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h https://hackerone.com/reports/3513473 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2581.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4ZcrBE+d85+98j2eHMpVTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;4ZcrBE+d85+98j2eHMpVTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27139&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal flaw has been discovered in the golang `os` module. On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:28:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27139 https://bugzilla.redhat.com/show_bug.cgi?id=2445335 https://www.cve.org/CVERecord?id=CVE-2026-27139 https://nvd.nist.gov/vuln/detail/CVE-2026-27139 https://go.dev/cl/749480 https://go.dev/issue/77827 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://pkg.go.dev/vuln/GO-2026-4602 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27139.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4aR9t5J6YwMk5D9wZ0BV7w==&#34;: {&#xA;      &#34;id&#34;: &#34;4aR9t5J6YwMk5D9wZ0BV7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-3651&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the python-idna library. A malicious argument was sent to the idna.encode() function can trigger an uncontrolled resource consumption, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-3651 https://bugzilla.redhat.com/show_bug.cgi?id=2274779 https://www.cve.org/CVERecord?id=CVE-2024-3651 https://nvd.nist.gov/vuln/detail/CVE-2024-3651 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-3651.json https://access.redhat.com/errata/RHSA-2024:3846&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-idna&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.10-7.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4buHU7VwQZ104Kjv/TKwDg==&#34;: {&#xA;      &#34;id&#34;: &#34;4buHU7VwQZ104Kjv/TKwDg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26996&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-20T03:05:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26996 https://bugzilla.redhat.com/show_bug.cgi?id=2441268 https://www.cve.org/CVERecord?id=CVE-2026-26996 https://nvd.nist.gov/vuln/detail/CVE-2026-26996 https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26996.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4comqU/5SRuDKC1qqBMlGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;4comqU/5SRuDKC1qqBMlGQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-24765&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw occurs due to Git not checking the ownership of directories in a local multi-user system when running commands specified in the local repository configuration.  This allows the owner of the repository to cause arbitrary commands to be executed by other users who access the repository.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-04-12T10:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-24765 https://bugzilla.redhat.com/show_bug.cgi?id=2073414 https://www.cve.org/CVERecord?id=CVE-2022-24765 https://nvd.nist.gov/vuln/detail/CVE-2022-24765 https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-24765.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4eh40PtMaL3JhPlCzb+8jA==&#34;: {&#xA;      &#34;id&#34;: &#34;4eh40PtMaL3JhPlCzb+8jA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici package for Node.js. Undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If an app has a mechanism that sends multipart requests to an attacker-controlled website, it can leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T17:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22150 https://bugzilla.redhat.com/show_bug.cgi?id=2339176 https://www.cve.org/CVERecord?id=CVE-2025-22150 https://nvd.nist.gov/vuln/detail/CVE-2025-22150 https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113 https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0 https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385 https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975 https://hackerone.com/reports/2913312 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22150.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.2-1.22.13.1.1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4evfzAbeD7HXRBHHbDpAwA==&#34;: {&#xA;      &#34;id&#34;: &#34;4evfzAbeD7HXRBHHbDpAwA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1878&#34;,&#xA;      &#34;description&#34;: &#34;Insufficient sanitization of Host header in net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-11T19:19:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/60374 https://go.dev/cl/506996 https://groups.google.com/g/golang-announce/c/2q13H6LEEx0&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.11&#34;&#xA;    },&#xA;    &#34;4gO4ls/gy0nmsC3NeXvyVQ==&#34;: {&#xA;      &#34;id&#34;: &#34;4gO4ls/gy0nmsC3NeXvyVQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-IO&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.43-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4hX2FW/Yj9HDbKRBqrhgdg==&#34;: {&#xA;      &#34;id&#34;: &#34;4hX2FW/Yj9HDbKRBqrhgdg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-56171&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a use-after-free via a crafted XML document validated against an XML schema with certain identity constraints or a crafted XML schema.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-56171 https://bugzilla.redhat.com/show_bug.cgi?id=2346416 https://www.cve.org/CVERecord?id=CVE-2024-56171 https://nvd.nist.gov/vuln/detail/CVE-2024-56171 https://gitlab.gnome.org/GNOME/libxml2/-/issues/828 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-56171.json https://access.redhat.com/errata/RHSA-2025:2679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_5.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4i2XUvSeC6zka4yp7MoBfg==&#34;: {&#xA;      &#34;id&#34;: &#34;4i2XUvSeC6zka4yp7MoBfg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6020 https://bugzilla.redhat.com/show_bug.cgi?id=2372512 https://www.cve.org/CVERecord?id=CVE-2025-6020 https://nvd.nist.gov/vuln/detail/CVE-2025-6020 https://github.com/linux-pam/linux-pam/security/advisories/GHSA-f9p8-gjr4-j9gx https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6020.json https://access.redhat.com/errata/RHSA-2025:9526&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.5.1-25.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4iFNln+X4k0SeUiw/ueLUA==&#34;: {&#xA;      &#34;id&#34;: &#34;4iFNln+X4k0SeUiw/ueLUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24784&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s net/mail standard library package. The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions made by programs using different parsers.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24784 https://bugzilla.redhat.com/show_bug.cgi?id=2268021 https://www.cve.org/CVERecord?id=CVE-2024-24784 https://nvd.nist.gov/vuln/detail/CVE-2024-24784 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24784.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4ifTGHhVbtDPeqLwYDVyJA==&#34;: {&#xA;      &#34;id&#34;: &#34;4ifTGHhVbtDPeqLwYDVyJA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4341&#34;,&#xA;      &#34;description&#34;: &#34;Memory exhaustion in query parameter parsing in net/url&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:08:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/736712 https://go.dev/issue/77101 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.12&#34;&#xA;    },&#xA;    &#34;4jKXN+o/0vyACgd6hmLCbw==&#34;: {&#xA;      &#34;id&#34;: &#34;4jKXN+o/0vyACgd6hmLCbw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-4009&#34;,&#xA;      &#34;description&#34;: &#34;Quadratic complexity when parsing some invalid inputs in encoding/pem&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T21:49:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/75676 https://go.dev/cl/709858 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.8&#34;&#xA;    },&#xA;    &#34;4n9Ikrh9k/dcuFfUsd+cxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;4n9Ikrh9k/dcuFfUsd+cxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-17095&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in LibTIFF, where a heap-based buffer overflow in the pal2rgb function in tools/pal2rgb.c can lead to a denial of service, a remote attacker could exploit this flaw by persuading a victim to open a specially crafted file, causing the application to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2017-11-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2017-17095 https://bugzilla.redhat.com/show_bug.cgi?id=1524284 https://www.cve.org/CVERecord?id=CVE-2017-17095 https://nvd.nist.gov/vuln/detail/CVE-2017-17095 https://security.access.redhat.com/data/csaf/v2/vex/2017/cve-2017-17095.json https://access.redhat.com/errata/RHSA-2023:6575&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4os+HU28VQ7buZvoEKQ/kg==&#34;: {&#xA;      &#34;id&#34;: &#34;4os+HU28VQ7buZvoEKQ/kg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34757&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a library used for handling PNG (Portable Network Graphics) image files. This vulnerability arises when an application reuses a pointer, previously obtained from functions like png_get_PLTE, by passing it back to a corresponding setter function within the same image structure. This action causes the setter to access memory that has already been deallocated, leading to a use-after-free condition. A local attacker could potentially exploit this flaw to corrupt image metadata or disclose sensitive information from the application&#39;s memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-09T14:41:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34757 https://bugzilla.redhat.com/show_bug.cgi?id=2456918 https://www.cve.org/CVERecord?id=CVE-2026-34757 https://nvd.nist.gov/vuln/detail/CVE-2026-34757 https://github.com/pnggroup/libpng/commit/398cbe3df03f4e11bb031e07f416dfdde3684e8a https://github.com/pnggroup/libpng/commit/55d20aaa322c9274491cda82c5cd4f99b48c6bcc https://github.com/pnggroup/libpng/issues/836 https://github.com/pnggroup/libpng/issues/837 https://github.com/pnggroup/libpng/security/advisories/GHSA-6fr7-g8h7-v645 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34757.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4rkDoNFFNCrcnkPj+GN2vA==&#34;: {&#xA;      &#34;id&#34;: &#34;4rkDoNFFNCrcnkPj+GN2vA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-24928&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a stack-based buffer overflow via DTD validation of an untrusted document or untrusted DTD.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-24928 https://bugzilla.redhat.com/show_bug.cgi?id=2346421 https://www.cve.org/CVERecord?id=CVE-2025-24928 https://nvd.nist.gov/vuln/detail/CVE-2025-24928 https://gitlab.gnome.org/GNOME/libxml2/-/issues/847 https://issues.oss-fuzz.com/issues/392687022 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-24928.json https://access.redhat.com/errata/RHSA-2025:2679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_5.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;: {&#xA;      &#34;id&#34;: &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4vS3iu8lvGukFpBFqYCdVg==&#34;: {&#xA;      &#34;id&#34;: &#34;4vS3iu8lvGukFpBFqYCdVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23165&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ReadFileUtf8 internal binding of Node.js. This vulnerability can allow an attacker to cause an application denial of service via repeated file read operations that trigger an unrecoverable memory leak due to a corrupted pointer in the underlying file system binding.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23165 https://bugzilla.redhat.com/show_bug.cgi?id=2367162 https://www.cve.org/CVERecord?id=CVE-2025-23165 https://nvd.nist.gov/vuln/detail/CVE-2025-23165 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23165.json https://access.redhat.com/errata/RHSA-2025:8467&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.16.0-1.module+el9.6.0+23151+b1496e9d&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4wegIDtvEZ75QrQWM65auQ==&#34;: {&#xA;      &#34;id&#34;: &#34;4wegIDtvEZ75QrQWM65auQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69650&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted ELF binary file containing malformed relocation data with the readelf program can trigger a double free, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69650 https://bugzilla.redhat.com/show_bug.cgi?id=2445293 https://www.cve.org/CVERecord?id=CVE-2025-69650 https://nvd.nist.gov/vuln/detail/CVE-2025-69650 https://sourceware.org/bugzilla/show_bug.cgi?id=33698 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea4bc025abdba85a90e26e13f551c16a44bfa921 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69650.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4xxaXkxeYvxr8HgxLSDyHw==&#34;: {&#xA;      &#34;id&#34;: &#34;4xxaXkxeYvxr8HgxLSDyHw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31124&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This issue occurs when cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross-compiling aarch64 android. As a result, it will downgrade to rand(), which could allow an attacker to utilize the lack of entropy by not using a CSPRNG.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31124 https://bugzilla.redhat.com/show_bug.cgi?id=2209494 https://www.cve.org/CVERecord?id=CVE-2023-31124 https://nvd.nist.gov/vuln/detail/CVE-2023-31124 https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31124.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4zvDuRN18ZTgEdA+auow3w==&#34;: {&#xA;      &#34;id&#34;: &#34;4zvDuRN18ZTgEdA+auow3w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5/L+eT1BzZSWVW4ZLUXszw==&#34;: {&#xA;      &#34;id&#34;: &#34;5/L+eT1BzZSWVW4ZLUXszw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29499&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29499 https://bugzilla.redhat.com/show_bug.cgi?id=2211828 https://www.cve.org/CVERecord?id=CVE-2023-29499 https://nvd.nist.gov/vuln/detail/CVE-2023-29499 https://gitlab.gnome.org/GNOME/glib/-/issues/2794 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29499.json https://access.redhat.com/errata/RHSA-2023:6631&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;51jf2IrfzMdepCjAvXkPMw==&#34;: {&#xA;      &#34;id&#34;: &#34;51jf2IrfzMdepCjAvXkPMw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;52sJHqmx5ZJcw5GfZwVEvg==&#34;: {&#xA;      &#34;id&#34;: &#34;52sJHqmx5ZJcw5GfZwVEvg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;55nFlly0ydgYROdIHNoLjg==&#34;: {&#xA;      &#34;id&#34;: &#34;55nFlly0ydgYROdIHNoLjg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6119&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6119 https://bugzilla.redhat.com/show_bug.cgi?id=2306158 https://www.cve.org/CVERecord?id=CVE-2024-6119 https://nvd.nist.gov/vuln/detail/CVE-2024-6119 https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6119.json https://access.redhat.com/errata/RHSA-2024:6783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-28.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;55t0Oo9c3cgFDjqyaNS70A==&#34;: {&#xA;      &#34;id&#34;: &#34;55t0Oo9c3cgFDjqyaNS70A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6844&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `readelf` utility of the binutils package. A local attacker could exploit two Denial of Service (DoS) vulnerabilities by providing a specially crafted Executable and Linkable Format (ELF) file. One vulnerability, a resource exhaustion (CWE-400), can lead to an out-of-memory condition. The other, a null pointer dereference (CWE-476), can cause a segmentation fault. Both issues can result in the `readelf` utility becoming unresponsive or crashing, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6844 https://bugzilla.redhat.com/show_bug.cgi?id=2460016 https://www.cve.org/CVERecord?id=CVE-2026-6844 https://nvd.nist.gov/vuln/detail/CVE-2026-6844 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6844.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;562erF6ddCIyzi5oV/IzHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;562erF6ddCIyzi5oV/IzHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32006&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32006 https://bugzilla.redhat.com/show_bug.cgi?id=2230955 https://www.cve.org/CVERecord?id=CVE-2023-32006 https://nvd.nist.gov/vuln/detail/CVE-2023-32006 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32006.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.17.1-1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;59oEBlU3jh6EL6gtZDUaug==&#34;: {&#xA;      &#34;id&#34;: &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4437&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc (the GNU C Library). When an application uses the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, a remote attacker can send a specially crafted DNS (Domain Name System) response. This crafted response can cause the application to incorrectly interpret a non-answer section of the DNS response as a valid answer, leading to potential misbehavior or incorrect information processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T19:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4437 https://bugzilla.redhat.com/show_bug.cgi?id=2449777 https://www.cve.org/CVERecord?id=CVE-2026-4437 https://nvd.nist.gov/vuln/detail/CVE-2026-4437 https://sourceware.org/bugzilla/show_bug.cgi?id=34014 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4437.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5AQXXWGtKGeqoPkMqmVzTg==&#34;: {&#xA;      &#34;id&#34;: &#34;5AQXXWGtKGeqoPkMqmVzTg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Fcntl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.13-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5BXX9+pRVay9wrZAORfhhQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5BXX9+pRVay9wrZAORfhhQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23920&#34;,&#xA;      &#34;description&#34;: &#34;An untrusted search path vulnerability exists in Node.js. \u003c19.6.1, \u003c18.14.1, \u003c16.19.1, and \u003c14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23920 https://bugzilla.redhat.com/show_bug.cgi?id=2172217 https://www.cve.org/CVERecord?id=CVE-2023-23920 https://nvd.nist.gov/vuln/detail/CVE-2023-23920 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23920.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5BksN0izCeDRrtFMsNCyvg==&#34;: {&#xA;      &#34;id&#34;: &#34;5BksN0izCeDRrtFMsNCyvg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9232&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSL HTTP client API no_proxy handling. This vulnerability allows an application level denial of service (application crash) via an attacker-controlled IPv6 URL when the no_proxy environment variable is set.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9232 https://bugzilla.redhat.com/show_bug.cgi?id=2396056 https://www.cve.org/CVERecord?id=CVE-2025-9232 https://nvd.nist.gov/vuln/detail/CVE-2025-9232 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9232.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5C8DQrs9fwpmV8rRYlvfCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5C8DQrs9fwpmV8rRYlvfCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66865&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted PE file with cxxfilt can trigger a stack overflow in the d_print_comp_inner function in the cp-demangle.c file, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66865 https://bugzilla.redhat.com/show_bug.cgi?id=2425822 https://www.cve.org/CVERecord?id=CVE-2025-66865 https://nvd.nist.gov/vuln/detail/CVE-2025-66865 https://github.com/caozhzh/CRGF-Vul/blob/main/cxxfilt/crash4.md https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66865.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5D5WFK01Su4Lrj4hhwDYGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5D5WFK01Su4Lrj4hhwDYGQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-43374&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free vulnerability was found in Vim&#39;s alist_add() function. Adding a new file to the argument list triggers Buf* autocommands. In an autocommand, if the buffer that was just opened is closed, including the window where it is shown, it causes the window structure to be freed, containing a reference to the argument list that is being modified. Once the autocommands are completed, references to the window and argument list are no longer valid, causing a use-after-free issue. To trigger this issue, a local attacker or user must add unusual autocommands that wipe a buffer during creation, either manually or by sourcing a malicious plugin, which will cause Vim to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-43374 https://bugzilla.redhat.com/show_bug.cgi?id=2305259 https://www.cve.org/CVERecord?id=CVE-2024-43374 https://nvd.nist.gov/vuln/detail/CVE-2024-43374 https://github.com/vim/vim/commit/0a6e57b09bc8c76691b367a5babfb79b31b770e8 https://github.com/vim/vim/security/advisories/GHSA-2w8m-443v-cgvw https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-43374.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5EJ0MC7TgiGIlilbbiOvfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5EJ0MC7TgiGIlilbbiOvfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27535&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. Libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, several FTP settings were left out from the configuration match checks, making them match too easily. The problematic settings are `CURLOPT_FTP_ACCOUNT`, `CURLOPT_FTP_ALTERNATIVE_TO_USER`, `CURLOPT_FTP_SSL_CCC` and `CURLOPT_USE_SSL` level.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27535 https://bugzilla.redhat.com/show_bug.cgi?id=2179073 https://www.cve.org/CVERecord?id=CVE-2023-27535 https://nvd.nist.gov/vuln/detail/CVE-2023-27535 https://curl.se/docs/CVE-2023-27535.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27535.json https://access.redhat.com/errata/RHSA-2023:2650&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5IIoRCBMIgus62mGlE3F9A==&#34;: {&#xA;      &#34;id&#34;: &#34;5IIoRCBMIgus62mGlE3F9A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0465&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. OpenSSL and other certificate policy checks silently ignore invalid certificate policies in leaf certificates that are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0465 https://bugzilla.redhat.com/show_bug.cgi?id=2182561 https://www.cve.org/CVERecord?id=CVE-2023-0465 https://nvd.nist.gov/vuln/detail/CVE-2023-0465 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0465.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5K1UAD5Q5lqCB0j11S6DcA==&#34;: {&#xA;      &#34;id&#34;: &#34;5K1UAD5Q5lqCB0j11S6DcA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5LfrNnR/sOzaqKXS35YFOw==&#34;: {&#xA;      &#34;id&#34;: &#34;5LfrNnR/sOzaqKXS35YFOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6845&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils, specifically within the `readelf` utility. This vulnerability allows a local attacker to cause a Denial of Service (DoS) by tricking a user into processing a specially crafted Executable and Linkable Format (ELF) file. The exploitation of this flaw can lead to the system becoming unresponsive due to excessive resource consumption or a program crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6845 https://bugzilla.redhat.com/show_bug.cgi?id=2460012 https://www.cve.org/CVERecord?id=CVE-2026-6845 https://nvd.nist.gov/vuln/detail/CVE-2026-6845 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6845.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5LplZpuSZzAiOH2fmk3HWg==&#34;: {&#xA;      &#34;id&#34;: &#34;5LplZpuSZzAiOH2fmk3HWg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libblkid-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5MGCN705vR5eWycZyFuYJQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5MGCN705vR5eWycZyFuYJQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5MqCycBYSRDsdNOzvOandQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5MqCycBYSRDsdNOzvOandQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-plugin-annobin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5N/eQ/DLmsm7yS6+3apC5A==&#34;: {&#xA;      &#34;id&#34;: &#34;5N/eQ/DLmsm7yS6+3apC5A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30581&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been discovered in Node.js,  where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30581 https://bugzilla.redhat.com/show_bug.cgi?id=2219824 https://www.cve.org/CVERecord?id=CVE-2023-30581 https://nvd.nist.gov/vuln/detail/CVE-2023-30581 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30581.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5Prc3wgX2qu0EaSsAQiCqw==&#34;: {&#xA;      &#34;id&#34;: &#34;5Prc3wgX2qu0EaSsAQiCqw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-49796&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-49796 https://bugzilla.redhat.com/show_bug.cgi?id=2372385 https://www.cve.org/CVERecord?id=CVE-2025-49796 https://nvd.nist.gov/vuln/detail/CVE-2025-49796 https://gitlab.gnome.org/GNOME/libxml2/-/issues/933 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-49796.json https://access.redhat.com/errata/RHSA-2025:10699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5RT9+X+8xx3rC02gOnVsjQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5RT9+X+8xx3rC02gOnVsjQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41724&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41724 https://bugzilla.redhat.com/show_bug.cgi?id=2178492 https://www.cve.org/CVERecord?id=CVE-2022-41724 https://nvd.nist.gov/vuln/detail/CVE-2022-41724 https://go.dev/cl/468125 https://go.dev/issue/58001 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E https://pkg.go.dev/vuln/GO-2023-1570 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41724.json https://access.redhat.com/errata/RHBA-2023:2181&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.6-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5RkTDL6DiLROYOUsuY5wGA==&#34;: {&#xA;      &#34;id&#34;: &#34;5RkTDL6DiLROYOUsuY5wGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59466&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in Node.js error handling where \&#34;Maximum call stack size exceeded\&#34; errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(&#39;uncaughtException&#39;)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59466 https://bugzilla.redhat.com/show_bug.cgi?id=2431343 https://www.cve.org/CVERecord?id=CVE-2025-59466 https://nvd.nist.gov/vuln/detail/CVE-2025-59466 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59466.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.4-1.22.22.0.1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5SopsIUut+H2XaFPAa5Sig==&#34;: {&#xA;      &#34;id&#34;: &#34;5SopsIUut+H2XaFPAa5Sig==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1528&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici&#39;s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:21:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1528 https://bugzilla.redhat.com/show_bug.cgi?id=2447145 https://www.cve.org/CVERecord?id=CVE-2026-1528 https://nvd.nist.gov/vuln/detail/CVE-2026-1528 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj https://hackerone.com/reports/3537648 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1528.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5TfU8//dfsOlT82byi0lug==&#34;: {&#xA;      &#34;id&#34;: &#34;5TfU8//dfsOlT82byi0lug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-31498&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This vulnerability allows a remote or local attacker to cause a use-after-free, potentially leading to application-level denial of service or other unexpected behavior via manipulation of DNS responses or network conditions during query processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T13:53:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-31498 https://bugzilla.redhat.com/show_bug.cgi?id=2358271 https://www.cve.org/CVERecord?id=CVE-2025-31498 https://nvd.nist.gov/vuln/detail/CVE-2025-31498 https://github.com/c-ares/c-ares/commit/29d38719112639d8c0ba910254a3dd4f482ea2d1 https://github.com/c-ares/c-ares/pull/821 https://github.com/c-ares/c-ares/security/advisories/GHSA-6hxc-62jh-p29v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-31498.json https://access.redhat.com/errata/RHSA-2025:7433&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.15.0-1.module+el9.6.0+23062+9e7801b9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5Wt7PRY2CMVsPwL8nxZwcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5Wt7PRY2CMVsPwL8nxZwcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5222&#34;,&#xA;      &#34;description&#34;: &#34;A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the &#39;subtag&#39; struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5222 https://bugzilla.redhat.com/show_bug.cgi?id=2368600 https://www.cve.org/CVERecord?id=CVE-2025-5222 https://nvd.nist.gov/vuln/detail/CVE-2025-5222 https://unicode-org.atlassian.net/jira/software/c/projects/ICU/issues/ICU-22957 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5222.json https://access.redhat.com/errata/RHSA-2025:12083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libicu-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:67.1-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5XT+5ghtfmJFJSJCERGwhQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5XT+5ghtfmJFJSJCERGwhQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21892&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. On Linux, Node.js ignores certain environment variables if an unprivileged user has set them while the process is running with elevated privileges, except for CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when other capabilities have been set. This flaw allows unprivileged users to inject code that inherits the process&#39;s elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21892 https://bugzilla.redhat.com/show_bug.cgi?id=2264582 https://www.cve.org/CVERecord?id=CVE-2024-21892 https://nvd.nist.gov/vuln/detail/CVE-2024-21892 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21892.json https://access.redhat.com/errata/RHSA-2024:1503&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.19.1-1.module+el9.3.0+21388+22892fb9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5ZJ6PuXfgRMCarpNow00ew==&#34;: {&#xA;      &#34;id&#34;: &#34;5ZJ6PuXfgRMCarpNow00ew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25881&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25881 https://bugzilla.redhat.com/show_bug.cgi?id=2165824 https://www.cve.org/CVERecord?id=CVE-2022-25881 https://nvd.nist.gov/vuln/detail/CVE-2022-25881 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25881.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5amguv6OT1njd8r+RXMCQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5amguv6OT1njd8r+RXMCQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5dIAtetRd+EnRw+FudplXw==&#34;: {&#xA;      &#34;id&#34;: &#34;5dIAtetRd+EnRw+FudplXw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45341&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/x509 package of the Golang standard library. A certificate with a URI, which has a IPv6 address with a zone ID, may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI; this issue only affects users of private PKIs that make use of URIs.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45341 https://bugzilla.redhat.com/show_bug.cgi?id=2341750 https://www.cve.org/CVERecord?id=CVE-2024-45341 https://nvd.nist.gov/vuln/detail/CVE-2024-45341 https://github.com/golang/go/commit/2b2314e9f6103de322b2e247387c8b01fd0cd5a4 https://github.com/golang/go/issues/71156 https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45341.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5dsQlAsI3nHmxcFSn4q9Fw==&#34;: {&#xA;      &#34;id&#34;: &#34;5dsQlAsI3nHmxcFSn4q9Fw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55130&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55130 https://bugzilla.redhat.com/show_bug.cgi?id=2431352 https://www.cve.org/CVERecord?id=CVE-2025-55130 https://nvd.nist.gov/vuln/detail/CVE-2025-55130 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55130.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.20.0.1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5ejk3bhFpvIIABy9EwjwqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5ejk3bhFpvIIABy9EwjwqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-36137&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. The Node.js Permission Model does not operate on file descriptors. However, operations such as fs.fchown or fs.fchmod can use a \&#34;read-only\&#34; file descriptor to change the owner and permissions of a file.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-36137 https://bugzilla.redhat.com/show_bug.cgi?id=2299281 https://www.cve.org/CVERecord?id=CVE-2024-36137 https://nvd.nist.gov/vuln/detail/CVE-2024-36137 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-36137.json https://access.redhat.com/errata/RHSA-2024:5815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.16.0-1.module+el9.4.0+22197+9e60f127&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5gK/V8vtqDYoHf1LFdtSbA==&#34;: {&#xA;      &#34;id&#34;: &#34;5gK/V8vtqDYoHf1LFdtSbA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-58183&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T22:10:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-58183 https://bugzilla.redhat.com/show_bug.cgi?id=2407258 https://www.cve.org/CVERecord?id=CVE-2025-58183 https://nvd.nist.gov/vuln/detail/CVE-2025-58183 https://go.dev/cl/709861 https://go.dev/issue/75677 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://pkg.go.dev/vuln/GO-2025-4014 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-58183.json https://access.redhat.com/errata/RHSA-2025:21815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.3-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5j7D/WXFLHsZYUeUrskpMA==&#34;: {&#xA;      &#34;id&#34;: &#34;5j7D/WXFLHsZYUeUrskpMA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28835&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \&#34;certtool --verify-chain\&#34; command.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28835 https://bugzilla.redhat.com/show_bug.cgi?id=2269084 https://www.cve.org/CVERecord?id=CVE-2024-28835 https://nvd.nist.gov/vuln/detail/CVE-2024-28835 https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28835.json https://access.redhat.com/errata/RHSA-2024:2570&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-4.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5lHEu4ueMJgetLv/GfKHtg==&#34;: {&#xA;      &#34;id&#34;: &#34;5lHEu4ueMJgetLv/GfKHtg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46809&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The privateDecrypt() API of the crypto library may allow a covert timing side-channel during PKCS#1 v1.5 padding error handling. This issue revealed significant timing differences in decryption for valid and invalid ciphertexts, which may allow a remote attacker to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing JSON Web Encryption messages.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46809 https://bugzilla.redhat.com/show_bug.cgi?id=2264569 https://www.cve.org/CVERecord?id=CVE-2023-46809 https://nvd.nist.gov/vuln/detail/CVE-2023-46809 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46809.json https://access.redhat.com/errata/RHSA-2024:1503&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.19.1-1.module+el9.3.0+21388+22892fb9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5pFK2pddNfoGuwrNwC3BlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5pFK2pddNfoGuwrNwC3BlQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1255&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security flaw occurs because the AES-XTS cipher decryption implementation for the 64-bit ARM platform contains an issue that could cause it to read past the input buffer, leading to a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1255 https://bugzilla.redhat.com/show_bug.cgi?id=2188461 https://www.cve.org/CVERecord?id=CVE-2023-1255 https://nvd.nist.gov/vuln/detail/CVE-2023-1255 https://www.openssl.org/news/secadv/20230420.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1255.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5pINgBOJXOluBJi9rQyioQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5pINgBOJXOluBJi9rQyioQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35065&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35065 https://bugzilla.redhat.com/show_bug.cgi?id=2156324 https://www.cve.org/CVERecord?id=CVE-2021-35065 https://nvd.nist.gov/vuln/detail/CVE-2021-35065 https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35065.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5sY/WncZRmQ7FUzZZ4kBfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5sY/WncZRmQ7FUzZZ4kBfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24534&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24534 https://bugzilla.redhat.com/show_bug.cgi?id=2184483 https://www.cve.org/CVERecord?id=CVE-2023-24534 https://nvd.nist.gov/vuln/detail/CVE-2023-24534 https://go.dev/issue/58975 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24534.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5ua6yduRd8slR+XckPuEJw==&#34;: {&#xA;      &#34;id&#34;: &#34;5ua6yduRd8slR+XckPuEJw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici package for Node.js. Undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If an app has a mechanism that sends multipart requests to an attacker-controlled website, it can leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T17:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22150 https://bugzilla.redhat.com/show_bug.cgi?id=2339176 https://www.cve.org/CVERecord?id=CVE-2025-22150 https://nvd.nist.gov/vuln/detail/CVE-2025-22150 https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113 https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0 https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385 https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975 https://hackerone.com/reports/2913312 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22150.json https://access.redhat.com/errata/RHSA-2025:1443&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.18.2-1.module+el9.5.0+22758+4ad2c198&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5vR/2ZAfb0swnLBKDl3Bzg==&#34;: {&#xA;      &#34;id&#34;: &#34;5vR/2ZAfb0swnLBKDl3Bzg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3598&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the extractContigSamplesShifted24bits function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3598 https://bugzilla.redhat.com/show_bug.cgi?id=2142738 https://www.cve.org/CVERecord?id=CVE-2022-3598 https://nvd.nist.gov/vuln/detail/CVE-2022-3598 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3598.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5xW5MMwESxiksXgaLrFCnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5xW5MMwESxiksXgaLrFCnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52533&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Glib library. A buffer overflow condition can be triggered in certain conditions due to an off-by-one error in SOCKS4_CONN_MSG_LEN. This issue may lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52533 https://bugzilla.redhat.com/show_bug.cgi?id=2325340 https://www.cve.org/CVERecord?id=CVE-2024-52533 https://nvd.nist.gov/vuln/detail/CVE-2024-52533 https://gitlab.gnome.org/GNOME/glib/-/issues/3461 https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1 https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52533.json https://access.redhat.com/errata/RHSA-2025:11140&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-16.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5xY3IHUogqpqvbFwiQURyA==&#34;: {&#xA;      &#34;id&#34;: &#34;5xY3IHUogqpqvbFwiQURyA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45492&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat&#39;s internal nextScaffoldPart function in xmlparse.c. It can have an integer overflow for m_groupSize on 32-bit platforms where UINT_MAX equals SIZE_MAX.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-30T03:15:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45492 https://bugzilla.redhat.com/show_bug.cgi?id=2308617 https://www.cve.org/CVERecord?id=CVE-2024-45492 https://nvd.nist.gov/vuln/detail/CVE-2024-45492 https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes https://github.com/libexpat/libexpat/issues/889 https://github.com/libexpat/libexpat/pull/892 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45492.json https://access.redhat.com/errata/RHSA-2024:6754&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-2.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5z9ZOzxJREYn5oM+HAm6dA==&#34;: {&#xA;      &#34;id&#34;: &#34;5z9ZOzxJREYn5oM+HAm6dA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23946&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security issue occurs when feeding a crafted input to \&#34;git apply.\&#34; A path outside the working tree can be overwritten by the user running \&#34;git apply.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23946 https://bugzilla.redhat.com/show_bug.cgi?id=2168161 https://www.cve.org/CVERecord?id=CVE-2023-23946 https://nvd.nist.gov/vuln/detail/CVE-2023-23946 https://github.blog/2023-02-14-git-security-vulnerabilities-announced-3/ https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23946.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;5zg9huqgOp8E89z3dxtcHg==&#34;: {&#xA;      &#34;id&#34;: &#34;5zg9huqgOp8E89z3dxtcHg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6+AE2YxwD/sq8tw4nc1qGA==&#34;: {&#xA;      &#34;id&#34;: &#34;6+AE2YxwD/sq8tw4nc1qGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59465&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been discovered in NodeJS. A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59465 https://bugzilla.redhat.com/show_bug.cgi?id=2431349 https://www.cve.org/CVERecord?id=CVE-2025-59465 https://nvd.nist.gov/vuln/detail/CVE-2025-59465 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59465.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6+K4D2mkqcFFftanju984w==&#34;: {&#xA;      &#34;id&#34;: &#34;6+K4D2mkqcFFftanju984w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6+TrxTb+GrNbsX7xQgQW9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;6+TrxTb+GrNbsX7xQgQW9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6/J2BNJ50P9dbLT32gy3eA==&#34;: {&#xA;      &#34;id&#34;: &#34;6/J2BNJ50P9dbLT32gy3eA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55131&#34;,&#xA;      &#34;description&#34;: &#34;A memory exposure flaw has been discovered in Node.js. A flaw in Node.js&#39;s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55131 https://bugzilla.redhat.com/show_bug.cgi?id=2431350 https://www.cve.org/CVERecord?id=CVE-2025-55131 https://nvd.nist.gov/vuln/detail/CVE-2025-55131 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55131.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6/KKbV2mEAFGDxV5hCYPjA==&#34;: {&#xA;      &#34;id&#34;: &#34;6/KKbV2mEAFGDxV5hCYPjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6/Rn1WFxVO6aopyr8psGfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;6/Rn1WFxVO6aopyr8psGfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21890&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js Permission Model, where it is not clarified in the documentation that wildcards should only be used as the last character of a file path. For example: --allow-fs-read=/home/node/.ssh/*.pub will ignore pub and give access to everything after .ssh/.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21890 https://bugzilla.redhat.com/show_bug.cgi?id=2265722 https://www.cve.org/CVERecord?id=CVE-2024-21890 https://nvd.nist.gov/vuln/detail/CVE-2024-21890 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21890.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;60Ucz+CE49NFnmVBiIwnwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;60Ucz+CE49NFnmVBiIwnwQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21717&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in V8&#39;s string hashing mechanism within Node.js. A remote attacker can exploit this vulnerability by crafting requests containing integer-like strings. These specially crafted strings cause predictable hash collisions in V8&#39;s internal string table, particularly when processed by functions like JSON.parse() on attacker-controlled input. This can significantly degrade the performance of the Node.js process, leading to a Denial of Service (DoS) condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21717 https://bugzilla.redhat.com/show_bug.cgi?id=2453162 https://www.cve.org/CVERecord?id=CVE-2026-21717 https://nvd.nist.gov/vuln/detail/CVE-2026-21717 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21717.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;63po8QED6nDungBQEqHIyA==&#34;: {&#xA;      &#34;id&#34;: &#34;63po8QED6nDungBQEqHIyA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25881&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25881 https://bugzilla.redhat.com/show_bug.cgi?id=2165824 https://www.cve.org/CVERecord?id=CVE-2022-25881 https://nvd.nist.gov/vuln/detail/CVE-2022-25881 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25881.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;66LeUA2b+ILx/Qsv0eSJ5w==&#34;: {&#xA;      &#34;id&#34;: &#34;66LeUA2b+ILx/Qsv0eSJ5w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3832&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in gnutls. A remote attacker could exploit this vulnerability by presenting a specially crafted Online Certificate Status Protocol (OCSP) response during a TLS handshake. Due to a logic error in how gnutls processes multi-record OCSP responses, a client with OCSP verification enabled may incorrectly accept a revoked server certificate, potentially leading to a compromise of trust.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-30T17:29:25Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3832 https://bugzilla.redhat.com/show_bug.cgi?id=2445762 https://www.cve.org/CVERecord?id=CVE-2026-3832 https://nvd.nist.gov/vuln/detail/CVE-2026-3832 https://gitlab.com/gnutls/gnutls/-/issues/1801 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3832.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;67Q/SCDsFWutXyKWQ9JQdQ==&#34;: {&#xA;      &#34;id&#34;: &#34;67Q/SCDsFWutXyKWQ9JQdQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38545&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \&#34;let the host resolve the name\&#34; could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38545 https://bugzilla.redhat.com/show_bug.cgi?id=2241933 https://www.cve.org/CVERecord?id=CVE-2023-38545 https://nvd.nist.gov/vuln/detail/CVE-2023-38545 https://curl.se/docs/CVE-2023-38545.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38545.json https://access.redhat.com/errata/RHSA-2023:6745&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;69HZBPjw2QR8kIdKeSUwQg==&#34;: {&#xA;      &#34;id&#34;: &#34;69HZBPjw2QR8kIdKeSUwQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5363&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL in how it processes key and initialization vector (IV) lengths. This issue can lead to potential truncation or overruns during the initialization of some symmetric ciphers. A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. Both truncations and overruns of the key and the IV will produce incorrect results and could, in some cases, trigger a memory exception.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-24T15:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5363 https://bugzilla.redhat.com/show_bug.cgi?id=2243839 https://www.cve.org/CVERecord?id=CVE-2023-5363 https://nvd.nist.gov/vuln/detail/CVE-2023-5363 https://www.openssl.org/news/secadv/20231024.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5363.json https://access.redhat.com/errata/RHSA-2024:0310&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-25.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6E1YTgmxENPqo7FirtVNvw==&#34;: {&#xA;      &#34;id&#34;: &#34;6E1YTgmxENPqo7FirtVNvw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-7425&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7425 https://bugzilla.redhat.com/show_bug.cgi?id=2379274 https://www.cve.org/CVERecord?id=CVE-2025-7425 https://nvd.nist.gov/vuln/detail/CVE-2025-7425 https://gitlab.gnome.org/GNOME/libxslt/-/issues/140 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7425.json https://access.redhat.com/errata/RHSA-2025:12447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-11.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6GILJqctNxTbZFPR6fLtoA==&#34;: {&#xA;      &#34;id&#34;: &#34;6GILJqctNxTbZFPR6fLtoA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12086&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client&#39;s machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T15:06:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12086 https://bugzilla.redhat.com/show_bug.cgi?id=2330577 https://www.cve.org/CVERecord?id=CVE-2024-12086 https://nvd.nist.gov/vuln/detail/CVE-2024-12086 https://kb.cert.org/vuls/id/952657 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12086.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6GzxFtf19XU1Y6ySz6SgYQ==&#34;: {&#xA;      &#34;id&#34;: &#34;6GzxFtf19XU1Y6ySz6SgYQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2024-3107&#34;,&#xA;      &#34;description&#34;: &#34;Stack exhaustion in Parse in go/build/constraint&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T19:15:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/611240 https://go.dev/issue/69141 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.22.7&#34;&#xA;    },&#xA;    &#34;6J86dffyd+kQEKbjTTbD2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;6J86dffyd+kQEKbjTTbD2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1916&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1916 https://bugzilla.redhat.com/show_bug.cgi?id=2185074 https://www.cve.org/CVERecord?id=CVE-2023-1916 https://nvd.nist.gov/vuln/detail/CVE-2023-1916 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1916.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6JXvoql3pzMfkGQb7H+Jqg==&#34;: {&#xA;      &#34;id&#34;: &#34;6JXvoql3pzMfkGQb7H+Jqg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6K5O0xmJnJtZcGmUaZ+P/w==&#34;: {&#xA;      &#34;id&#34;: &#34;6K5O0xmJnJtZcGmUaZ+P/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24537&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24537 https://bugzilla.redhat.com/show_bug.cgi?id=2184484 https://www.cve.org/CVERecord?id=CVE-2023-24537 https://nvd.nist.gov/vuln/detail/CVE-2023-24537 https://github.com/golang/go/issues/59180 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24537.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6LOgJE44rXWziB7/OMO/ig==&#34;: {&#xA;      &#34;id&#34;: &#34;6LOgJE44rXWziB7/OMO/ig==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28422&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, an open-source command-line text editor. A local user could exploit a stack-buffer-overflow vulnerability in the `build_stl_str_hl()` function by rendering a statusline with a multi-byte fill character on a very wide terminal. This could lead to an integrity impact, where data might be modified.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-27T22:08:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28422 https://bugzilla.redhat.com/show_bug.cgi?id=2443475 https://www.cve.org/CVERecord?id=CVE-2026-28422 https://nvd.nist.gov/vuln/detail/CVE-2026-28422 https://github.com/vim/vim/commit/4e5b9e31cb7484ad156f https://github.com/vim/vim/releases/tag/v9.2.0078 https://github.com/vim/vim/security/advisories/GHSA-gmqx-prf2-8mwf https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28422.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6LazNwUBgu5kQGKPCQnaOw==&#34;: {&#xA;      &#34;id&#34;: &#34;6LazNwUBgu5kQGKPCQnaOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26269&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. A stack-based buffer overflow in the NetBeans integration can be triggered in the special_keys function in the src/netbeans.c file via a malicious NetBeans server due to improper bounds checking, most likely resulting in a denial of service or in arbitrary command execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-13T19:18:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26269 https://bugzilla.redhat.com/show_bug.cgi?id=2439755 https://www.cve.org/CVERecord?id=CVE-2026-26269 https://nvd.nist.gov/vuln/detail/CVE-2026-26269 https://github.com/vim/vim/commit/c5f312aad8e4179e437f81ad39a860cd0ef11970 https://github.com/vim/vim/releases/tag/v9.1.2148 https://github.com/vim/vim/security/advisories/GHSA-9w5c-hwr9-hc68 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26269.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6MW1lRUdNNc4s+6uD2JNvw==&#34;: {&#xA;      &#34;id&#34;: &#34;6MW1lRUdNNc4s+6uD2JNvw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2286&#34;,&#xA;      &#34;description&#34;: &#34;Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2286 https://bugzilla.redhat.com/show_bug.cgi?id=2103875 https://www.cve.org/CVERecord?id=CVE-2022-2286 https://nvd.nist.gov/vuln/detail/CVE-2022-2286 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2286.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6MrPfKc4s7QjoixYMvK5aQ==&#34;: {&#xA;      &#34;id&#34;: &#34;6MrPfKc4s7QjoixYMvK5aQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61731&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in cmd/go. An attacker can exploit this by building a malicious Go source file that uses the &#39;#cgo pkg-config:&#39; directive. This allows the attacker to write to an arbitrary file with partial control over its content, by providing a &#39;--log-file&#39; argument to the pkg-config command. This vulnerability can lead to arbitrary file write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61731 https://bugzilla.redhat.com/show_bug.cgi?id=2434433 https://www.cve.org/CVERecord?id=CVE-2025-61731 https://nvd.nist.gov/vuln/detail/CVE-2025-61731 https://go.dev/cl/736711 https://go.dev/issue/77100 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4339 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61731.json https://access.redhat.com/errata/RHSA-2026:5942&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.8-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6PfMuZGMOADiSo4Ifx0/Qw==&#34;: {&#xA;      &#34;id&#34;: &#34;6PfMuZGMOADiSo4Ifx0/Qw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35937&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35937 https://bugzilla.redhat.com/show_bug.cgi?id=1964125 https://www.cve.org/CVERecord?id=CVE-2021-35937 https://nvd.nist.gov/vuln/detail/CVE-2021-35937 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35937.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6Q0Sg/Y1lskU2n7rbcxAIw==&#34;: {&#xA;      &#34;id&#34;: &#34;6Q0Sg/Y1lskU2n7rbcxAIw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39318&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. The html/template package did not properly handle HMTL-like \&#34;\u003c!--\&#34; and \&#34;--\u003e\&#34; comment tokens, nor hashbang \&#34;#!\&#34; comment tokens, in \u003cscript\u003e contexts. This issue may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39318 https://bugzilla.redhat.com/show_bug.cgi?id=2237776 https://www.cve.org/CVERecord?id=CVE-2023-39318 https://nvd.nist.gov/vuln/detail/CVE-2023-39318 https://go.dev/cl/526156 https://go.dev/issue/62196 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2041.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39318.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6Qa2KBduT2HgJC4kctpUnw==&#34;: {&#xA;      &#34;id&#34;: &#34;6Qa2KBduT2HgJC4kctpUnw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35065&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35065 https://bugzilla.redhat.com/show_bug.cgi?id=2156324 https://www.cve.org/CVERecord?id=CVE-2021-35065 https://nvd.nist.gov/vuln/detail/CVE-2021-35065 https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35065.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6VA82zmenvpHf3qd7c6BQg==&#34;: {&#xA;      &#34;id&#34;: &#34;6VA82zmenvpHf3qd7c6BQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45289&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s net/http/cookiejar standard library package. When following an HTTP redirect to a domain that is not a subdomain match or an exact match of the initial domain, an http.Client does not forward sensitive headers such as \&#34;Authorization\&#34; or \&#34;Cookie\&#34;. For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45289 https://bugzilla.redhat.com/show_bug.cgi?id=2268018 https://www.cve.org/CVERecord?id=CVE-2023-45289 https://nvd.nist.gov/vuln/detail/CVE-2023-45289 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45289.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6W4lt5SjUgXnbxNap1O0Cg==&#34;: {&#xA;      &#34;id&#34;: &#34;6W4lt5SjUgXnbxNap1O0Cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39321&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39321 https://bugzilla.redhat.com/show_bug.cgi?id=2237777 https://www.cve.org/CVERecord?id=CVE-2023-39321 https://nvd.nist.gov/vuln/detail/CVE-2023-39321 https://go.dev/cl/523039 https://go.dev/issue/62266 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2044.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39321.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6WQjHZdyTC+aVOSwNc3+BQ==&#34;: {&#xA;      &#34;id&#34;: &#34;6WQjHZdyTC+aVOSwNc3+BQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38545&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \&#34;let the host resolve the name\&#34; could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38545 https://bugzilla.redhat.com/show_bug.cgi?id=2241933 https://www.cve.org/CVERecord?id=CVE-2023-38545 https://nvd.nist.gov/vuln/detail/CVE-2023-38545 https://curl.se/docs/CVE-2023-38545.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38545.json https://access.redhat.com/errata/RHSA-2023:6745&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6XzckJlhvkdWwkN1ERVdzg==&#34;: {&#xA;      &#34;id&#34;: &#34;6XzckJlhvkdWwkN1ERVdzg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5363&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL in how it processes key and initialization vector (IV) lengths. This issue can lead to potential truncation or overruns during the initialization of some symmetric ciphers. A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. Both truncations and overruns of the key and the IV will produce incorrect results and could, in some cases, trigger a memory exception.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-24T15:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5363 https://bugzilla.redhat.com/show_bug.cgi?id=2243839 https://www.cve.org/CVERecord?id=CVE-2023-5363 https://nvd.nist.gov/vuln/detail/CVE-2023-5363 https://www.openssl.org/news/secadv/20231024.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5363.json https://access.redhat.com/errata/RHSA-2024:0310&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-25.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6ZTNb8xwQ12tf1lZxG3rMg==&#34;: {&#xA;      &#34;id&#34;: &#34;6ZTNb8xwQ12tf1lZxG3rMg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1526&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \&#34;decompression bomb,\&#34; during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:08:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1526 https://bugzilla.redhat.com/show_bug.cgi?id=2447142 https://www.cve.org/CVERecord?id=CVE-2026-1526 https://nvd.nist.gov/vuln/detail/CVE-2026-1526 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q https://hackerone.com/reports/3481206 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1526.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6Za/T764+Wnq0wfxFjEvGw==&#34;: {&#xA;      &#34;id&#34;: &#34;6Za/T764+Wnq0wfxFjEvGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6asSIEJz7ggo9QEXpbSOYg==&#34;: {&#xA;      &#34;id&#34;: &#34;6asSIEJz7ggo9QEXpbSOYg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-48236&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. The impact is low because user interaction is required and a crash may not happen in all situations.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-48236 https://bugzilla.redhat.com/show_bug.cgi?id=2250273 https://www.cve.org/CVERecord?id=CVE-2023-48236 https://nvd.nist.gov/vuln/detail/CVE-2023-48236 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/73b2d3790cad5694fc0ed0db2926e4220c48d968 https://github.com/vim/vim/security/advisories/GHSA-pr4c-932v-8hx5 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48236.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6bZ4UNaa9jRLVZoZHQgYtQ==&#34;: {&#xA;      &#34;id&#34;: &#34;6bZ4UNaa9jRLVZoZHQgYtQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21896&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a buffer, the implementation uses Buffer.from() to obtain a buffer from the result of path.resolve(). By monkey-patching buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21896 https://bugzilla.redhat.com/show_bug.cgi?id=2265717 https://www.cve.org/CVERecord?id=CVE-2024-21896 https://nvd.nist.gov/vuln/detail/CVE-2024-21896 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21896.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6dwQWrojfQ/1hgTT2PQckg==&#34;: {&#xA;      &#34;id&#34;: &#34;6dwQWrojfQ/1hgTT2PQckg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2129&#34;,&#xA;      &#34;description&#34;: &#34;Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2129 https://bugzilla.redhat.com/show_bug.cgi?id=2099586 https://www.cve.org/CVERecord?id=CVE-2022-2129 https://nvd.nist.gov/vuln/detail/CVE-2022-2129 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2129.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6fJcYsi1gPQNv5g1ujEPdA==&#34;: {&#xA;      &#34;id&#34;: &#34;6fJcYsi1gPQNv5g1ujEPdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21891&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwritten with user-defined implementations, leading to a filesystem permission model bypass through a path traversal attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21891 https://bugzilla.redhat.com/show_bug.cgi?id=2265720 https://www.cve.org/CVERecord?id=CVE-2024-21891 https://nvd.nist.gov/vuln/detail/CVE-2024-21891 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21891.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;: {&#xA;      &#34;id&#34;: &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-41996&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the Diffie-Hellman Ephemeral (DHE) Key Agreement Protocol, where a malicious client can exploit the server&#39;s public key validation process. By forcing the server to use DHE and validating the order of public keys, the client can trigger expensive server-side modular exponentiation calculations. This issue results in asymmetric resource consumption, potentially leading to a denial of service (DoS) attack by overwhelming the server with computationally intensive operations.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-26T06:15:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-41996 https://bugzilla.redhat.com/show_bug.cgi?id=2307826 https://www.cve.org/CVERecord?id=CVE-2024-41996 https://nvd.nist.gov/vuln/detail/CVE-2024-41996 https://dheatattack.gitlab.io/details/ https://dheatattack.gitlab.io/faq/ https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1 https://github.com/openssl/openssl/issues/17374 https://openssl-library.org/post/2022-10-21-tls-groups-configuration/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41996.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6miUB07ljV2HaYX/rZ1yjg==&#34;: {&#xA;      &#34;id&#34;: &#34;6miUB07ljV2HaYX/rZ1yjg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0938&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accept domain names that included square brackets, which isn&#39;t valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-31T17:51:35Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0938 https://bugzilla.redhat.com/show_bug.cgi?id=2343237 https://www.cve.org/CVERecord?id=CVE-2025-0938 https://nvd.nist.gov/vuln/detail/CVE-2025-0938 https://github.com/python/cpython/issues/105704 https://github.com/python/cpython/pull/129418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0938.json https://access.redhat.com/errata/RHSA-2025:6977&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6o8ui0RxMttDzkyqTDO5tg==&#34;: {&#xA;      &#34;id&#34;: &#34;6o8ui0RxMttDzkyqTDO5tg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-1616&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim, which is vulnerable to a heap-buffer-overflow in append_command of the src/ex_docmd.c function. This flaw allows a specially crafted file to crash software, modify memory, or execute code when opened in vim.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-05-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-1616 https://bugzilla.redhat.com/show_bug.cgi?id=2083017 https://www.cve.org/CVERecord?id=CVE-2022-1616 https://nvd.nist.gov/vuln/detail/CVE-2022-1616 https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2/ https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1616.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6otwEH3RP+2A14zXLvGXpg==&#34;: {&#xA;      &#34;id&#34;: &#34;6otwEH3RP+2A14zXLvGXpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29402&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program that uses cgo. This can occur when running an untrusted module that contains directories with newline characters in their names. Modules that are retrieved using the go command, for example, via \&#34;go get\&#34;, are not affected. Modules retrieved using GOPATH-mode, for example, GO111MODULE=off may be affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29402 https://bugzilla.redhat.com/show_bug.cgi?id=2217562 https://www.cve.org/CVERecord?id=CVE-2023-29402 https://nvd.nist.gov/vuln/detail/CVE-2023-29402 https://go.dev/cl/501226 https://go.dev/issue/60167 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1839 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29402.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6pBzw2YiS9JmVvplQUxl2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;6pBzw2YiS9JmVvplQUxl2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0466&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The X509_VERIFY_PARAM_add0_policy() function is documented to enable the certificate policy check when doing certificate verification implicitly. However, implementing the function does not enable the check, allowing certificates with invalid or incorrect policies to pass the certificate verification. Suddenly enabling the policy check could break existing deployments, so it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. The applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0466 https://bugzilla.redhat.com/show_bug.cgi?id=2182565 https://www.cve.org/CVERecord?id=CVE-2023-0466 https://nvd.nist.gov/vuln/detail/CVE-2023-0466 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0466.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6pPl5aD/FZ2M/6Yaa588Aw==&#34;: {&#xA;      &#34;id&#34;: &#34;6pPl5aD/FZ2M/6Yaa588Aw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30590&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30590 https://bugzilla.redhat.com/show_bug.cgi?id=2219842 https://www.cve.org/CVERecord?id=CVE-2023-30590 https://nvd.nist.gov/vuln/detail/CVE-2023-30590 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30590.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.16.1-1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6q1zANz+NJU+U0TPL1Xa2g==&#34;: {&#xA;      &#34;id&#34;: &#34;6q1zANz+NJU+U0TPL1Xa2g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12718&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython&#39;s tarfile module. This vulnerability allows modification of file metadata, such as timestamps or permissions, outside the intended extraction directory via maliciously crafted tar archives using the filter=\&#34;data\&#34; or filter=\&#34;tar\&#34; extraction filters.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:59:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12718 https://bugzilla.redhat.com/show_bug.cgi?id=2370013 https://www.cve.org/CVERecord?id=CVE-2024-12718 https://nvd.nist.gov/vuln/detail/CVE-2024-12718 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/127987 https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12718.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6qJXB6OTmGgjS8WJVVTxvQ==&#34;: {&#xA;      &#34;id&#34;: &#34;6qJXB6OTmGgjS8WJVVTxvQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25629&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25629 https://bugzilla.redhat.com/show_bug.cgi?id=2265713 https://www.cve.org/CVERecord?id=CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629 https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25629.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6qUVSp56FVn/1B93TTNdqw==&#34;: {&#xA;      &#34;id&#34;: &#34;6qUVSp56FVn/1B93TTNdqw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55132&#34;,&#xA;      &#34;description&#34;: &#34;A file access flaw has been discovered in NodeJS. A file&#39;s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55132 https://bugzilla.redhat.com/show_bug.cgi?id=2431338 https://www.cve.org/CVERecord?id=CVE-2025-55132 https://nvd.nist.gov/vuln/detail/CVE-2025-55132 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55132.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6qxVoatDqIolfyN1PZUKnw==&#34;: {&#xA;      &#34;id&#34;: &#34;6qxVoatDqIolfyN1PZUKnw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55131&#34;,&#xA;      &#34;description&#34;: &#34;A memory exposure flaw has been discovered in Node.js. A flaw in Node.js&#39;s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55131 https://bugzilla.redhat.com/show_bug.cgi?id=2431350 https://www.cve.org/CVERecord?id=CVE-2025-55131 https://nvd.nist.gov/vuln/detail/CVE-2025-55131 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55131.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.4-1.22.22.0.1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6rBlrHxkkFbqVRbyfq+scg==&#34;: {&#xA;      &#34;id&#34;: &#34;6rBlrHxkkFbqVRbyfq+scg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libstdc++-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15079&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15079 https://bugzilla.redhat.com/show_bug.cgi?id=2426409 https://www.cve.org/CVERecord?id=CVE-2025-15079 https://nvd.nist.gov/vuln/detail/CVE-2025-15079 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15079.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6tML+4g9GkMhdrrSDsX4Zw==&#34;: {&#xA;      &#34;id&#34;: &#34;6tML+4g9GkMhdrrSDsX4Zw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29007&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security flaw occurs when renaming or deleting a section from a configuration file, where certain malicious configuration values may be misinterpreted as the beginning of a new configuration section. This flaw leads to arbitrary configuration injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29007 https://bugzilla.redhat.com/show_bug.cgi?id=2188338 https://www.cve.org/CVERecord?id=CVE-2023-29007 https://nvd.nist.gov/vuln/detail/CVE-2023-29007 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29007.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6thTxik/0CDWjirwYbVkYw==&#34;: {&#xA;      &#34;id&#34;: &#34;6thTxik/0CDWjirwYbVkYw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32006&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32006 https://bugzilla.redhat.com/show_bug.cgi?id=2230955 https://www.cve.org/CVERecord?id=CVE-2023-32006 https://nvd.nist.gov/vuln/detail/CVE-2023-32006 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32006.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6ysC6D7BSkYQ7y8vZ1O7HA==&#34;: {&#xA;      &#34;id&#34;: &#34;6ysC6D7BSkYQ7y8vZ1O7HA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39325&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39325 https://bugzilla.redhat.com/show_bug.cgi?id=2243296 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-39325 https://nvd.nist.gov/vuln/detail/CVE-2023-39325 https://access.redhat.com/security/cve/CVE-2023-44487 https://go.dev/issue/63417 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39325.json https://access.redhat.com/errata/RHSA-2023:5738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.13-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7+mdkcJcBwtv88RB9AcmHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7+mdkcJcBwtv88RB9AcmHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-29390&#34;,&#xA;      &#34;description&#34;: &#34;A heap buffer over-read flaw was found in libjpeg-turbo. For certain types of smoothed jpeg images, the decompress_smooth_data() function may improperly enter a condition statement that leads to heap memory read of uninitialized data, which may cause an application crash or loss of confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-29390 https://bugzilla.redhat.com/show_bug.cgi?id=2235521 https://www.cve.org/CVERecord?id=CVE-2021-29390 https://nvd.nist.gov/vuln/detail/CVE-2021-29390 https://github.com/libjpeg-turbo/libjpeg-turbo/commit/ccaba5d7894ecfb5a8f11e48d3f86e1f14d5a469 https://github.com/libjpeg-turbo/libjpeg-turbo/issues/459#issuecomment-733720010 https://github.com/libjpeg-turbo/libjpeg-turbo/pull/476 https://github.com/libjpeg-turbo/libjpeg-turbo/pull/724 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-29390.json https://access.redhat.com/errata/RHSA-2024:2295&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libjpeg-turbo-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.0.90-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7+zZLUPhCOA3BFrcusoKFg==&#34;: {&#xA;      &#34;id&#34;: &#34;7+zZLUPhCOA3BFrcusoKFg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1152&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ld linker utility of GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-10T18:00:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1152 https://bugzilla.redhat.com/show_bug.cgi?id=2344723 https://www.cve.org/CVERecord?id=CVE-2025-1152 https://nvd.nist.gov/vuln/detail/CVE-2025-1152 https://sourceware.org/bugzilla/attachment.cgi?id=15887 https://sourceware.org/bugzilla/show_bug.cgi?id=32576 https://vuldb.com/?ctiid.295056 https://vuldb.com/?id.295056 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1152.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;70+Z8jFk8NJbHxPCoxDRng==&#34;: {&#xA;      &#34;id&#34;: &#34;70+Z8jFk8NJbHxPCoxDRng==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30588&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30588 https://bugzilla.redhat.com/show_bug.cgi?id=2219838 https://www.cve.org/CVERecord?id=CVE-2023-30588 https://nvd.nist.gov/vuln/detail/CVE-2023-30588 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30588.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.16.1-1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;70Ajh2QFCXmrQTWVljWbIg==&#34;: {&#xA;      &#34;id&#34;: &#34;70Ajh2QFCXmrQTWVljWbIg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;70HU3efHkL/3G4Y44qZmGA==&#34;: {&#xA;      &#34;id&#34;: &#34;70HU3efHkL/3G4Y44qZmGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3597&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3597 https://bugzilla.redhat.com/show_bug.cgi?id=2142736 https://www.cve.org/CVERecord?id=CVE-2022-3597 https://nvd.nist.gov/vuln/detail/CVE-2022-3597 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3597.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;70hF296ZfY1ODiaUXL3gcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;70hF296ZfY1ODiaUXL3gcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27903&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch, a utility for converting glob expressions into JavaScript regular expressions. A remote attacker can exploit this vulnerability by providing a specially crafted glob pattern containing multiple non-adjacent `**` (GLOBSTAR) segments. This can lead to unbounded recursive backtracking in the `matchOne()` function, causing a Denial of Service (DoS) by stalling the Node.js event loop for an extended period.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-26T01:06:32Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27903 https://bugzilla.redhat.com/show_bug.cgi?id=2442919 https://www.cve.org/CVERecord?id=CVE-2026-27903 https://nvd.nist.gov/vuln/detail/CVE-2026-27903 https://github.com/isaacs/minimatch/security/advisories/GHSA-7r86-cg39-jmmj https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27903.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;llvm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;70rtBro0k4gOrF1v9b0LPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;70rtBro0k4gOrF1v9b0LPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;71rWwrWl22424P8D9sWBZg==&#34;: {&#xA;      &#34;id&#34;: &#34;71rWwrWl22424P8D9sWBZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;72/cPQH5mNLd1/e3j2Vn+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;72/cPQH5mNLd1/e3j2Vn+Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8088&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s zipfile module. When iterating over the entries of a zip archive, the process can enter into an infinite loop state and become unresponsive. This flaw allows an attacker to craft a malicious ZIP archive, leading to a denial of service from the application consuming the zipfile module. Only applications that handle user-controlled zip archives are affected by this vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-22T19:15:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-8088 https://bugzilla.redhat.com/show_bug.cgi?id=2307370 https://www.cve.org/CVERecord?id=CVE-2024-8088 https://nvd.nist.gov/vuln/detail/CVE-2024-8088 https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64 https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea https://github.com/python/cpython/issues/122905 https://github.com/python/cpython/pull/122906 https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8088.json https://access.redhat.com/errata/RHSA-2024:6163&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;72HhoIyfPMwkQyR2IF7qqw==&#34;: {&#xA;      &#34;id&#34;: &#34;72HhoIyfPMwkQyR2IF7qqw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4878&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2451615 https://www.cve.org/CVERecord?id=CVE-2026-4878 https://nvd.nist.gov/vuln/detail/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2447554 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4878.json https://access.redhat.com/errata/RHSA-2026:12441&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.48-10.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;748UmdVwB73z0xvCImrQmA==&#34;: {&#xA;      &#34;id&#34;: &#34;748UmdVwB73z0xvCImrQmA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28322&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free flaw was found in the Curl package. This issue may lead to unintended information disclosure by the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28322 https://bugzilla.redhat.com/show_bug.cgi?id=2196793 https://www.cve.org/CVERecord?id=CVE-2023-28322 https://nvd.nist.gov/vuln/detail/CVE-2023-28322 https://curl.se/docs/CVE-2023-28322.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28322.json https://access.redhat.com/errata/RHSA-2023:4354&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;74B4VkBJHkNvj2AsRU4uTw==&#34;: {&#xA;      &#34;id&#34;: &#34;74B4VkBJHkNvj2AsRU4uTw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7008&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222672 https://www.cve.org/CVERecord?id=CVE-2023-7008 https://nvd.nist.gov/vuln/detail/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222261 https://github.com/systemd/systemd/issues/25676 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7008.json https://access.redhat.com/errata/RHSA-2024:2463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-32.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;75kzXqx/LGJU9hkFlgdGGA==&#34;: {&#xA;      &#34;id&#34;: &#34;75kzXqx/LGJU9hkFlgdGGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-53905&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T20:48:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-53905 https://bugzilla.redhat.com/show_bug.cgi?id=2380362 https://www.cve.org/CVERecord?id=CVE-2025-53905 https://nvd.nist.gov/vuln/detail/CVE-2025-53905 https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239 https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-53905.json https://access.redhat.com/errata/RHSA-2025:20945&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;76mWuVYhbmIFsc4DNorK9A==&#34;: {&#xA;      &#34;id&#34;: &#34;76mWuVYhbmIFsc4DNorK9A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5917&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an &#39;off-by-one&#39; miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5917 https://bugzilla.redhat.com/show_bug.cgi?id=2370874 https://www.cve.org/CVERecord?id=CVE-2025-5917 https://nvd.nist.gov/vuln/detail/CVE-2025-5917 https://github.com/libarchive/libarchive/pull/2588 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5917.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;76ytKtBeQe8L2T7nxeVp/g==&#34;: {&#xA;      &#34;id&#34;: &#34;76ytKtBeQe8L2T7nxeVp/g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38546&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. This flaw allows an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38546 https://bugzilla.redhat.com/show_bug.cgi?id=2241938 https://access.redhat.com/errata/RHSA-2024:2101 https://www.cve.org/CVERecord?id=CVE-2023-38546 https://nvd.nist.gov/vuln/detail/CVE-2023-38546 https://curl.se/docs/CVE-2023-38546.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38546.json https://access.redhat.com/errata/RHSA-2023:6745&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;: {&#xA;      &#34;id&#34;: &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-28T16:19:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68973 https://bugzilla.redhat.com/show_bug.cgi?id=2425966 https://www.cve.org/CVERecord?id=CVE-2025-68973 https://nvd.nist.gov/vuln/detail/CVE-2025-68973 https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306 https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9 https://gpg.fail/memcpy https://news.ycombinator.com/item?id=46403200 https://www.openwall.com/lists/oss-security/2025/12/28/5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68973.json https://access.redhat.com/errata/RHSA-2026:0719&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.3.3-5.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;78ARTcr/iVbEbtXWNEyadA==&#34;: {&#xA;      &#34;id&#34;: &#34;78ARTcr/iVbEbtXWNEyadA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;78Ya60ppwS4OL6ZK9P90Qw==&#34;: {&#xA;      &#34;id&#34;: &#34;78Ya60ppwS4OL6ZK9P90Qw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27983&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27983 https://bugzilla.redhat.com/show_bug.cgi?id=2272764 https://www.cve.org/CVERecord?id=CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27983.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;791CRjnt/pj2GXzRz2PiHg==&#34;: {&#xA;      &#34;id&#34;: &#34;791CRjnt/pj2GXzRz2PiHg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability in Node.js HTTP/2 servers by sending specially crafted WINDOW_UPDATE frames on stream 0 (connection-level). These frames can cause the flow control window to exceed its maximum value, leading to a memory leak as Http2Session objects are not properly cleaned up. This can result in resource exhaustion and a Denial of Service (DoS) condition for the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21714 https://bugzilla.redhat.com/show_bug.cgi?id=2453161 https://www.cve.org/CVERecord?id=CVE-2026-21714 https://nvd.nist.gov/vuln/detail/CVE-2026-21714 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21714.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7AoZZiCMmvqX9d9WD62FnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7AoZZiCMmvqX9d9WD62FnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4781&#34;,&#xA;      &#34;description&#34;: &#34;Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1873.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4781 https://bugzilla.redhat.com/show_bug.cgi?id=2237575 https://www.cve.org/CVERecord?id=CVE-2023-4781 https://nvd.nist.gov/vuln/detail/CVE-2023-4781 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4781.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7B4LUCjMkCM+NcHtyQXyFA==&#34;: {&#xA;      &#34;id&#34;: &#34;7B4LUCjMkCM+NcHtyQXyFA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7BER6omsA92tkjpEqGZJLA==&#34;: {&#xA;      &#34;id&#34;: &#34;7BER6omsA92tkjpEqGZJLA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3277&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in SQLite’s `concat_ws()` function, where an integer overflow can be triggered. The resulting truncated integer can allocate a buffer. When SQLite writes the resulting string to the buffer, it uses the original, untruncated size, and a wild heap buffer overflow size of around 4GB can occur. This issue can result in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-14T16:50:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3277 https://bugzilla.redhat.com/show_bug.cgi?id=2359553 https://www.cve.org/CVERecord?id=CVE-2025-3277 https://nvd.nist.gov/vuln/detail/CVE-2025-3277 https://sqlite.org/src/info/498e3f1cf57f164f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3277.json https://access.redhat.com/errata/RHSA-2025:7433&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.15.0-1.module+el9.6.0+23062+9e7801b9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7CoZtRXELVa05aD7HVx7dg==&#34;: {&#xA;      &#34;id&#34;: &#34;7CoZtRXELVa05aD7HVx7dg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21710&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21710 https://bugzilla.redhat.com/show_bug.cgi?id=2453151 https://www.cve.org/CVERecord?id=CVE-2026-21710 https://nvd.nist.gov/vuln/detail/CVE-2026-21710 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21710.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7CqLd0zk1hiFU3yrvTTdyg==&#34;: {&#xA;      &#34;id&#34;: &#34;7CqLd0zk1hiFU3yrvTTdyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7FDf95fwOcyZ1YXNVDIx0A==&#34;: {&#xA;      &#34;id&#34;: &#34;7FDf95fwOcyZ1YXNVDIx0A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js due to a lack of safeguards on chunk extension bytes. The server may read an unbounded number of bytes from a single connection, which can allow an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22019 https://bugzilla.redhat.com/show_bug.cgi?id=2264574 https://www.cve.org/CVERecord?id=CVE-2024-22019 https://nvd.nist.gov/vuln/detail/CVE-2024-22019 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22019.json https://access.redhat.com/errata/RHSA-2024:1438&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-4.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7HuMMq7XSYKaQG/oWdxnyg==&#34;: {&#xA;      &#34;id&#34;: &#34;7HuMMq7XSYKaQG/oWdxnyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1094&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in PostgreSQL. Due to improper neutralization of quoting syntax, affected versions potentially allow a database input provider to achieve SQL injection in certain usage patterns. Specifically, SQL injection requires the application to use the affected function&#39;s result to construct input to psql, the PostgreSQL interactive terminal. Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when `client_encoding` is `BIG5` and `server_encoding` is one of `EUC_TW` or `MULE_INTERNAL`.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-13T13:00:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1094 https://bugzilla.redhat.com/show_bug.cgi?id=2345548 https://www.cve.org/CVERecord?id=CVE-2025-1094 https://nvd.nist.gov/vuln/detail/CVE-2025-1094 https://attackerkb.com/topics/G5s8ZWAbYH/cve-2024-12356/rapid7-analysis https://www.postgresql.org/support/security/CVE-2025-1094/ https://www.rapid7.com/blog/post/2025/02/13/cve-2025-1094-postgresql-psql-sql-injection-fixed/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1094.json https://access.redhat.com/errata/RHSA-2025:1738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpq-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:13.20-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7MUqmqmB2hEWys43ktPpcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7MUqmqmB2hEWys43ktPpcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-28131&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-28131 https://bugzilla.redhat.com/show_bug.cgi?id=2107390 https://www.cve.org/CVERecord?id=CVE-2022-28131 https://nvd.nist.gov/vuln/detail/CVE-2022-28131 https://go.dev/issue/53614 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-28131.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7NIMWPjl58dCiuwwIe4bGg==&#34;: {&#xA;      &#34;id&#34;: &#34;7NIMWPjl58dCiuwwIe4bGg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5129&#34;,&#xA;      &#34;description&#34;: &#34;This CVE ID has been rejected by its CVE Numbering Authority. Duplicate of CVE-2023-4863.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5129 https://bugzilla.redhat.com/show_bug.cgi?id=2240759 https://www.cve.org/CVERecord?id=CVE-2023-5129 https://nvd.nist.gov/vuln/detail/CVE-2023-5129 https://chromium.googlesource.com/webm/libwebp/+/2af26267cdfcb63a88e5c74a85927a12d6ca1d76 https://chromium.googlesource.com/webm/libwebp/+/902bc9190331343b2017211debcec8d2ab87e17a https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5129.json https://access.redhat.com/errata/RHSA-2023:5214&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libwebp-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.2.0-7.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7Q0Bus9RTfFy/UrxkfH2sQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7Q0Bus9RTfFy/UrxkfH2sQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28863&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in ISAACS&#39;s node-tar, where it is vulnerable to a denial of service, caused by the lack of folder count validation. The vulnerability exists due to the application not properly controlling the consumption of internal resources while parsing a tar file. By sending a specially crafted request, a remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28863 https://bugzilla.redhat.com/show_bug.cgi?id=2293200 https://www.cve.org/CVERecord?id=CVE-2024-28863 https://nvd.nist.gov/vuln/detail/CVE-2024-28863 https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36 https://security.netapp.com/advisory/ntap-20240524-0005/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28863.json https://access.redhat.com/errata/RHSA-2024:6147&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7Q4dYBj4wFa2768mWculSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7Q4dYBj4wFa2768mWculSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7QBYsSaCu8T87GZR3WHxyw==&#34;: {&#xA;      &#34;id&#34;: &#34;7QBYsSaCu8T87GZR3WHxyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6409&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was discovered in how signals are handled by OpenSSH&#39;s server (sshd). If a remote attacker does not authenticate within a set time period, then sshd&#39;s SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-08T17:45:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6409 https://bugzilla.redhat.com/show_bug.cgi?id=2295085 https://www.cve.org/CVERecord?id=CVE-2024-6409 https://nvd.nist.gov/vuln/detail/CVE-2024-6409 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6409.json https://access.redhat.com/errata/RHSA-2024:4457&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-38.el9_4.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7SutUCP3yRd4o5ryN/dDZA==&#34;: {&#xA;      &#34;id&#34;: &#34;7SutUCP3yRd4o5ryN/dDZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7SyD51cUTMP7ddBSGNw3Iw==&#34;: {&#xA;      &#34;id&#34;: &#34;7SyD51cUTMP7ddBSGNw3Iw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-1394&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \&#34;return nil, nil, fail(...)\&#34; pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-1394 https://bugzilla.redhat.com/show_bug.cgi?id=2262921 https://www.cve.org/CVERecord?id=CVE-2024-1394 https://nvd.nist.gov/vuln/detail/CVE-2024-1394 https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136 https://github.com/golang-fips/openssl/security/advisories/GHSA-78hx-gp6g-7mj6 https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f https://pkg.go.dev/vuln/GO-2024-2660 https://vuln.go.dev/ID/GO-2024-2660.json https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-1394.json https://access.redhat.com/errata/RHSA-2024:1462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-2.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7T9qiwKBE1swIXuW9Zvewg==&#34;: {&#xA;      &#34;id&#34;: &#34;7T9qiwKBE1swIXuW9Zvewg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27534&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27534 https://bugzilla.redhat.com/show_bug.cgi?id=2179069 https://www.cve.org/CVERecord?id=CVE-2023-27534 https://nvd.nist.gov/vuln/detail/CVE-2023-27534 https://curl.se/docs/CVE-2023-27534.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27534.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7TWJhc3cfFgph89dsQ0nBA==&#34;: {&#xA;      &#34;id&#34;: &#34;7TWJhc3cfFgph89dsQ0nBA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31130&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs in the ares_inet_net_pton() function, which is vulnerable to a buffer underflow for certain ipv6 addresses. \&#34;0::00:00:00/2\&#34; in particular was found to cause an issue. C-ares only uses this function internally for configuration purposes, which would require an administrator to configure such an address via ares_set_sortlist().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31130 https://bugzilla.redhat.com/show_bug.cgi?id=2209497 https://www.cve.org/CVERecord?id=CVE-2023-31130 https://nvd.nist.gov/vuln/detail/CVE-2023-31130 https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31130.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7U+8ffRP7ahu1ot4Zj5Zlw==&#34;: {&#xA;      &#34;id&#34;: &#34;7U+8ffRP7ahu1ot4Zj5Zlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34156&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34156 https://bugzilla.redhat.com/show_bug.cgi?id=2310528 https://www.cve.org/CVERecord?id=CVE-2024-34156 https://nvd.nist.gov/vuln/detail/CVE-2024-34156 https://go.dev/cl/611239 https://go.dev/issue/69139 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3106 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34156.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;delve&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.1-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7UXEplX43qBZDj2wJI621A==&#34;: {&#xA;      &#34;id&#34;: &#34;7UXEplX43qBZDj2wJI621A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32989&#34;,&#xA;      &#34;description&#34;: &#34;A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T07:54:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32989 https://bugzilla.redhat.com/show_bug.cgi?id=2359621 https://www.cve.org/CVERecord?id=CVE-2025-32989 https://nvd.nist.gov/vuln/detail/CVE-2025-32989 https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32989.json https://access.redhat.com/errata/RHSA-2025:16116&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-6.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7W/pTtx9kAg13U/6tl322g==&#34;: {&#xA;      &#34;id&#34;: &#34;7W/pTtx9kAg13U/6tl322g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7XOAm91CGfyc8WKL2gtbrA==&#34;: {&#xA;      &#34;id&#34;: &#34;7XOAm91CGfyc8WKL2gtbrA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1528&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici&#39;s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:21:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1528 https://bugzilla.redhat.com/show_bug.cgi?id=2447145 https://www.cve.org/CVERecord?id=CVE-2026-1528 https://nvd.nist.gov/vuln/detail/CVE-2026-1528 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj https://hackerone.com/reports/3537648 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1528.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7XSgHUx9G277ukge5cFkHw==&#34;: {&#xA;      &#34;id&#34;: &#34;7XSgHUx9G277ukge5cFkHw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6075&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in Python’s os.path.expandvars() function that can cause performance degradation. When processing specially crafted, user-controlled input with nested environment variable patterns, the function exhibits quadratic time complexity, potentially leading to excessive CPU usage and denial of service (DoS) conditions. No code execution or data exposure occurs, so the impact is limited to performance slowdown.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-31T16:41:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6075 https://bugzilla.redhat.com/show_bug.cgi?id=2408891 https://www.cve.org/CVERecord?id=CVE-2025-6075 https://nvd.nist.gov/vuln/detail/CVE-2025-6075 https://github.com/python/cpython/issues/136065 https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6075.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7Z352FfiS2LxToBH4DWhEg==&#34;: {&#xA;      &#34;id&#34;: &#34;7Z352FfiS2LxToBH4DWhEg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7ZyXE8z7uZKjHitrjhSWQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7ZyXE8z7uZKjHitrjhSWQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32006&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32006 https://bugzilla.redhat.com/show_bug.cgi?id=2230955 https://www.cve.org/CVERecord?id=CVE-2023-32006 https://nvd.nist.gov/vuln/detail/CVE-2023-32006 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32006.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;: {&#xA;      &#34;id&#34;: &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40356&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in MIT Kerberos 5 (krb5). An unauthenticated remote attacker can exploit an integer underflow and an out-of-bounds read vulnerability by calling `gss_accept_sec_context()` on a system with a NegoEx mechanism registered. This can lead to the process terminating, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-40356 https://bugzilla.redhat.com/show_bug.cgi?id=2463368 https://www.cve.org/CVERecord?id=CVE-2026-40356 https://nvd.nist.gov/vuln/detail/CVE-2026-40356 https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.html https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929f https://web.mit.edu/kerberos/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-40356.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7aOJwf1br9gIaC1RH6UwDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7aOJwf1br9gIaC1RH6UwDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0537&#34;,&#xA;      &#34;description&#34;: &#34;Panic when decoding Float and Rat types in math/big&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-01T22:21:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/417774 https://go.googlesource.com/go/+/055113ef364337607e3e72ed7d48df67fde6fc66 https://go.dev/issue/53871 https://groups.google.com/g/golang-announce/c/YqYYG87xB10&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.5&#34;&#xA;    },&#xA;    &#34;7bYXVEfvDWEIL53s8ARxGg==&#34;: {&#xA;      &#34;id&#34;: &#34;7bYXVEfvDWEIL53s8ARxGg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22866&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-06T16:54:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22866 https://bugzilla.redhat.com/show_bug.cgi?id=2344219 https://www.cve.org/CVERecord?id=CVE-2025-22866 https://nvd.nist.gov/vuln/detail/CVE-2025-22866 https://go.dev/cl/643735 https://go.dev/issue/71383 https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k https://pkg.go.dev/vuln/GO-2025-3447 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22866.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7cYNZPh51XXj7WctPkn2Ww==&#34;: {&#xA;      &#34;id&#34;: &#34;7cYNZPh51XXj7WctPkn2Ww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25547&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-04T21:51:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25547 https://bugzilla.redhat.com/show_bug.cgi?id=2436942 https://www.cve.org/CVERecord?id=CVE-2026-25547 https://nvd.nist.gov/vuln/detail/CVE-2026-25547 https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25547.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7cqLG7sQEqqh9WoHfpekpw==&#34;: {&#xA;      &#34;id&#34;: &#34;7cqLG7sQEqqh9WoHfpekpw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61724&#34;,&#xA;      &#34;description&#34;: &#34;The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T22:10:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61724 https://bugzilla.redhat.com/show_bug.cgi?id=2407257 https://www.cve.org/CVERecord?id=CVE-2025-61724 https://nvd.nist.gov/vuln/detail/CVE-2025-61724 https://go.dev/cl/709859 https://go.dev/issue/75716 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://pkg.go.dev/vuln/GO-2025-4015 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61724.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7czTMSwqOjLz2LigIYHAeg==&#34;: {&#xA;      &#34;id&#34;: &#34;7czTMSwqOjLz2LigIYHAeg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4673&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in net/http. Handling Proxy-Authorization and Proxy-Authenticate headers during cross-origin redirects allows these headers to be inadvertently forwarded, potentially exposing sensitive authentication credentials. This flaw allows a network-based attacker to manipulate redirect responses, unintentionally exposing authentication details to unauthorized parties.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T16:42:53Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4673 https://bugzilla.redhat.com/show_bug.cgi?id=2373305 https://www.cve.org/CVERecord?id=CVE-2025-4673 https://nvd.nist.gov/vuln/detail/CVE-2025-4673 https://go.dev/cl/679257 https://go.dev/issue/73816 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A https://pkg.go.dev/vuln/GO-2025-3751 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4673.json https://access.redhat.com/errata/RHSA-2025:10676&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.4-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7d4YdteAff532bV2Gg5lmw==&#34;: {&#xA;      &#34;id&#34;: &#34;7d4YdteAff532bV2Gg5lmw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7df4FOgRU0BSF6P5QJkjaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7df4FOgRU0BSF6P5QJkjaQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9355&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum.  It is also possible to force a derived key to be all zeros instead of an unpredictable value.  This may have follow-on implications for the Go TLS stack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-30T20:53:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9355 https://bugzilla.redhat.com/show_bug.cgi?id=2315719 https://www.cve.org/CVERecord?id=CVE-2024-9355 https://nvd.nist.gov/vuln/detail/CVE-2024-9355 https://github.com/golang-fips/openssl/pull/198 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9355.json https://access.redhat.com/errata/RHSA-2024:7550&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-4.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;: {&#xA;      &#34;id&#34;: &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7gOP9DIpChjY4waX+o9WXg==&#34;: {&#xA;      &#34;id&#34;: &#34;7gOP9DIpChjY4waX+o9WXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61727&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/x509 package in the Go standard library. This vulnerability allows a certificate validation bypass via an excluded subdomain constraint in a certificated chain as it does not restrict the usage of wildcard SANs in the leaf certificate.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-03T19:37:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61727 https://bugzilla.redhat.com/show_bug.cgi?id=2418677 https://www.cve.org/CVERecord?id=CVE-2025-61727 https://nvd.nist.gov/vuln/detail/CVE-2025-61727 https://go.dev/cl/723900 https://go.dev/issue/76442 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 https://pkg.go.dev/vuln/GO-2025-4175 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61727.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7jE4UN8ZNzWXfNDZ8BZq3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;7jE4UN8ZNzWXfNDZ8BZq3Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47279&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak vulnerability has been discovered in the Undici HTTP/1.1 client library. This flaw can be triggered by repeatedly calling a webhook endpoint that presents an invalid TLS certificate. Continuous interaction with such an endpoint can cause the Undici library to allocate memory without properly releasing it, potentially leading to excessive memory consumption. Over time, this could result in resource exhaustion, impacting the availability and stability of applications relying on Undici for webhook communication.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-15T17:16:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47279 https://bugzilla.redhat.com/show_bug.cgi?id=2366632 https://www.cve.org/CVERecord?id=CVE-2025-47279 https://nvd.nist.gov/vuln/detail/CVE-2025-47279 https://github.com/nodejs/undici/issues/3895 https://github.com/nodejs/undici/pull/4088 https://github.com/nodejs/undici/security/advisories/GHSA-cxrh-j4jr-qwg3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47279.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7oEe6HdmVrscCmplGQsEeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7oEe6HdmVrscCmplGQsEeQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23936&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the fetch API in Node.js that did not prevent CRLF injection in the &#39;host&#39; header. This issue could allow HTTP response splitting and HTTP header injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23936 https://bugzilla.redhat.com/show_bug.cgi?id=2172190 https://www.cve.org/CVERecord?id=CVE-2023-23936 https://nvd.nist.gov/vuln/detail/CVE-2023-23936 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23936.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7sGexlbSpX41SOBbWHg8BQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7sGexlbSpX41SOBbWHg8BQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-39881&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. A command injection vulnerability in Vim&#39;s NetBeans interface allows a malicious NetBeans server to execute arbitrary Ex commands when Vim connects to it. This occurs due to unsanitized strings in the defineAnnoType and specialKeys protocol messages, leading to arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T20:18:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-39881 https://bugzilla.redhat.com/show_bug.cgi?id=2456722 https://www.cve.org/CVERecord?id=CVE-2026-39881 https://nvd.nist.gov/vuln/detail/CVE-2026-39881 https://github.com/vim/vim/commit/7ab76a86048ed492374ac6b19 https://github.com/vim/vim/releases/tag/v9.2.0316 https://github.com/vim/vim/security/advisories/GHSA-mr87-rhgv-7pw6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-39881.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7tWeNpgpS6TZ4aQUo8g9NQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7tWeNpgpS6TZ4aQUo8g9NQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30590&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30590 https://bugzilla.redhat.com/show_bug.cgi?id=2219842 https://www.cve.org/CVERecord?id=CVE-2023-30590 https://nvd.nist.gov/vuln/detail/CVE-2023-30590 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30590.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.1-1.18.16.1.1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7tbcfIdYm3nwAiNQR5eK/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;7tbcfIdYm3nwAiNQR5eK/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7uj4PEKyThSRh2msjDtceg==&#34;: {&#xA;      &#34;id&#34;: &#34;7uj4PEKyThSRh2msjDtceg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22025&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22025 https://bugzilla.redhat.com/show_bug.cgi?id=2270559 https://www.cve.org/CVERecord?id=CVE-2024-22025 https://nvd.nist.gov/vuln/detail/CVE-2024-22025 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22025.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7v+kCrIi/mMmyn+o9Uh+oA==&#34;: {&#xA;      &#34;id&#34;: &#34;7v+kCrIi/mMmyn+o9Uh+oA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48337&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Emacs package. This flaw allows attackers to execute commands via shell metacharacters in the name of a source-code file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-48337 https://bugzilla.redhat.com/show_bug.cgi?id=2171987 https://www.cve.org/CVERecord?id=CVE-2022-48337 https://nvd.nist.gov/vuln/detail/CVE-2022-48337 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-48337.json https://access.redhat.com/errata/RHSA-2023:2626&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:27.2-8.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7y5jXLyua18Srex9lNrfkQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7y5jXLyua18Srex9lNrfkQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4741&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in OpenSSL. Calling the OpenSSL API SSL_free_buffers function may cause memory to be accessed that was previously freed in some situations.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4741 https://bugzilla.redhat.com/show_bug.cgi?id=2283757 https://www.cve.org/CVERecord?id=CVE-2024-4741 https://nvd.nist.gov/vuln/detail/CVE-2024-4741 https://www.openssl.org/news/secadv/20240528.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4741.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;81pNWZHPHOUJjusdIRcrCg==&#34;: {&#xA;      &#34;id&#34;: &#34;81pNWZHPHOUJjusdIRcrCg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-45582&#34;,&#xA;      &#34;description&#34;: &#34;A relative path traversal flaw was found in the gnu tar utility. When archives with relative paths are extracted without the ‘--keep-old-files’ (‘-k’), the extraction process may overwrite existing files that the current user has access to. The server may be impacted if these files are critical to the operation of some service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-45582 https://bugzilla.redhat.com/show_bug.cgi?id=2379592 https://www.cve.org/CVERecord?id=CVE-2025-45582 https://nvd.nist.gov/vuln/detail/CVE-2025-45582 https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md https://www.gnu.org/software/tar/ https://www.gnu.org/software/tar/manual/html_node/Integrity.html#Integrity https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-45582.json https://access.redhat.com/errata/RHSA-2026:0067&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.34-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;82S4cf8ecOlHYb8LNQQn+w==&#34;: {&#xA;      &#34;id&#34;: &#34;82S4cf8ecOlHYb8LNQQn+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28322&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free flaw was found in the Curl package. This issue may lead to unintended information disclosure by the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28322 https://bugzilla.redhat.com/show_bug.cgi?id=2196793 https://www.cve.org/CVERecord?id=CVE-2023-28322 https://nvd.nist.gov/vuln/detail/CVE-2023-28322 https://curl.se/docs/CVE-2023-28322.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28322.json https://access.redhat.com/errata/RHSA-2023:4354&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;830L36AKCoBHnXPHE6R6uQ==&#34;: {&#xA;      &#34;id&#34;: &#34;830L36AKCoBHnXPHE6R6uQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;833/aZmn4g2C0czWW40RBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;833/aZmn4g2C0czWW40RBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-3503&#34;,&#xA;      &#34;description&#34;: &#34;HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-12T18:17:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/654697 https://go.dev/issue/71984 https://groups.google.com/g/golang-announce/c/4t3lzH3I0eI/m/b42ImqrBAQAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.23.7&#34;&#xA;    },&#xA;    &#34;842T09LMtibo6aQ7X6A47A==&#34;: {&#xA;      &#34;id&#34;: &#34;842T09LMtibo6aQ7X6A47A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-mro&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;84g+WJ21VVZ5YgyE9krInA==&#34;: {&#xA;      &#34;id&#34;: &#34;84g+WJ21VVZ5YgyE9krInA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4435&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython&#39;s tarfile module. This vulnerability allows unauthorized file extraction via crafted tar archives when TarFile.errorlevel=0, bypassing expected filtering mechanisms.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:59:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4435 https://bugzilla.redhat.com/show_bug.cgi?id=2370010 https://www.cve.org/CVERecord?id=CVE-2025-4435 https://nvd.nist.gov/vuln/detail/CVE-2025-4435 https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4435.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8563iLEht/ghMGItALTFUw==&#34;: {&#xA;      &#34;id&#34;: &#34;8563iLEht/ghMGItALTFUw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28419&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, an open-source command-line text editor. This vulnerability, a heap-based buffer underflow, occurs when Vim processes a specially crafted Emacs-style tags file. If a malicious file with a delimiter at the start of a line is opened, Vim attempts to read memory outside its designated area. This could lead to the disclosure of sensitive information or cause the application to crash, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-27T22:02:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28419 https://bugzilla.redhat.com/show_bug.cgi?id=2443482 https://www.cve.org/CVERecord?id=CVE-2026-28419 https://nvd.nist.gov/vuln/detail/CVE-2026-28419 https://github.com/vim/vim/commit/9b7dfa2948c9e1e5e32a5812 https://github.com/vim/vim/releases/tag/v9.2.0075 https://github.com/vim/vim/security/advisories/GHSA-xcc8-r6c5-hvwv https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28419.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;869xwjsmIoG+JuVnJO5pSA==&#34;: {&#xA;      &#34;id&#34;: &#34;869xwjsmIoG+JuVnJO5pSA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6176&#34;,&#xA;      &#34;description&#34;: &#34;Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-31T00:00:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6176 https://bugzilla.redhat.com/show_bug.cgi?id=2408762 https://www.cve.org/CVERecord?id=CVE-2025-6176 https://nvd.nist.gov/vuln/detail/CVE-2025-6176 https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6176.json https://access.redhat.com/errata/RHSA-2026:2042&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;brotli&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.0.9-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;87p97+dH2sU2JVQ8vQ+Xuw==&#34;: {&#xA;      &#34;id&#34;: &#34;87p97+dH2sU2JVQ8vQ+Xuw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-48795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the SSH channel integrity. By manipulating sequence numbers during the handshake, an attacker can remove the initial messages on the secure channel without causing a MAC failure. For example, an attacker could disable the ping extension and thus disable the new countermeasure in OpenSSH 9.5 against keystroke timing attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-48795 https://bugzilla.redhat.com/show_bug.cgi?id=2254210 https://www.cve.org/CVERecord?id=CVE-2023-48795 https://nvd.nist.gov/vuln/detail/CVE-2023-48795 https://access.redhat.com/solutions/7071748 https://terrapin-attack.com/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48795.json https://access.redhat.com/errata/RHSA-2024:1130&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-34.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;88J81+RFP5n56+M0nMV4iQ==&#34;: {&#xA;      &#34;id&#34;: &#34;88J81+RFP5n56+M0nMV4iQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55130&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55130 https://bugzilla.redhat.com/show_bug.cgi?id=2431352 https://www.cve.org/CVERecord?id=CVE-2025-55130 https://nvd.nist.gov/vuln/detail/CVE-2025-55130 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55130.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.4-1.22.22.0.1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;89XrIFUuuXy08LkDR6XMOw==&#34;: {&#xA;      &#34;id&#34;: &#34;89XrIFUuuXy08LkDR6XMOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-31879&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in wget. If wget sends an Authorization header as part of a query and receives an HTTP REDIRECT to a third party in return, the Authorization header will be forwarded as part of the redirected request. This issue creates a password leak, as the second server receives the password. The highest threat from this vulnerability is confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-31879 https://bugzilla.redhat.com/show_bug.cgi?id=1955316 https://www.cve.org/CVERecord?id=CVE-2021-31879 https://nvd.nist.gov/vuln/detail/CVE-2021-31879 https://savannah.gnu.org/bugs/?56909 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-31879.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;wget&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8BMA6LbX8vjrr4aUcmHB5w==&#34;: {&#xA;      &#34;id&#34;: &#34;8BMA6LbX8vjrr4aUcmHB5w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24329&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24329 https://bugzilla.redhat.com/show_bug.cgi?id=2173917 https://www.cve.org/CVERecord?id=CVE-2023-24329 https://nvd.nist.gov/vuln/detail/CVE-2023-24329 https://pointernull.com/security/python-url-parse-problem.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24329.json https://access.redhat.com/errata/RHSA-2023:3595&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.16-1.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8BsUEMjLB96UtpRd1ludrg==&#34;: {&#xA;      &#34;id&#34;: &#34;8BsUEMjLB96UtpRd1ludrg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25629&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25629 https://bugzilla.redhat.com/show_bug.cgi?id=2265713 https://www.cve.org/CVERecord?id=CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629 https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25629.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8CpdPmXa4Bke5riHaKWhcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8CpdPmXa4Bke5riHaKWhcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55132&#34;,&#xA;      &#34;description&#34;: &#34;A file access flaw has been discovered in NodeJS. A file&#39;s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55132 https://bugzilla.redhat.com/show_bug.cgi?id=2431338 https://www.cve.org/CVERecord?id=CVE-2025-55132 https://nvd.nist.gov/vuln/detail/CVE-2025-55132 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55132.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.4-1.22.22.0.1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8Efa1m3XsyOFY5vSd2fHNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8Efa1m3XsyOFY5vSd2fHNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7104&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in SQLite3. This issue affects the sessionReadRecord function of the ext/session/sqlite3session.c function in the make alltest Handler component. Manipulation may cause a heap-based buffer overflow to occur.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7104 https://bugzilla.redhat.com/show_bug.cgi?id=2256194 https://www.cve.org/CVERecord?id=CVE-2023-7104 https://nvd.nist.gov/vuln/detail/CVE-2023-7104 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7104.json https://access.redhat.com/errata/RHSA-2024:0465&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-7.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8Gv2MnEpGRP5xQ5SzNJn8w==&#34;: {&#xA;      &#34;id&#34;: &#34;8Gv2MnEpGRP5xQ5SzNJn8w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8I+OMKXto/vUm6tBBR6EYQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8I+OMKXto/vUm6tBBR6EYQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25646&#34;,&#xA;      &#34;description&#34;: &#34;A heap based buffer overflow flaw has been discovered in LibPNG. Prior to version 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user&#39;s display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T17:04:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25646 https://bugzilla.redhat.com/show_bug.cgi?id=2438542 https://www.cve.org/CVERecord?id=CVE-2026-25646 https://nvd.nist.gov/vuln/detail/CVE-2026-25646 http://www.openwall.com/lists/oss-security/2026/02/09/7 https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88 https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25646.json https://access.redhat.com/errata/RHSA-2026:3405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8ImlkqI0B9hvKdKXJLla/w==&#34;: {&#xA;      &#34;id&#34;: &#34;8ImlkqI0B9hvKdKXJLla/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47907&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in database/sql. Concurrent queries can produce unexpected results when a query is cancelled during a Scan method call on returned Rows, creating a race condition. This vulnerability allows an attacker who can initiate and cancel queries to trigger this condition, possibly leading to inconsistent data being returned to the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-07T15:25:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47907 https://bugzilla.redhat.com/show_bug.cgi?id=2387083 https://www.cve.org/CVERecord?id=CVE-2025-47907 https://nvd.nist.gov/vuln/detail/CVE-2025-47907 https://go.dev/cl/693735 https://go.dev/issue/74831 https://groups.google.com/g/golang-announce/c/x5MKroML2yM https://pkg.go.dev/vuln/GO-2025-3849 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47907.json https://access.redhat.com/errata/RHSA-2025:13935&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.6-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8Ldq46rf2Z9JTBjkrtfV0g==&#34;: {&#xA;      &#34;id&#34;: &#34;8Ldq46rf2Z9JTBjkrtfV0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5678&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL, which caused the generation or checking of long X9.42 DH keys or parameters to be much slower than expected. This issue could lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5678 https://bugzilla.redhat.com/show_bug.cgi?id=2248616 https://www.cve.org/CVERecord?id=CVE-2023-5678 https://nvd.nist.gov/vuln/detail/CVE-2023-5678 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6 https://www.openssl.org/news/secadv/20231106.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5678.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8ML0IVFlCjXlypnsSOqB1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;8ML0IVFlCjXlypnsSOqB1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;: {&#xA;      &#34;id&#34;: &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15224&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15224 https://bugzilla.redhat.com/show_bug.cgi?id=2426410 https://www.cve.org/CVERecord?id=CVE-2025-15224 https://nvd.nist.gov/vuln/detail/CVE-2025-15224 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15224.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8OhIIjb+vwm01NjtGgcnDw==&#34;: {&#xA;      &#34;id&#34;: &#34;8OhIIjb+vwm01NjtGgcnDw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8Q2ZBhYapsH90MwXLMDOQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8Q2ZBhYapsH90MwXLMDOQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-26T01:07:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27904 https://bugzilla.redhat.com/show_bug.cgi?id=2442922 https://www.cve.org/CVERecord?id=CVE-2026-27904 https://nvd.nist.gov/vuln/detail/CVE-2026-27904 https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27904.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.2-1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8QRmG/+fMsQQzP2maaxOag==&#34;: {&#xA;      &#34;id&#34;: &#34;8QRmG/+fMsQQzP2maaxOag==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-48386&#34;,&#xA;      &#34;description&#34;: &#34;A credential handling flaw has been discovered in git. The wincred credential helper uses a static buffer (target) as a unique key for storing and comparing against internal storage. This credential helper does not properly bounds check the available space remaining in the buffer before appending to it with wcsncat(), which can lead to buffer overflows.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T18:23:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-48386 https://bugzilla.redhat.com/show_bug.cgi?id=2378807 https://www.cve.org/CVERecord?id=CVE-2025-48386 https://nvd.nist.gov/vuln/detail/CVE-2025-48386 https://github.com/git/git/security/advisories/GHSA-4v56-3xvj-xvfr https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-48386.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8T8GNMb/g1PeB57LD09kow==&#34;: {&#xA;      &#34;id&#34;: &#34;8T8GNMb/g1PeB57LD09kow==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55131&#34;,&#xA;      &#34;description&#34;: &#34;A memory exposure flaw has been discovered in Node.js. A flaw in Node.js&#39;s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55131 https://bugzilla.redhat.com/show_bug.cgi?id=2431350 https://www.cve.org/CVERecord?id=CVE-2025-55131 https://nvd.nist.gov/vuln/detail/CVE-2025-55131 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55131.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8TL7OmwuwkB+6m9uO5u62g==&#34;: {&#xA;      &#34;id&#34;: &#34;8TL7OmwuwkB+6m9uO5u62g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2581&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Undici. When the `interceptors.deduplicate()` feature is enabled, response data for deduplicated requests can accumulate in memory. A remote attacker, by sending large or chunked responses and concurrent identical requests from an untrusted endpoint, can exploit this uncontrolled resource consumption. This leads to high memory usage and potential Out-Of-Memory (OOM) process termination, resulting in a Denial of Service (DoS) for the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:13:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2581 https://bugzilla.redhat.com/show_bug.cgi?id=2447140 https://www.cve.org/CVERecord?id=CVE-2026-2581 https://nvd.nist.gov/vuln/detail/CVE-2026-2581 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h https://hackerone.com/reports/3513473 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2581.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8Ug8/LJbCT7/mzHPjLi21A==&#34;: {&#xA;      &#34;id&#34;: &#34;8Ug8/LJbCT7/mzHPjLi21A==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1987&#34;,&#xA;      &#34;description&#34;: &#34;Large RSA keys can cause high CPU usage in crypto/tls&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-02T17:25:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/61460 https://go.dev/cl/515257 https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.12&#34;&#xA;    },&#xA;    &#34;8WJdLrW8n72AHCvZK8pH9w==&#34;: {&#xA;      &#34;id&#34;: &#34;8WJdLrW8n72AHCvZK8pH9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47273&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability in the Python setuptools library allows attackers with limited system access to write files outside the intended temporary directory by manipulating package download URLs. This flaw bypasses basic filename sanitization and can lead to unauthorized overwrites of important system files, creating opportunities for further compromise. While it doesn&#39;t expose data or require user interaction, it poses a high integrity risk and is especially concerning in environments that rely on automated package handling or internal tooling built on setuptools.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-17T15:46:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47273 https://bugzilla.redhat.com/show_bug.cgi?id=2366982 https://www.cve.org/CVERecord?id=CVE-2025-47273 https://nvd.nist.gov/vuln/detail/CVE-2025-47273 https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88 https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b https://github.com/pypa/setuptools/issues/4946 https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47273.json https://access.redhat.com/errata/RHSA-2025:10407&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:53.0.0-13.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8XLKalkulxeAh8qfecmGlA==&#34;: {&#xA;      &#34;id&#34;: &#34;8XLKalkulxeAh8qfecmGlA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66861&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted PE file with cxxfilt can trigger an out-of-bounds read in the d_unqualified_name function in the cp-demangle.c file, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66861 https://bugzilla.redhat.com/show_bug.cgi?id=2425823 https://www.cve.org/CVERecord?id=CVE-2025-66861 https://nvd.nist.gov/vuln/detail/CVE-2025-66861 https://github.com/caozhzh/CRGF-Vul/blob/main/cxxfilt/crash1.md https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66861.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0992&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated \u003cnextCatalog\u003e elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0992 https://bugzilla.redhat.com/show_bug.cgi?id=2429975 https://www.cve.org/CVERecord?id=CVE-2026-0992 https://nvd.nist.gov/vuln/detail/CVE-2026-0992 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1019 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0992.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8ZrkaQ6B1f36PC2cIg9i6A==&#34;: {&#xA;      &#34;id&#34;: &#34;8ZrkaQ6B1f36PC2cIg9i6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6409&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was discovered in how signals are handled by OpenSSH&#39;s server (sshd). If a remote attacker does not authenticate within a set time period, then sshd&#39;s SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-08T17:45:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6409 https://bugzilla.redhat.com/show_bug.cgi?id=2295085 https://www.cve.org/CVERecord?id=CVE-2024-6409 https://nvd.nist.gov/vuln/detail/CVE-2024-6409 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6409.json https://access.redhat.com/errata/RHSA-2024:4457&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-38.el9_4.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8Zz8gP9QPTYBttUQXDeNpg==&#34;: {&#xA;      &#34;id&#34;: &#34;8Zz8gP9QPTYBttUQXDeNpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4373&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4373 https://bugzilla.redhat.com/show_bug.cgi?id=2364265 https://www.cve.org/CVERecord?id=CVE-2025-4373 https://nvd.nist.gov/vuln/detail/CVE-2025-4373 https://gitlab.gnome.org/GNOME/glib/-/issues/3677 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4373.json https://access.redhat.com/errata/RHSA-2025:11140&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-16.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8bMBj5vTG1tOpQ1wuVD1bQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8bMBj5vTG1tOpQ1wuVD1bQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0532&#34;,&#xA;      &#34;description&#34;: &#34;Empty Cmd.Path can trigger unintended binary in os/exec on Windows&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-26T21:41:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/403759 https://go.googlesource.com/go/+/960ffa98ce73ef2c2060c84c7ac28d37a83f345e https://go.dev/issue/52574 https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3&#34;&#xA;    },&#xA;    &#34;8dARvXsFfslEQUJNpOVqyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8dARvXsFfslEQUJNpOVqyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-4007&#34;,&#xA;      &#34;description&#34;: &#34;Quadratic complexity when checking name constraints in crypto/x509&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T21:49:50Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/75681 https://go.dev/cl/709854 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.9&#34;&#xA;    },&#xA;    &#34;8dqpgv7n5GVlIYVt/hP0Gg==&#34;: {&#xA;      &#34;id&#34;: &#34;8dqpgv7n5GVlIYVt/hP0Gg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-24855&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxslt numbers.c. This vulnerability allows a use-after-free, potentially leading to memory corruption or code execution via nested XPath evaluations where an XPath context node can be modified but not restored.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-24855 https://bugzilla.redhat.com/show_bug.cgi?id=2352483 https://www.cve.org/CVERecord?id=CVE-2025-24855 https://nvd.nist.gov/vuln/detail/CVE-2025-24855 https://gitlab.gnome.org/GNOME/libxslt/-/issues/128 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-24855.json https://access.redhat.com/errata/RHSA-2025:3107&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxslt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.1.34-9.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8eY8PV83CN3R/MV2hK7XHA==&#34;: {&#xA;      &#34;id&#34;: &#34;8eY8PV83CN3R/MV2hK7XHA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8efBqSZ3OYqd+nT8a21FNA==&#34;: {&#xA;      &#34;id&#34;: &#34;8efBqSZ3OYqd+nT8a21FNA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2287&#34;,&#xA;      &#34;description&#34;: &#34;Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2287 https://bugzilla.redhat.com/show_bug.cgi?id=2103876 https://www.cve.org/CVERecord?id=CVE-2022-2287 https://nvd.nist.gov/vuln/detail/CVE-2022-2287 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2287.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8ez1JQpqUyVUQaplF/dpog==&#34;: {&#xA;      &#34;id&#34;: &#34;8ez1JQpqUyVUQaplF/dpog==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46218&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl that verifies a given cookie domain against the Public Suffix List. This issue could allow a malicious HTTP server to set \&#34;super cookies\&#34; in curl that are passed back to more origins than what is otherwise allowed or possible.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T07:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46218 https://bugzilla.redhat.com/show_bug.cgi?id=2252030 https://www.cve.org/CVERecord?id=CVE-2023-46218 https://nvd.nist.gov/vuln/detail/CVE-2023-46218 https://curl.se/docs/CVE-2023-46218.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46218.json https://access.redhat.com/errata/RHSA-2024:1129&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8gEKPHHBHHTuUEvwhsnEFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8gEKPHHBHHTuUEvwhsnEFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8gQtKtb/Xr3aGfsLtKyetA==&#34;: {&#xA;      &#34;id&#34;: &#34;8gQtKtb/Xr3aGfsLtKyetA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8ix99v6BzhAwu2rRaagVKw==&#34;: {&#xA;      &#34;id&#34;: &#34;8ix99v6BzhAwu2rRaagVKw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47273&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability in the Python setuptools library allows attackers with limited system access to write files outside the intended temporary directory by manipulating package download URLs. This flaw bypasses basic filename sanitization and can lead to unauthorized overwrites of important system files, creating opportunities for further compromise. While it doesn&#39;t expose data or require user interaction, it poses a high integrity risk and is especially concerning in environments that rely on automated package handling or internal tooling built on setuptools.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-17T15:46:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47273 https://bugzilla.redhat.com/show_bug.cgi?id=2366982 https://www.cve.org/CVERecord?id=CVE-2025-47273 https://nvd.nist.gov/vuln/detail/CVE-2025-47273 https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88 https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b https://github.com/pypa/setuptools/issues/4946 https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47273.json https://access.redhat.com/errata/RHSA-2025:10407&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-setuptools-wheel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:53.0.0-13.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8kPW6EH9br7BQBK1DHvQsA==&#34;: {&#xA;      &#34;id&#34;: &#34;8kPW6EH9br7BQBK1DHvQsA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21892&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. On Linux, Node.js ignores certain environment variables if an unprivileged user has set them while the process is running with elevated privileges, except for CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when other capabilities have been set. This flaw allows unprivileged users to inject code that inherits the process&#39;s elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21892 https://bugzilla.redhat.com/show_bug.cgi?id=2264582 https://www.cve.org/CVERecord?id=CVE-2024-21892 https://nvd.nist.gov/vuln/detail/CVE-2024-21892 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21892.json https://access.redhat.com/errata/RHSA-2024:1503&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.19.1-1.module+el9.3.0+21388+22892fb9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;: {&#xA;      &#34;id&#34;: &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45322&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. In an out-of-memory condition or when limiting the memory allocation, processing a XML document using the HTML parser may result in a use-after-free vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45322 https://bugzilla.redhat.com/show_bug.cgi?id=2242945 https://www.cve.org/CVERecord?id=CVE-2023-45322 https://nvd.nist.gov/vuln/detail/CVE-2023-45322 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45322.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8lLGaMUZk8kOHbicsIjPjw==&#34;: {&#xA;      &#34;id&#34;: &#34;8lLGaMUZk8kOHbicsIjPjw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27535&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. Libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, several FTP settings were left out from the configuration match checks, making them match too easily. The problematic settings are `CURLOPT_FTP_ACCOUNT`, `CURLOPT_FTP_ALTERNATIVE_TO_USER`, `CURLOPT_FTP_SSL_CCC` and `CURLOPT_USE_SSL` level.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27535 https://bugzilla.redhat.com/show_bug.cgi?id=2179073 https://www.cve.org/CVERecord?id=CVE-2023-27535 https://nvd.nist.gov/vuln/detail/CVE-2023-27535 https://curl.se/docs/CVE-2023-27535.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27535.json https://access.redhat.com/errata/RHSA-2023:2650&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8m+MeF1Vk+YvSROjY2pN5Q==&#34;: {&#xA;      &#34;id&#34;: &#34;8m+MeF1Vk+YvSROjY2pN5Q==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0969&#34;,&#xA;      &#34;description&#34;: &#34;Denial of service in net/http and golang.org/x/net/http2&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-12T20:23:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://groups.google.com/g/golang-announce/c/x49AQzIVX-s https://go.dev/issue/54658 https://go.dev/cl/428735&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.6&#34;&#xA;    },&#xA;    &#34;8oKavHMm8C7p1QC+rNA0zA==&#34;: {&#xA;      &#34;id&#34;: &#34;8oKavHMm8C7p1QC+rNA0zA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52005&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git. When cloning, fetching, or pushing from a server, informational or error messages are transported from the remote Git process to the client via a sideband channel. These messages are prefixed with \&#34;remote:\&#34; and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information or to mislead the user into executing untrusted scripts.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-15T17:35:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52005 https://bugzilla.redhat.com/show_bug.cgi?id=2338289 https://www.cve.org/CVERecord?id=CVE-2024-52005 https://nvd.nist.gov/vuln/detail/CVE-2024-52005 https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329 https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52005.json https://access.redhat.com/errata/RHSA-2025:7409&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.1-2.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8qeM99NPNtS3R0CIVDnqTw==&#34;: {&#xA;      &#34;id&#34;: &#34;8qeM99NPNtS3R0CIVDnqTw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8utuZQ/Ix8fDNAmmSZivvQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8utuZQ/Ix8fDNAmmSZivvQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48624&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in less. The close_altfile() function in filename.c omits shell_quote calls for LESSCLOSE, a command line to invoke the optional input postprocessor. This issue could lead to an OS command injection vulnerability and arbitrary command execution on the host operating system.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-48624 https://bugzilla.redhat.com/show_bug.cgi?id=2265081 https://www.cve.org/CVERecord?id=CVE-2022-48624 https://nvd.nist.gov/vuln/detail/CVE-2022-48624 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-48624.json https://access.redhat.com/errata/RHSA-2024:1692&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;less&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:590-3.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8wGYNPE2+g59IfMX+q95UQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8wGYNPE2+g59IfMX+q95UQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55132&#34;,&#xA;      &#34;description&#34;: &#34;A file access flaw has been discovered in NodeJS. A file&#39;s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55132 https://bugzilla.redhat.com/show_bug.cgi?id=2431338 https://www.cve.org/CVERecord?id=CVE-2025-55132 https://nvd.nist.gov/vuln/detail/CVE-2025-55132 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55132.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8zIRit7VqNRaBPLxL/+VAg==&#34;: {&#xA;      &#34;id&#34;: &#34;8zIRit7VqNRaBPLxL/+VAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66471&#34;,&#xA;      &#34;description&#34;: &#34;A decompression handling flaw has been discovered in urllib3. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data; CWE-409) on the client side, even if the application only requested a small chunk of data.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T16:06:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66471 https://bugzilla.redhat.com/show_bug.cgi?id=2419467 https://www.cve.org/CVERecord?id=CVE-2025-66471 https://nvd.nist.gov/vuln/detail/CVE-2025-66471 https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7 https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66471.json https://access.redhat.com/errata/RHSA-2026:1087&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-urllib3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.26.5-6.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9/6RhDAFXPVo7L6QeEsy9w==&#34;: {&#xA;      &#34;id&#34;: &#34;9/6RhDAFXPVo7L6QeEsy9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39321&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39321 https://bugzilla.redhat.com/show_bug.cgi?id=2237777 https://www.cve.org/CVERecord?id=CVE-2023-39321 https://nvd.nist.gov/vuln/detail/CVE-2023-39321 https://go.dev/cl/523039 https://go.dev/issue/62266 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2044.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39321.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;92O2+eS3W5hGvsWPMPwTRQ==&#34;: {&#xA;      &#34;id&#34;: &#34;92O2+eS3W5hGvsWPMPwTRQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;936XDvlfcwVB/34fQscf7w==&#34;: {&#xA;      &#34;id&#34;: &#34;936XDvlfcwVB/34fQscf7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;4:5.32.1-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;93O9BjbBwz1jYmTNCzgkUw==&#34;: {&#xA;      &#34;id&#34;: &#34;93O9BjbBwz1jYmTNCzgkUw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2849&#34;,&#xA;      &#34;description&#34;: &#34;Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2849 https://bugzilla.redhat.com/show_bug.cgi?id=2122137 https://www.cve.org/CVERecord?id=CVE-2022-2849 https://nvd.nist.gov/vuln/detail/CVE-2022-2849 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2849.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;948mcXHuK8LL3gmmFQKgVg==&#34;: {&#xA;      &#34;id&#34;: &#34;948mcXHuK8LL3gmmFQKgVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2581&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Undici. When the `interceptors.deduplicate()` feature is enabled, response data for deduplicated requests can accumulate in memory. A remote attacker, by sending large or chunked responses and concurrent identical requests from an untrusted endpoint, can exploit this uncontrolled resource consumption. This leads to high memory usage and potential Out-Of-Memory (OOM) process termination, resulting in a Denial of Service (DoS) for the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:13:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2581 https://bugzilla.redhat.com/show_bug.cgi?id=2447140 https://www.cve.org/CVERecord?id=CVE-2026-2581 https://nvd.nist.gov/vuln/detail/CVE-2026-2581 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h https://hackerone.com/reports/3513473 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2581.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;95p6rGNUFNsCWfXMBirOLg==&#34;: {&#xA;      &#34;id&#34;: &#34;95p6rGNUFNsCWfXMBirOLg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38552&#34;,&#xA;      &#34;description&#34;: &#34;When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to node&#39;s policy implementation, thus effectively disabling the integrity check.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38552 https://bugzilla.redhat.com/show_bug.cgi?id=2244415 https://www.cve.org/CVERecord?id=CVE-2023-38552 https://nvd.nist.gov/vuln/detail/CVE-2023-38552 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38552.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;96QbNqFHhG4RmHyIqvnk+w==&#34;: {&#xA;      &#34;id&#34;: &#34;96QbNqFHhG4RmHyIqvnk+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9355&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum.  It is also possible to force a derived key to be all zeros instead of an unpredictable value.  This may have follow-on implications for the Go TLS stack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-30T20:53:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9355 https://bugzilla.redhat.com/show_bug.cgi?id=2315719 https://www.cve.org/CVERecord?id=CVE-2024-9355 https://nvd.nist.gov/vuln/detail/CVE-2024-9355 https://github.com/golang-fips/openssl/pull/198 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9355.json https://access.redhat.com/errata/RHSA-2024:7550&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-4.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;98vR1ByhE/Y9cvB+lRN3LA==&#34;: {&#xA;      &#34;id&#34;: &#34;98vR1ByhE/Y9cvB+lRN3LA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30588&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30588 https://bugzilla.redhat.com/show_bug.cgi?id=2219838 https://www.cve.org/CVERecord?id=CVE-2023-30588 https://nvd.nist.gov/vuln/detail/CVE-2023-30588 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30588.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.1-1.18.16.1.1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;99Q540ZW70Bq59gE8MRNHA==&#34;: {&#xA;      &#34;id&#34;: &#34;99Q540ZW70Bq59gE8MRNHA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9Ad5Q6DJD1JusuIjCNfUvQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9Ad5Q6DJD1JusuIjCNfUvQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25815&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security flaw occurs when Git compiles with runtime prefix support and runs without translated messages, and it still uses the gettext machinery to display messages, which subsequently looks for translated messages in unexpected places. This flaw allows the malicious placement of crafted messages.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25815 https://bugzilla.redhat.com/show_bug.cgi?id=2188337 https://www.cve.org/CVERecord?id=CVE-2023-25815 https://nvd.nist.gov/vuln/detail/CVE-2023-25815 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25815.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9Bnr48B1Gkm5b1u7nixqng==&#34;: {&#xA;      &#34;id&#34;: &#34;9Bnr48B1Gkm5b1u7nixqng==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9C6WGntg4UmJkjiylWVxnw==&#34;: {&#xA;      &#34;id&#34;: &#34;9C6WGntg4UmJkjiylWVxnw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30590&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30590 https://bugzilla.redhat.com/show_bug.cgi?id=2219842 https://www.cve.org/CVERecord?id=CVE-2023-30590 https://nvd.nist.gov/vuln/detail/CVE-2023-30590 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30590.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.1.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9Ck8qx7KCeVOhknvjhQwsA==&#34;: {&#xA;      &#34;id&#34;: &#34;9Ck8qx7KCeVOhknvjhQwsA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23083&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js diagnostics_channel. This vulnerability allows an attacker to reinstate and misuse worker constructors, potentially bypassing the Permission Model via hooking into events when a worker thread is created.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T01:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23083 https://bugzilla.redhat.com/show_bug.cgi?id=2339392 https://www.cve.org/CVERecord?id=CVE-2025-23083 https://nvd.nist.gov/vuln/detail/CVE-2025-23083 https://nodejs.org/en/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23083.json https://access.redhat.com/errata/RHSA-2025:1443&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.18.2-1.module+el9.5.0+22758+4ad2c198&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9CmH5Y/MDHXGbta8UBA5HQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9CmH5Y/MDHXGbta8UBA5HQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-25724&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libarchive package. Affected versions of libarchive do not check a strftime return value, which can lead to a denial of service or unspecified other impacts via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-25724 https://bugzilla.redhat.com/show_bug.cgi?id=2349221 https://www.cve.org/CVERecord?id=CVE-2025-25724 https://nvd.nist.gov/vuln/detail/CVE-2025-25724 https://gist.github.com/Ekkosun/a83870ce7f3b7813b9b462a395e8ad92 https://github.com/Ekkosun/pocs/blob/main/bsdtarbug https://github.com/libarchive/libarchive/blob/b439d586f53911c84be5e380445a8a259e19114c/tar/util.c#L751-L752 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-25724.json https://access.redhat.com/errata/RHSA-2025:9431&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-5.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9EdIuoneTMp3CNIfY+O6eQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9EdIuoneTMp3CNIfY+O6eQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8194&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python tarfile module. Processing a specially crafted tar archive, specifically an archive with negative offsets, can cause an infinite loop and deadlock. This issue results in a denial of service in the Python application using the tarfile module.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-28T18:42:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8194 https://bugzilla.redhat.com/show_bug.cgi?id=2384043 https://www.cve.org/CVERecord?id=CVE-2025-8194 https://nvd.nist.gov/vuln/detail/CVE-2025-8194 https://github.com/python/cpython/issues/130577 https://github.com/python/cpython/pull/137027 https://mail.python.org/archives/list/security-announce@python.org/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8194.json https://access.redhat.com/errata/RHSA-2025:15019&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9HK6XfbtFUbx1tNKJlBYeg==&#34;: {&#xA;      &#34;id&#34;: &#34;9HK6XfbtFUbx1tNKJlBYeg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61732&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s &#39;cgo tool&#39;. This vulnerability arises from a discrepancy in how Go and C/C++ comments are parsed, which allows for malicious code to be hidden within comments and then \&#34;smuggled\&#34; into the compiled `cgo` binary. An attacker could exploit this to embed and execute arbitrary code, potentially leading to significant system compromise.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T03:42:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61732 https://bugzilla.redhat.com/show_bug.cgi?id=2437016 https://www.cve.org/CVERecord?id=CVE-2025-61732 https://nvd.nist.gov/vuln/detail/CVE-2025-61732 https://go.dev/cl/734220 https://go.dev/issue/76697 https://groups.google.com/g/golang-announce/c/K09ubi9FQFk https://pkg.go.dev/vuln/GO-2026-4433 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61732.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9HkrQyk+mvh4YcyBYw6eQg==&#34;: {&#xA;      &#34;id&#34;: &#34;9HkrQyk+mvh4YcyBYw6eQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27983&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27983 https://bugzilla.redhat.com/show_bug.cgi?id=2272764 https://www.cve.org/CVERecord?id=CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27983.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9LiBp4nDSgt/Uyk2VD23Ig==&#34;: {&#xA;      &#34;id&#34;: &#34;9LiBp4nDSgt/Uyk2VD23Ig==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22801&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a reference library for PNG (Portable Network Graphics) raster image files. An integer truncation vulnerability exists in the png_write_image_16bit and png_write_image_8bit simplified write API functions. A local attacker could exploit this flaw by providing a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes, leading to a heap buffer over-read. This can result in information disclosure or a denial of service (DoS) to the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T22:57:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22801 https://bugzilla.redhat.com/show_bug.cgi?id=2428824 https://www.cve.org/CVERecord?id=CVE-2026-22801 https://nvd.nist.gov/vuln/detail/CVE-2026-22801 https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22801.json https://access.redhat.com/errata/RHSA-2026:3405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9M1meEoYiMYlmYR7kKfweg==&#34;: {&#xA;      &#34;id&#34;: &#34;9M1meEoYiMYlmYR7kKfweg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3626&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the _TIFFmemset function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3626 https://bugzilla.redhat.com/show_bug.cgi?id=2142741 https://www.cve.org/CVERecord?id=CVE-2022-3626 https://nvd.nist.gov/vuln/detail/CVE-2022-3626 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3626.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9NxQaPp619Bd0qky1dvzZg==&#34;: {&#xA;      &#34;id&#34;: &#34;9NxQaPp619Bd0qky1dvzZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js due to a lack of safeguards on chunk extension bytes. The server may read an unbounded number of bytes from a single connection, which can allow an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22019 https://bugzilla.redhat.com/show_bug.cgi?id=2264574 https://www.cve.org/CVERecord?id=CVE-2024-22019 https://nvd.nist.gov/vuln/detail/CVE-2024-22019 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22019.json https://access.redhat.com/errata/RHSA-2024:1503&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.19.1-1.module+el9.3.0+21388+22892fb9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9PE6ZiUdIaAWtCsUgesEZA==&#34;: {&#xA;      &#34;id&#34;: &#34;9PE6ZiUdIaAWtCsUgesEZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31130&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs in the ares_inet_net_pton() function, which is vulnerable to a buffer underflow for certain ipv6 addresses. \&#34;0::00:00:00/2\&#34; in particular was found to cause an issue. C-ares only uses this function internally for configuration purposes, which would require an administrator to configure such an address via ares_set_sortlist().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31130 https://bugzilla.redhat.com/show_bug.cgi?id=2209497 https://www.cve.org/CVERecord?id=CVE-2023-31130 https://nvd.nist.gov/vuln/detail/CVE-2023-31130 https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31130.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.3-1.16.19.1.2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9R8nFX27y8SI3yR7d7vH5A==&#34;: {&#xA;      &#34;id&#34;: &#34;9R8nFX27y8SI3yR7d7vH5A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61726&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61726 https://bugzilla.redhat.com/show_bug.cgi?id=2434432 https://www.cve.org/CVERecord?id=CVE-2025-61726 https://nvd.nist.gov/vuln/detail/CVE-2025-61726 https://go.dev/cl/736712 https://go.dev/issue/77101 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4341 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61726.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9RLVzTylr5Ocdbql97n+1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;9RLVzTylr5Ocdbql97n+1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-37370&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-37370 https://bugzilla.redhat.com/show_bug.cgi?id=2294677 https://www.cve.org/CVERecord?id=CVE-2024-37370 https://nvd.nist.gov/vuln/detail/CVE-2024-37370 https://web.mit.edu/kerberos/www/krb5-1.21/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-37370.json https://access.redhat.com/errata/RHSA-2024:6166&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9ScYbT0nSftN/jrx/8pPuA==&#34;: {&#xA;      &#34;id&#34;: &#34;9ScYbT0nSftN/jrx/8pPuA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35414&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability arises from the incorrect handling of the authorized_keys principals option in uncommon scenarios. Specifically, when a principals list is used with a Certificate Authority that includes comma characters, OpenSSH may misinterpret the input. This could lead to security bypasses, potentially allowing unintended access or information disclosure in specific authentication contexts.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T17:08:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35414 https://bugzilla.redhat.com/show_bug.cgi?id=2454490 https://www.cve.org/CVERecord?id=CVE-2026-35414 https://nvd.nist.gov/vuln/detail/CVE-2026-35414 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35414.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9SrODyBGF+py5BfKYxVllg==&#34;: {&#xA;      &#34;id&#34;: &#34;9SrODyBGF+py5BfKYxVllg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4373&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4373 https://bugzilla.redhat.com/show_bug.cgi?id=2364265 https://www.cve.org/CVERecord?id=CVE-2025-4373 https://nvd.nist.gov/vuln/detail/CVE-2025-4373 https://gitlab.gnome.org/GNOME/glib/-/issues/3677 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4373.json https://access.redhat.com/errata/RHSA-2025:11140&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-16.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9U8BTRqVPM+WCls5RolwuQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9U8BTRqVPM+WCls5RolwuQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45288&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45288 https://bugzilla.redhat.com/show_bug.cgi?id=2268273 https://www.cve.org/CVERecord?id=CVE-2023-45288 https://nvd.nist.gov/vuln/detail/CVE-2023-45288 https://nowotarski.info/http2-continuation-flood/ https://pkg.go.dev/vuln/GO-2024-2687 https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45288.json https://access.redhat.com/errata/RHSA-2024:1963&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-4.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9UTiJlsfYxfa60iynbYgLg==&#34;: {&#xA;      &#34;id&#34;: &#34;9UTiJlsfYxfa60iynbYgLg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-39260&#34;,&#xA;      &#34;description&#34;: &#34;Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git&#39;s push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-39260 https://bugzilla.redhat.com/show_bug.cgi?id=2137423 https://www.cve.org/CVERecord?id=CVE-2022-39260 https://nvd.nist.gov/vuln/detail/CVE-2022-39260 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-39260.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9Wku9APf1oJxEbcM0XqrLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9Wku9APf1oJxEbcM0XqrLQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27614&#34;,&#xA;      &#34;description&#34;: &#34;There&#39;s a vulnerability in gitk where an user can be tricked to run malicious scripts supplied by the attacker when running gitk filename command. When successfully exploited this vulnerability may result in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T13:01:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27614 https://bugzilla.redhat.com/show_bug.cgi?id=2379125 https://www.cve.org/CVERecord?id=CVE-2025-27614 https://nvd.nist.gov/vuln/detail/CVE-2025-27614 https://lore.kernel.org/git/xmqq5xg2wrd1.fsf@gitster.g/ https://www.openwall.com/lists/oss-security/2025/07/08/4 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27614.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9XbremjCd0rS6zu/GB+mjA==&#34;: {&#xA;      &#34;id&#34;: &#34;9XbremjCd0rS6zu/GB+mjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27982&#34;,&#xA;      &#34;description&#34;: &#34;An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27982 https://bugzilla.redhat.com/show_bug.cgi?id=2275392 https://www.cve.org/CVERecord?id=CVE-2024-27982 https://nvd.nist.gov/vuln/detail/CVE-2024-27982 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27982.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9Yjf3Ev3R8wbqlhNdfwPQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9Yjf3Ev3R8wbqlhNdfwPQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-53920&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Emacs. Viewing or editing an untrusted Emacs Lisp source code file can cause arbitrary code execution due to unsafe macro expansion when a user has configured elisp-completion-at-point for code completion or has enabled automatic error checking, such as Flymake or Flycheck.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-53920 https://bugzilla.redhat.com/show_bug.cgi?id=2329161 https://www.cve.org/CVERecord?id=CVE-2024-53920 https://nvd.nist.gov/vuln/detail/CVE-2024-53920 https://eshelyaron.com/posts/2024-11-27-emacs-aritrary-code-execution-and-how-to-avoid-it.html https://yhetil.org/emacs/CAFXAjY5f4YfHAtZur1RAqH34UbYU56_t6t2Er0YEh1Sb7-W=hg%40mail.gmail.com/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-53920.json https://access.redhat.com/errata/RHSA-2025:9448&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:27.2-14.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9b3CWaJsQwdqnuBJDBMt8g==&#34;: {&#xA;      &#34;id&#34;: &#34;9b3CWaJsQwdqnuBJDBMt8g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52006&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems, most notably .NET and node.js, interpret single Carriage Return characters as newlines, which render the protections against CVE-2020-5260 incomplete for credential helpers, which has the potential to expose stored credentials to malicious URLs.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T18:39:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52006 https://bugzilla.redhat.com/show_bug.cgi?id=2337956 https://www.cve.org/CVERecord?id=CVE-2024-52006 https://nvd.nist.gov/vuln/detail/CVE-2024-52006 https://github.com/git-ecosystem/git-credential-manager/security/advisories/GHSA-86c2-4x57-wc8g https://github.com/git/git/commit/b01b9b81d36759cdcd07305e78765199e1bc2060 https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q https://github.com/git/git/security/advisories/GHSA-r5ph-xg7q-xfrp https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52006.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9b3hAQW/ubh4v6zyl2M5Ig==&#34;: {&#xA;      &#34;id&#34;: &#34;9b3hAQW/ubh4v6zyl2M5Ig==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-35195&#34;,&#xA;      &#34;description&#34;: &#34;An incorrect control flow implementation vulnerability was found in Requests. If the first request in a session is made with verify=False, all subsequent requests to the same host will continue to ignore cert verification.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-35195 https://bugzilla.redhat.com/show_bug.cgi?id=2282114 https://www.cve.org/CVERecord?id=CVE-2024-35195 https://nvd.nist.gov/vuln/detail/CVE-2024-35195 https://github.com/psf/requests/security/advisories/GHSA-9wx4-h78v-vm56 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-35195.json https://access.redhat.com/errata/RHSA-2025:7049&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-requests&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.25.1-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5928&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc (GNU C Library). When the `ungetwc` function is called on a file stream using wide characters with specific overlapping single-byte and multi-byte encodings, it may attempt to read data outside of its allocated buffer. This can lead to the unintentional disclosure of sensitive information from memory or cause the program to crash, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-20T20:37:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5928 https://bugzilla.redhat.com/show_bug.cgi?id=2459854 https://www.cve.org/CVERecord?id=CVE-2026-5928 https://nvd.nist.gov/vuln/detail/CVE-2026-5928 https://sourceware.org/bugzilla/show_bug.cgi?id=33998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5928.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9ca/WR2Db6VUKD0h31yyGw==&#34;: {&#xA;      &#34;id&#34;: &#34;9ca/WR2Db6VUKD0h31yyGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-36227&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. A missing check of the return value of the calloc function can cause a NULL pointer dereference in an out-of-memory condition or when a memory allocation limit is reached, resulting in the program linked with libarchive to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-36227 https://bugzilla.redhat.com/show_bug.cgi?id=2144972 https://www.cve.org/CVERecord?id=CVE-2022-36227 https://nvd.nist.gov/vuln/detail/CVE-2022-36227 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-36227.json https://access.redhat.com/errata/RHSA-2023:2532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-4.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9feM+1JJIYgC5OZCglyV3w==&#34;: {&#xA;      &#34;id&#34;: &#34;9feM+1JJIYgC5OZCglyV3w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23946&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security issue occurs when feeding a crafted input to \&#34;git apply.\&#34; A path outside the working tree can be overwritten by the user running \&#34;git apply.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23946 https://bugzilla.redhat.com/show_bug.cgi?id=2168161 https://www.cve.org/CVERecord?id=CVE-2023-23946 https://nvd.nist.gov/vuln/detail/CVE-2023-23946 https://github.blog/2023-02-14-git-security-vulnerabilities-announced-3/ https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23946.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9fvqDo3ARbJLIgwR1oX6QQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9fvqDo3ARbJLIgwR1oX6QQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24329&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24329 https://bugzilla.redhat.com/show_bug.cgi?id=2173917 https://www.cve.org/CVERecord?id=CVE-2023-24329 https://nvd.nist.gov/vuln/detail/CVE-2023-24329 https://pointernull.com/security/python-url-parse-problem.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24329.json https://access.redhat.com/errata/RHSA-2023:3595&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.16-1.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9gB7mQN0y1Zy9EiaXIHFew==&#34;: {&#xA;      &#34;id&#34;: &#34;9gB7mQN0y1Zy9EiaXIHFew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-43548&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in NodeJS. The issue occurs in the Node.js rebinding protector for --inspect that still allows invalid IP addresses, specifically, the octal format. This flaw allows an attacker to perform DNS rebinding and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-11-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-43548 https://bugzilla.redhat.com/show_bug.cgi?id=2140911 https://www.cve.org/CVERecord?id=CVE-2022-43548 https://nvd.nist.gov/vuln/detail/CVE-2022-43548 https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/#dns-rebinding-in-inspect-via-invalid-octal-ip-address-medium-cve-2022-43548 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-43548.json https://access.redhat.com/errata/RHSA-2022:8832&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.2-1.18.12.1.1.module+el9.1.0.z+17326+318294bb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9hzf7VYOdcRePOTqOS2DHA==&#34;: {&#xA;      &#34;id&#34;: &#34;9hzf7VYOdcRePOTqOS2DHA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1528&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici&#39;s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:21:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1528 https://bugzilla.redhat.com/show_bug.cgi?id=2447145 https://www.cve.org/CVERecord?id=CVE-2026-1528 https://nvd.nist.gov/vuln/detail/CVE-2026-1528 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj https://hackerone.com/reports/3537648 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1528.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9ia70lNV6NYvmzB7WlbYQw==&#34;: {&#xA;      &#34;id&#34;: &#34;9ia70lNV6NYvmzB7WlbYQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32559&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(&#39;spawn_sync&#39;) to run arbitrary code outside of the limits defined in a policy.json file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32559 https://bugzilla.redhat.com/show_bug.cgi?id=2230956 https://www.cve.org/CVERecord?id=CVE-2023-32559 https://nvd.nist.gov/vuln/detail/CVE-2023-32559 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32559.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.17.1-1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24883&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. A remote attacker could provide a specially crafted long signature packet that, when processed, causes the application to crash. This vulnerability leads to a denial of service (DoS), making the GnuPG application unavailable to legitimate users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T18:43:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-24883 https://bugzilla.redhat.com/show_bug.cgi?id=2433463 https://www.cve.org/CVERecord?id=CVE-2026-24883 https://nvd.nist.gov/vuln/detail/CVE-2026-24883 https://dev.gnupg.org/T8049 https://www.openwall.com/lists/oss-security/2026/01/27/8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-24883.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9kpPzhUEkQr6h/4fDNnSuA==&#34;: {&#xA;      &#34;id&#34;: &#34;9kpPzhUEkQr6h/4fDNnSuA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28863&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in ISAACS&#39;s node-tar, where it is vulnerable to a denial of service, caused by the lack of folder count validation. The vulnerability exists due to the application not properly controlling the consumption of internal resources while parsing a tar file. By sending a specially crafted request, a remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28863 https://bugzilla.redhat.com/show_bug.cgi?id=2293200 https://www.cve.org/CVERecord?id=CVE-2024-28863 https://nvd.nist.gov/vuln/detail/CVE-2024-28863 https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36 https://security.netapp.com/advisory/ntap-20240524-0005/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28863.json https://access.redhat.com/errata/RHSA-2024:6147&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.4-1.module+el9.4.0+22195+c221878e&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9lAt/24IrVKtsskC+grSQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9lAt/24IrVKtsskC+grSQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:5738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.13-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9lOT/bRPy9mu1knhwrLw8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;9lOT/bRPy9mu1knhwrLw8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46809&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The privateDecrypt() API of the crypto library may allow a covert timing side-channel during PKCS#1 v1.5 padding error handling. This issue revealed significant timing differences in decryption for valid and invalid ciphertexts, which may allow a remote attacker to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing JSON Web Encryption messages.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46809 https://bugzilla.redhat.com/show_bug.cgi?id=2264569 https://www.cve.org/CVERecord?id=CVE-2023-46809 https://nvd.nist.gov/vuln/detail/CVE-2023-46809 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46809.json https://access.redhat.com/errata/RHSA-2024:1503&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.2.4-1.18.19.1.1.module+el9.3.0+21388+22892fb9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9lOiMN/e99o1oI1dhS9S2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;9lOiMN/e99o1oI1dhS9S2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9lqG2xu+85HJHcn8UQyZ2A==&#34;: {&#xA;      &#34;id&#34;: &#34;9lqG2xu+85HJHcn8UQyZ2A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24538&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go. This flaw allows a remote attacker to execute arbitrary code on the system, caused by not properly considering backticks (`) as Javascript string delimiters. By sending a specially crafted request, an attacker execute arbitrary code on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24538 https://bugzilla.redhat.com/show_bug.cgi?id=2184481 https://www.cve.org/CVERecord?id=CVE-2023-24538 https://nvd.nist.gov/vuln/detail/CVE-2023-24538 https://github.com/golang/go/issues/59234 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24538.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9lxLFgIezXSh1WnSsRhwNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9lxLFgIezXSh1WnSsRhwNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-36227&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. A missing check of the return value of the calloc function can cause a NULL pointer dereference in an out-of-memory condition or when a memory allocation limit is reached, resulting in the program linked with libarchive to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-36227 https://bugzilla.redhat.com/show_bug.cgi?id=2144972 https://www.cve.org/CVERecord?id=CVE-2022-36227 https://nvd.nist.gov/vuln/detail/CVE-2022-36227 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-36227.json https://access.redhat.com/errata/RHSA-2023:2532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bsdtar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-4.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9oQBIjmHHZP7ZEjuqVHO7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;9oQBIjmHHZP7ZEjuqVHO7Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6923&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the email module that uses Python language. The email module doesn&#39;t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6923 https://bugzilla.redhat.com/show_bug.cgi?id=2302255 https://www.cve.org/CVERecord?id=CVE-2024-6923 https://nvd.nist.gov/vuln/detail/CVE-2024-6923 https://github.com/python/cpython/issues/121650 https://github.com/python/cpython/pull/122233 https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6923.json https://access.redhat.com/errata/RHSA-2024:6163&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9rfGlkZ9WMAUo942FMnq5A==&#34;: {&#xA;      &#34;id&#34;: &#34;9rfGlkZ9WMAUo942FMnq5A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32415&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libxml2 library. A heap-based underflow can be triggered when a crafted XML document is validated against an XML schema with certain identity constraints or when a crafted XML schema is used, causing a crash to the application linked to the library and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32415 https://bugzilla.redhat.com/show_bug.cgi?id=2360768 https://www.cve.org/CVERecord?id=CVE-2025-32415 https://nvd.nist.gov/vuln/detail/CVE-2025-32415 https://gitlab.gnome.org/GNOME/libxml2/-/issues/890 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32415.json https://access.redhat.com/errata/RHSA-2025:13428&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-12.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9uaveyIiSEcdU4MrDHbJ2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;9uaveyIiSEcdU4MrDHbJ2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds write in the extractContigSamplesShifted32bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited data modification.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0802 https://bugzilla.redhat.com/show_bug.cgi?id=2170178 https://www.cve.org/CVERecord?id=CVE-2023-0802 https://nvd.nist.gov/vuln/detail/CVE-2023-0802 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0802.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9uo4qIbgVv97/yzslhE6/g==&#34;: {&#xA;      &#34;id&#34;: &#34;9uo4qIbgVv97/yzslhE6/g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28484&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference vulnerability was found in libxml2. This issue occurs when parsing (invalid) XML schemas.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28484 https://bugzilla.redhat.com/show_bug.cgi?id=2185994 https://www.cve.org/CVERecord?id=CVE-2023-28484 https://nvd.nist.gov/vuln/detail/CVE-2023-28484 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28484.json https://access.redhat.com/errata/RHSA-2023:4349&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-3.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9vaAmbFDwko+7w/wBDHWvg==&#34;: {&#xA;      &#34;id&#34;: &#34;9vaAmbFDwko+7w/wBDHWvg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28617&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the function org-babel-execute:latex in ob-latex.el can result in arbitrary command execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28617 https://bugzilla.redhat.com/show_bug.cgi?id=2180544 https://www.cve.org/CVERecord?id=CVE-2023-28617 https://nvd.nist.gov/vuln/detail/CVE-2023-28617 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28617.json https://access.redhat.com/errata/RHSA-2023:2074&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:27.2-6.el9_1.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;9z2MVdoreqGVJcUFUz72OA==&#34;: {&#xA;      &#34;id&#34;: &#34;9z2MVdoreqGVJcUFUz72OA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32002&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32002 https://bugzilla.redhat.com/show_bug.cgi?id=2230948 https://www.cve.org/CVERecord?id=CVE-2023-32002 https://nvd.nist.gov/vuln/detail/CVE-2023-32002 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32002.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;A/za5QfQmT4HYcIQ4RyCzA==&#34;: {&#xA;      &#34;id&#34;: &#34;A/za5QfQmT4HYcIQ4RyCzA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2024-2887&#34;,&#xA;      &#34;description&#34;: &#34;Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in net/netip&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-04T22:48:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/590316 https://go.dev/issue/67680 https://groups.google.com/g/golang-announce/c/XbxouI9gY7k/m/TuoGEhxIEwAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.21.11&#34;&#xA;    },&#xA;    &#34;A0davrN208bKuUZqpayi4g==&#34;: {&#xA;      &#34;id&#34;: &#34;A0davrN208bKuUZqpayi4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22801&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a reference library for PNG (Portable Network Graphics) raster image files. An integer truncation vulnerability exists in the png_write_image_16bit and png_write_image_8bit simplified write API functions. A local attacker could exploit this flaw by providing a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes, leading to a heap buffer over-read. This can result in information disclosure or a denial of service (DoS) to the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T22:57:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22801 https://bugzilla.redhat.com/show_bug.cgi?id=2428824 https://www.cve.org/CVERecord?id=CVE-2026-22801 https://nvd.nist.gov/vuln/detail/CVE-2026-22801 https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22801.json https://access.redhat.com/errata/RHSA-2026:3405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;A2AnBV79RO3+WE0eMQnW8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;A2AnBV79RO3+WE0eMQnW8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21716&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. An incomplete security fix allows code operating under restricted file system write permissions to bypass these limitations. This vulnerability enables the modification of file permissions and ownership on already-open files, even when explicit write access is denied. Such a bypass could lead to unauthorized changes to system files.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21716 https://bugzilla.redhat.com/show_bug.cgi?id=2453157 https://www.cve.org/CVERecord?id=CVE-2026-21716 https://nvd.nist.gov/vuln/detail/CVE-2026-21716 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21716.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;A2YTvJXiGwe7aOSqWlEZhQ==&#34;: {&#xA;      &#34;id&#34;: &#34;A2YTvJXiGwe7aOSqWlEZhQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32067&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32067 https://bugzilla.redhat.com/show_bug.cgi?id=2209502 https://www.cve.org/CVERecord?id=CVE-2023-32067 https://nvd.nist.gov/vuln/detail/CVE-2023-32067 https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32067.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.3-1.16.19.1.2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;A3ZYVQ8Z63tDAx8FSltQHw==&#34;: {&#xA;      &#34;id&#34;: &#34;A3ZYVQ8Z63tDAx8FSltQHw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-7458&#34;,&#xA;      &#34;description&#34;: &#34;An integer overflow flaw has been discovered in SQLite. This flaw allows an attacker who has the ability to execute raw SQL statements to induce a denial of service or leak process memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-29T12:43:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7458 https://bugzilla.redhat.com/show_bug.cgi?id=2384237 https://www.cve.org/CVERecord?id=CVE-2025-7458 https://nvd.nist.gov/vuln/detail/CVE-2025-7458 https://sqlite.org/forum/forumpost/16ce2bb7a639e29b https://sqlite.org/src/info/12ad822d9b827777 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7458.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;A98JJ8FAQWnMhx8Nb3TYXA==&#34;: {&#xA;      &#34;id&#34;: &#34;A98JJ8FAQWnMhx8Nb3TYXA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-49043&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2 where improper handling of memory allocation failures in `libxml2` can lead to crashes, memory leaks, or inconsistent states. While an attacker cannot directly control allocation failures, they may trigger denial-of-service conditions under extreme system stress.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-49043 https://bugzilla.redhat.com/show_bug.cgi?id=2342118 https://www.cve.org/CVERecord?id=CVE-2022-49043 https://nvd.nist.gov/vuln/detail/CVE-2022-49043 https://github.com/php/php-src/issues/17467 https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-49043.json https://access.redhat.com/errata/RHSA-2025:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ABh4yTmrbQSCnnP4F8iX5A==&#34;: {&#xA;      &#34;id&#34;: &#34;ABh4yTmrbQSCnnP4F8iX5A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3446&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security flaw occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3446 https://bugzilla.redhat.com/show_bug.cgi?id=2224962 https://www.cve.org/CVERecord?id=CVE-2023-3446 https://nvd.nist.gov/vuln/detail/CVE-2023-3446 https://www.openssl.org/news/secadv/20230719.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3446.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;: {&#xA;      &#34;id&#34;: &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5278&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU Coreutils. The sort utility&#39;s begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://www.cve.org/CVERecord?id=CVE-2025-5278 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5278.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AEXyQvL2wFfW+v4I9XmTaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;AEXyQvL2wFfW+v4I9XmTaQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3316&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in LibTiff. A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3316 https://bugzilla.redhat.com/show_bug.cgi?id=2216080 https://www.cve.org/CVERecord?id=CVE-2023-3316 https://nvd.nist.gov/vuln/detail/CVE-2023-3316 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3316.json https://access.redhat.com/errata/RHSA-2023:6575&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AF4l+pfrs0Si/0Bf3toHtA==&#34;: {&#xA;      &#34;id&#34;: &#34;AF4l+pfrs0Si/0Bf3toHtA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AI5OCFigX+y57buhAMK1UA==&#34;: {&#xA;      &#34;id&#34;: &#34;AI5OCFigX+y57buhAMK1UA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2398&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an application configures libcurl to use HTTP/2 server push and the amount of received headers for the push surpasses the maximum allowed limit, libcurl aborts the server push. When aborting, libcurl does not free all the previously allocated headers, resulting in a memory leak.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2398 https://bugzilla.redhat.com/show_bug.cgi?id=2270498 https://www.cve.org/CVERecord?id=CVE-2024-2398 https://nvd.nist.gov/vuln/detail/CVE-2024-2398 https://curl.se/docs/CVE-2024-2398.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2398.json https://access.redhat.com/errata/RHSA-2024:5529&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-29.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AILk1bhdEUQriiNdRe9Buw==&#34;: {&#xA;      &#34;id&#34;: &#34;AILk1bhdEUQriiNdRe9Buw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AIlN8RmMOvhBveVuVAyHQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;AIlN8RmMOvhBveVuVAyHQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2874&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference vulnerability was found in Vim in the generate_loadvar function in the vim9compile.c file. This flaw allows an attacker who can trick a user into processing a specially crafted file to trigger the NULL pointer dereference, causing the application to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2874 https://bugzilla.redhat.com/show_bug.cgi?id=2193207 https://www.cve.org/CVERecord?id=CVE-2022-2874 https://nvd.nist.gov/vuln/detail/CVE-2022-2874 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2874.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AJcMDco3zISLrE/7+42hGA==&#34;: {&#xA;      &#34;id&#34;: &#34;AJcMDco3zISLrE/7+42hGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AJgpOdbNJblqS+xC52p8RA==&#34;: {&#xA;      &#34;id&#34;: &#34;AJgpOdbNJblqS+xC52p8RA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32067&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32067 https://bugzilla.redhat.com/show_bug.cgi?id=2209502 https://www.cve.org/CVERecord?id=CVE-2023-32067 https://nvd.nist.gov/vuln/detail/CVE-2023-32067 https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32067.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ANawluW+m7SrGs8Q9Odgow==&#34;: {&#xA;      &#34;id&#34;: &#34;ANawluW+m7SrGs8Q9Odgow==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3517&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the nodejs-minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-02-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3517 https://bugzilla.redhat.com/show_bug.cgi?id=2134609 https://www.cve.org/CVERecord?id=CVE-2022-3517 https://nvd.nist.gov/vuln/detail/CVE-2022-3517 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3517.json https://access.redhat.com/errata/RHSA-2022:8832&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.12.1-1.module+el9.1.0.z+17326+318294bb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ANxFBq/yNQoElX4dsXb0wA==&#34;: {&#xA;      &#34;id&#34;: &#34;ANxFBq/yNQoElX4dsXb0wA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32006&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32006 https://bugzilla.redhat.com/show_bug.cgi?id=2230955 https://www.cve.org/CVERecord?id=CVE-2023-32006 https://nvd.nist.gov/vuln/detail/CVE-2023-32006 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32006.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AOVkipVLZLxGjwVCB/7mwg==&#34;: {&#xA;      &#34;id&#34;: &#34;AOVkipVLZLxGjwVCB/7mwg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4645&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcp, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the tiffcp function in tools/tiffcp.c, resulting in a denial of service and limited information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4645 https://bugzilla.redhat.com/show_bug.cgi?id=2176220 https://www.cve.org/CVERecord?id=CVE-2022-4645 https://nvd.nist.gov/vuln/detail/CVE-2022-4645 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4645.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;APh1+6yq/mlF0fXLxUkIDw==&#34;: {&#xA;      &#34;id&#34;: &#34;APh1+6yq/mlF0fXLxUkIDw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41989&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Libgcrypt. A remote attacker could exploit this vulnerability by sending crafted Elliptic Curve Diffie-Hellman (ECDH) ciphertext to the `gcry_pk_decrypt` function. This can lead to a heap-based buffer overflow, potentially causing a denial of service (DoS) condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-23T04:30:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-41989 https://bugzilla.redhat.com/show_bug.cgi?id=2461063 https://www.cve.org/CVERecord?id=CVE-2026-41989 https://nvd.nist.gov/vuln/detail/CVE-2026-41989 https://dev.gnupg.org/T8211 https://lists.gnupg.org/pipermail/gnupg-announce/2026q2/000503.html https://www.openwall.com/lists/oss-security/2026/04/21/1 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-41989.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AQa/gDZ0IemFxWbJIsU4yQ==&#34;: {&#xA;      &#34;id&#34;: &#34;AQa/gDZ0IemFxWbJIsU4yQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52355&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-52355 https://bugzilla.redhat.com/show_bug.cgi?id=2251326 https://www.cve.org/CVERecord?id=CVE-2023-52355 https://nvd.nist.gov/vuln/detail/CVE-2023-52355 https://gitlab.com/libtiff/libtiff/-/issues/621 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-52355.json https://access.redhat.com/errata/RHSA-2025:20801&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-15.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AUiFITCnRjRxctzqqbDeeA==&#34;: {&#xA;      &#34;id&#34;: &#34;AUiFITCnRjRxctzqqbDeeA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3219&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuPG. GnuPG can spin on a relatively small input by crafting a public key with thousands of signatures attached and compressed down to a few kilobytes. This issue can potentially cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://www.cve.org/CVERecord?id=CVE-2022-3219 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://dev.gnupg.org/D556 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3219.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AYOaUiAITXfmzrid+CR2Og==&#34;: {&#xA;      &#34;id&#34;: &#34;AYOaUiAITXfmzrid+CR2Og==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3903&#34;,&#xA;      &#34;description&#34;: &#34;vim is vulnerable to Heap-based Buffer Overflow&#34;,&#xA;      &#34;issued&#34;: &#34;2021-10-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3903 https://bugzilla.redhat.com/show_bug.cgi?id=2018558 https://www.cve.org/CVERecord?id=CVE-2021-3903 https://nvd.nist.gov/vuln/detail/CVE-2021-3903 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3903.json https://access.redhat.com/errata/RHSA-2024:9405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-21.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AYXw2VaylssI+NkH09HL4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;AYXw2VaylssI+NkH09HL4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22025&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22025 https://bugzilla.redhat.com/show_bug.cgi?id=2270559 https://www.cve.org/CVERecord?id=CVE-2024-22025 https://nvd.nist.gov/vuln/detail/CVE-2024-22025 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22025.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AcbVYbhZ/tTIOm89OCy5kQ==&#34;: {&#xA;      &#34;id&#34;: &#34;AcbVYbhZ/tTIOm89OCy5kQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30588&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30588 https://bugzilla.redhat.com/show_bug.cgi?id=2219838 https://www.cve.org/CVERecord?id=CVE-2023-30588 https://nvd.nist.gov/vuln/detail/CVE-2023-30588 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30588.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.16.1-1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AdhtRMEnBdpFFyeSlUP6fA==&#34;: {&#xA;      &#34;id&#34;: &#34;AdhtRMEnBdpFFyeSlUP6fA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32002&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This vulnerability allows the malicious manipulation of repositories containing submodules, exploiting a bug that enables the writing of files into the .git/ directory instead of the submodule&#39;s intended worktree. This manipulation facilitates the execution of arbitrary code during the cloning process, bypassing user inspection and control.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32002 https://bugzilla.redhat.com/show_bug.cgi?id=2280421 https://www.cve.org/CVERecord?id=CVE-2024-32002 https://nvd.nist.gov/vuln/detail/CVE-2024-32002 https://github.com/git/git/security/advisories/GHSA-8h77-4q3w-gfgv https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32002.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Aet749oXCwhRnnY9gEGYGw==&#34;: {&#xA;      &#34;id&#34;: &#34;Aet749oXCwhRnnY9gEGYGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38552&#34;,&#xA;      &#34;description&#34;: &#34;When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to node&#39;s policy implementation, thus effectively disabling the integrity check.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38552 https://bugzilla.redhat.com/show_bug.cgi?id=2244415 https://www.cve.org/CVERecord?id=CVE-2023-38552 https://nvd.nist.gov/vuln/detail/CVE-2023-38552 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38552.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AfEBBMV7R48kk4frVmVcAg==&#34;: {&#xA;      &#34;id&#34;: &#34;AfEBBMV7R48kk4frVmVcAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34156&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34156 https://bugzilla.redhat.com/show_bug.cgi?id=2310528 https://www.cve.org/CVERecord?id=CVE-2024-34156 https://nvd.nist.gov/vuln/detail/CVE-2024-34156 https://go.dev/cl/611239 https://go.dev/issue/69139 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3106 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34156.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ag/7bmjihl8O9dsSQf/ivg==&#34;: {&#xA;      &#34;id&#34;: &#34;Ag/7bmjihl8O9dsSQf/ivg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5222&#34;,&#xA;      &#34;description&#34;: &#34;A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the &#39;subtag&#39; struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5222 https://bugzilla.redhat.com/show_bug.cgi?id=2368600 https://www.cve.org/CVERecord?id=CVE-2025-5222 https://nvd.nist.gov/vuln/detail/CVE-2025-5222 https://unicode-org.atlassian.net/jira/software/c/projects/ICU/issues/ICU-22957 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5222.json https://access.redhat.com/errata/RHSA-2025:12083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libicu&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:67.1-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ah03jmj/7fQOqUbg05PtZg==&#34;: {&#xA;      &#34;id&#34;: &#34;Ah03jmj/7fQOqUbg05PtZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0049&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim, which is vulnerable to an out-of-bounds read in the build_stl_str_hl function. This flaw allows a specially crafted file to cause information disclosure, data integrity corruption, or crash the software.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0049 https://bugzilla.redhat.com/show_bug.cgi?id=2158269 https://www.cve.org/CVERecord?id=CVE-2023-0049 https://nvd.nist.gov/vuln/detail/CVE-2023-0049 https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0049.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Argl342WI7oZtgSo+p9kMA==&#34;: {&#xA;      &#34;id&#34;: &#34;Argl342WI7oZtgSo+p9kMA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Aspz79uO5bKpApwSqMsL8A==&#34;: {&#xA;      &#34;id&#34;: &#34;Aspz79uO5bKpApwSqMsL8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28757&#34;,&#xA;      &#34;description&#34;: &#34;An XML Entity Expansion flaw was found in libexpat. This flaw allows an attacker to cause a denial of service when there is an isolated use of external parsers.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28757 https://bugzilla.redhat.com/show_bug.cgi?id=2268766 https://www.cve.org/CVERecord?id=CVE-2024-28757 https://nvd.nist.gov/vuln/detail/CVE-2024-28757 https://github.com/libexpat/libexpat/issues/839 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28757.json https://access.redhat.com/errata/RHSA-2024:1530&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-1.el9_3.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AuT5DLBrUT23i8Fkzi5nrA==&#34;: {&#xA;      &#34;id&#34;: &#34;AuT5DLBrUT23i8Fkzi5nrA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23918&#34;,&#xA;      &#34;description&#34;: &#34;A privilege escalation vulnerability exists in Node.js \u003c19.6.1, \u003c18.14.1, \u003c16.19.1 and \u003c14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23918 https://bugzilla.redhat.com/show_bug.cgi?id=2171935 https://www.cve.org/CVERecord?id=CVE-2023-23918 https://nvd.nist.gov/vuln/detail/CVE-2023-23918 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23918.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Av6IvPz8z+8JAyypXmkbTA==&#34;: {&#xA;      &#34;id&#34;: &#34;Av6IvPz8z+8JAyypXmkbTA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23050&#34;,&#xA;      &#34;description&#34;: &#34;QLowEnergyController in Qt before 6.8.2 mishandles malformed Bluetooth ATT commands, leading to an out-of-bounds read (or division by zero). This is fixed in 5.15.19, 6.5.9, and 6.8.2.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23050 https://bugzilla.redhat.com/show_bug.cgi?id=2408769 https://www.cve.org/CVERecord?id=CVE-2025-23050 https://nvd.nist.gov/vuln/detail/CVE-2025-23050 https://codereview.qt-project.org/c/qt/qtconnectivity/+/614538 https://codereview.qt-project.org/q/QLowEnergyController https://www.qt.io/blog/security-advisory-qlowenergycontroller-on-linux https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23050.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;qt5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Aw4zZDl3LL7dRv7HVDTRTw==&#34;: {&#xA;      &#34;id&#34;: &#34;Aw4zZDl3LL7dRv7HVDTRTw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23085&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23085 https://bugzilla.redhat.com/show_bug.cgi?id=2342618 https://www.cve.org/CVERecord?id=CVE-2025-23085 https://nvd.nist.gov/vuln/detail/CVE-2025-23085 https://nodejs.org/pt/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23085.json https://access.redhat.com/errata/RHSA-2025:1443&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.18.2-1.module+el9.5.0+22758+4ad2c198&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AwUdH/KSEhHnx1nx0tagUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;AwUdH/KSEhHnx1nx0tagUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2183&#34;,&#xA;      &#34;description&#34;: &#34;AV:L/AC:L/PR:N/UI:R/S:U/\nC:H   ==\u003e   C:N\nI:H   ==\u003e   I:N\nA:H   ==\u003e   A:L&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2183 https://bugzilla.redhat.com/show_bug.cgi?id=2102159 https://www.cve.org/CVERecord?id=CVE-2022-2183 https://nvd.nist.gov/vuln/detail/CVE-2022-2183 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2183.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;: {&#xA;      &#34;id&#34;: &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34459&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the xmllint program distributed by the libxml2 package. A buffer over-read in the xmlHTMLPrintFileContext function in the xmllint.c file may be triggered when a crafted file is processed with the xmllint program using the `--htmlout` command line option, causing an application crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34459 https://bugzilla.redhat.com/show_bug.cgi?id=2280532 https://www.cve.org/CVERecord?id=CVE-2024-34459 https://nvd.nist.gov/vuln/detail/CVE-2024-34459 https://gitlab.gnome.org/GNOME/libxml2/-/issues/720 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34459.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ax9cBjsH+o8aWMbSV/GNMA==&#34;: {&#xA;      &#34;id&#34;: &#34;Ax9cBjsH+o8aWMbSV/GNMA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23085&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23085 https://bugzilla.redhat.com/show_bug.cgi?id=2342618 https://www.cve.org/CVERecord?id=CVE-2025-23085 https://nvd.nist.gov/vuln/detail/CVE-2025-23085 https://nodejs.org/pt/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23085.json https://access.redhat.com/errata/RHSA-2025:1446&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.6-1.module+el9.5.0+22773+9a359385&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AyHFH4N7lNUZlwVfgigcMA==&#34;: {&#xA;      &#34;id&#34;: &#34;AyHFH4N7lNUZlwVfgigcMA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AyZ2Ys1oI8T5ntmwQE0+Qg==&#34;: {&#xA;      &#34;id&#34;: &#34;AyZ2Ys1oI8T5ntmwQE0+Qg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55131&#34;,&#xA;      &#34;description&#34;: &#34;A memory exposure flaw has been discovered in Node.js. A flaw in Node.js&#39;s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55131 https://bugzilla.redhat.com/show_bug.cgi?id=2431350 https://www.cve.org/CVERecord?id=CVE-2025-55131 https://nvd.nist.gov/vuln/detail/CVE-2025-55131 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55131.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ayn8XyGcXwYPR+J1PSWdHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Ayn8XyGcXwYPR+J1PSWdHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41725&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption flaw in the net/http and mime/multipart packages. By sending a specially-crafted request, a remote attacker can cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41725 https://bugzilla.redhat.com/show_bug.cgi?id=2178488 https://www.cve.org/CVERecord?id=CVE-2022-41725 https://nvd.nist.gov/vuln/detail/CVE-2022-41725 https://go.dev/cl/468124 https://go.dev/issue/58006 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E https://pkg.go.dev/vuln/GO-2023-1569 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41725.json https://access.redhat.com/errata/RHBA-2023:2181&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.6-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AzHq3xNdZjrdl02cKyAV8A==&#34;: {&#xA;      &#34;id&#34;: &#34;AzHq3xNdZjrdl02cKyAV8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21710&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21710 https://bugzilla.redhat.com/show_bug.cgi?id=2453151 https://www.cve.org/CVERecord?id=CVE-2026-21710 https://nvd.nist.gov/vuln/detail/CVE-2026-21710 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21710.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;B+E5cjNC599y+nmprS3J2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;B+E5cjNC599y+nmprS3J2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15366&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the imaplib module in the Python standard library. The imaplib module does not reject control characters, such as newlines, in user-controlled input passed to IMAP commands. This issue allows an attacker to inject additional commands to be executed in the IMAP server.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:40:24Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15366 https://bugzilla.redhat.com/show_bug.cgi?id=2431368 https://www.cve.org/CVERecord?id=CVE-2025-15366 https://nvd.nist.gov/vuln/detail/CVE-2025-15366 https://github.com/python/cpython/issues/143921 https://github.com/python/cpython/pull/143922 https://mail.python.org/archives/list/security-announce@python.org/thread/DD7C7JZJYTBXMDOWKCEIEBJLBRU64OMR/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15366.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;B+xaJOiguNTw6xGmTB+mZw==&#34;: {&#xA;      &#34;id&#34;: &#34;B+xaJOiguNTw6xGmTB+mZw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;B/+SfhbeumQponnHheNEVg==&#34;: {&#xA;      &#34;id&#34;: &#34;B/+SfhbeumQponnHheNEVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3138&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3138 https://bugzilla.redhat.com/show_bug.cgi?id=2213748 https://www.cve.org/CVERecord?id=CVE-2023-3138 https://nvd.nist.gov/vuln/detail/CVE-2023-3138 https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/304a654a0d57bf0f00d8998185f0360332cfa36c https://lists.x.org/archives/xorg-announce/2023-June/003406.html https://lists.x.org/archives/xorg-announce/2023-June/003407.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3138.json https://access.redhat.com/errata/RHSA-2023:6497&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-8.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;B0ZJnlI3io/AXTPjqyoADA==&#34;: {&#xA;      &#34;id&#34;: &#34;B0ZJnlI3io/AXTPjqyoADA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23083&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js diagnostics_channel. This vulnerability allows an attacker to reinstate and misuse worker constructors, potentially bypassing the Permission Model via hooking into events when a worker thread is created.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T01:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23083 https://bugzilla.redhat.com/show_bug.cgi?id=2339392 https://www.cve.org/CVERecord?id=CVE-2025-23083 https://nvd.nist.gov/vuln/detail/CVE-2025-23083 https://nodejs.org/en/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23083.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.13.1-1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;B1FsL93s2G1YxIvrdDvTfg==&#34;: {&#xA;      &#34;id&#34;: &#34;B1FsL93s2G1YxIvrdDvTfg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3817&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security issue occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3817 https://bugzilla.redhat.com/show_bug.cgi?id=2227852 https://www.cve.org/CVERecord?id=CVE-2023-3817 https://nvd.nist.gov/vuln/detail/CVE-2023-3817 https://www.openssl.org/news/secadv/20230731.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3817.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;B1THb18jP+rSUaY77CvPng==&#34;: {&#xA;      &#34;id&#34;: &#34;B1THb18jP+rSUaY77CvPng==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-22490&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. Using a specially-crafted repository, Git can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source $GIT_DIR/objects directory contains symbolic links (CVE-2022-39253), the objects directory may still be a symbolic link.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-22490 https://bugzilla.redhat.com/show_bug.cgi?id=2168160 https://www.cve.org/CVERecord?id=CVE-2023-22490 https://nvd.nist.gov/vuln/detail/CVE-2023-22490 https://github.blog/2023-02-14-git-security-vulnerabilities-announced-3/ https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-22490.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;B1gQIzGtgKR02WiRgVPUgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;B1gQIzGtgKR02WiRgVPUgQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;B3tKTgCVG9JSLHIgfbUFmw==&#34;: {&#xA;      &#34;id&#34;: &#34;B3tKTgCVG9JSLHIgfbUFmw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34397&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNOME GLib. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This issue could lead to the GDBus-based client behaving incorrectly with an application-dependent impact.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34397 https://bugzilla.redhat.com/show_bug.cgi?id=2279632 https://www.cve.org/CVERecord?id=CVE-2024-34397 https://nvd.nist.gov/vuln/detail/CVE-2024-34397 https://gitlab.gnome.org/GNOME/glib/-/issues/3268 https://www.openwall.com/lists/oss-security/2024/05/07/5 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34397.json https://access.redhat.com/errata/RHSA-2024:6464&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-14.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;B6Y4wCqGGirgAxQnKrzDxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;B6Y4wCqGGirgAxQnKrzDxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33809&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang.org/x/image/tiff. A remote attacker could exploit this vulnerability by providing a maliciously crafted Tagged Image File Format (TIFF) file. This could cause the image decoding process to attempt to allocate up to 4 gigabytes (GiB) of memory. The excessive resource consumption or an out-of-memory error would lead to a Denial of Service (DoS) condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-25T18:24:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33809 https://bugzilla.redhat.com/show_bug.cgi?id=2451437 https://www.cve.org/CVERecord?id=CVE-2026-33809 https://nvd.nist.gov/vuln/detail/CVE-2026-33809 https://go.dev/cl/757660 https://go.dev/issue/78267 https://pkg.go.dev/vuln/GO-2026-4815 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33809.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;B6kRennXxnam4nW6s2O9mQ==&#34;: {&#xA;      &#34;id&#34;: &#34;B6kRennXxnam4nW6s2O9mQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-30633&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \&#34;any\&#34; field tag, can cause a panic due to stack exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-30633 https://bugzilla.redhat.com/show_bug.cgi?id=2107392 https://www.cve.org/CVERecord?id=CVE-2022-30633 https://nvd.nist.gov/vuln/detail/CVE-2022-30633 https://go.dev/issue/53611 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-30633.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;B7rM39vvdeIIjmDnRAuTIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;B7rM39vvdeIIjmDnRAuTIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;B9qUokfV8wr0vL8EYHLo5g==&#34;: {&#xA;      &#34;id&#34;: &#34;B9qUokfV8wr0vL8EYHLo5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libfdisk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BBNgt41sCJ+dkDLhh8RM2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;BBNgt41sCJ+dkDLhh8RM2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6387&#34;,&#xA;      &#34;description&#34;: &#34;A security regression (CVE-2006-5051) was discovered in OpenSSH&#39;s server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-01T08:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6387 https://bugzilla.redhat.com/show_bug.cgi?id=2294604 https://www.cve.org/CVERecord?id=CVE-2024-6387 https://nvd.nist.gov/vuln/detail/CVE-2024-6387 https://santandersecurityresearch.github.io/blog/sshing_the_masses.html https://www.openssh.com/txt/release-9.8 https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6387.json https://access.redhat.com/errata/RHSA-2024:4312&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-38.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BBVHDYnqIwi0Vk9ZX1yGIw==&#34;: {&#xA;      &#34;id&#34;: &#34;BBVHDYnqIwi0Vk9ZX1yGIw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-23865&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Freetype. An integer overflow vulnerability exists when processing specially crafted OpenType variable fonts. A local attacker could exploit this by convincing a user to open a malicious font file, which may lead to an out-of-bounds read and potential information disclosure or denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-02T16:09:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-23865 https://bugzilla.redhat.com/show_bug.cgi?id=2443891 https://www.cve.org/CVERecord?id=CVE-2026-23865 https://nvd.nist.gov/vuln/detail/CVE-2026-23865 https://gitlab.com/freetype/freetype/-/commit/fc85a255849229c024c8e65f536fe1875d84841c https://sourceforge.net/projects/freetype/files/freetype2/2.14.2/ https://www.facebook.com/security/advisories/cve-2026-23865 https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-23865.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;freetype&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BCUOacmvjky6+oK/3U158Q==&#34;: {&#xA;      &#34;id&#34;: &#34;BCUOacmvjky6+oK/3U158Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0464&#34;,&#xA;      &#34;description&#34;: &#34;A security vulnerability has been identified in all supported OpenSSL versions related to verifying X.509 certificate chains that include policy constraints. This flaw allows attackers to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial of service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the -policy&#39; argument to the command line utilities or calling the X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0464 https://bugzilla.redhat.com/show_bug.cgi?id=2181082 https://www.cve.org/CVERecord?id=CVE-2023-0464 https://nvd.nist.gov/vuln/detail/CVE-2023-0464 https://www.openssl.org/news/secadv/20230322.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0464.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BDC/Jijmwb4kfsAYqG7t2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;BDC/Jijmwb4kfsAYqG7t2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64720&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow flaw has been discovered in libpng. An out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:45:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64720 https://bugzilla.redhat.com/show_bug.cgi?id=2416904 https://www.cve.org/CVERecord?id=CVE-2025-64720 https://nvd.nist.gov/vuln/detail/CVE-2025-64720 https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643 https://github.com/pnggroup/libpng/issues/686 https://github.com/pnggroup/libpng/pull/751 https://github.com/pnggroup/libpng/security/advisories/GHSA-hfc7-ph9c-wcww https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64720.json https://access.redhat.com/errata/RHSA-2026:0238&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BHd7IxntWhEzC1s7XOworQ==&#34;: {&#xA;      &#34;id&#34;: &#34;BHd7IxntWhEzC1s7XOworQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11083&#34;,&#xA;      &#34;description&#34;: &#34;A head based buffer overflow flaw has been discovered in GNU bin utilities. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-27T23:02:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11083 https://bugzilla.redhat.com/show_bug.cgi?id=2399948 https://www.cve.org/CVERecord?id=CVE-2025-11083 https://nvd.nist.gov/vuln/detail/CVE-2025-11083 https://sourceware.org/bugzilla/attachment.cgi?id=16353 https://sourceware.org/bugzilla/show_bug.cgi?id=33457 https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490 https://vuldb.com/?ctiid.326124 https://vuldb.com/?id.326124 https://vuldb.com/?submit.661277 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11083.json https://access.redhat.com/errata/RHSA-2025:23343&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils-gold&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.35.2-67.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BLPjiJKh0zrGI5mH+bPIGw==&#34;: {&#xA;      &#34;id&#34;: &#34;BLPjiJKh0zrGI5mH+bPIGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39323&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the golang cmd/go standard library. A line directive (\&#34;//line\&#34;) can be used to bypass the restrictions on \&#34;//go:cgo_\&#34; directives, allowing blocked linker and compiler flags to pass during compilation. This can result in the unexpected execution of arbitrary code when running \&#34;go build\&#34;. The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39323 https://bugzilla.redhat.com/show_bug.cgi?id=2242544 https://www.cve.org/CVERecord?id=CVE-2023-39323 https://nvd.nist.gov/vuln/detail/CVE-2023-39323 https://go.dev/cl/533215 https://go.dev/issue/63211 https://groups.google.com/g/golang-announce/c/XBa1oHDevAo https://vuln.go.dev/ID/GO-2023-2095.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39323.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BQivQt20Anl3mLgiJoMKAA==&#34;: {&#xA;      &#34;id&#34;: &#34;BQivQt20Anl3mLgiJoMKAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-30205&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Emacs. Org mode considers the content of remote files, such as files opened with TRAMP on remote systems, to be trusted, resulting in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-30205 https://bugzilla.redhat.com/show_bug.cgi?id=2280298 https://www.cve.org/CVERecord?id=CVE-2024-30205 https://nvd.nist.gov/vuln/detail/CVE-2024-30205 https://www.openwall.com/lists/oss-security/2024/03/25/2 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-30205.json https://access.redhat.com/errata/RHSA-2024:9302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:27.2-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BS5Qx6nN3HmM64VVoKmayw==&#34;: {&#xA;      &#34;id&#34;: &#34;BS5Qx6nN3HmM64VVoKmayw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3134&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free vulnerability was found in vim&#39;s do_tag() function of the src/tag.c file. The issue triggers when the &#39;tagfunc&#39; closes the window. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3134 https://bugzilla.redhat.com/show_bug.cgi?id=2126085 https://www.cve.org/CVERecord?id=CVE-2022-3134 https://nvd.nist.gov/vuln/detail/CVE-2022-3134 https://huntr.dev/bounties/6ec79e49-c7ab-4cd6-a517-e7934c2eb9dc https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3134.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BSSJGCoYu7W24g5Emwqfdg==&#34;: {&#xA;      &#34;id&#34;: &#34;BSSJGCoYu7W24g5Emwqfdg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-10963&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-10963 https://bugzilla.redhat.com/show_bug.cgi?id=2324291 https://www.cve.org/CVERecord?id=CVE-2024-10963 https://nvd.nist.gov/vuln/detail/CVE-2024-10963 https://github.com/linux-pam/linux-pam/issues/834 https://github.com/linux-pam/linux-pam/pull/835 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-10963.json https://access.redhat.com/errata/RHSA-2024:10244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.5.1-22.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BTToHfvg0weSXCH9D0acFA==&#34;: {&#xA;      &#34;id&#34;: &#34;BTToHfvg0weSXCH9D0acFA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28420&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. A remote attacker could exploit a heap-based buffer overflow and an out-of-bounds read vulnerability in Vim&#39;s terminal emulator. This occurs when processing specially crafted Unicode supplementary plane characters, potentially leading to information disclosure and denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-27T22:04:36Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28420 https://bugzilla.redhat.com/show_bug.cgi?id=2443484 https://www.cve.org/CVERecord?id=CVE-2026-28420 https://nvd.nist.gov/vuln/detail/CVE-2026-28420 https://github.com/vim/vim/commit/bb6de2105b160e729c34063 https://github.com/vim/vim/releases/tag/v9.2.0076 https://github.com/vim/vim/security/advisories/GHSA-rvj2-jrf9-2phg https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28420.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BXlYoXrAW947O+Adruh7Zw==&#34;: {&#xA;      &#34;id&#34;: &#34;BXlYoXrAW947O+Adruh7Zw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32415&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libxml2 library. A heap-based underflow can be triggered when a crafted XML document is validated against an XML schema with certain identity constraints or when a crafted XML schema is used, causing a crash to the application linked to the library and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32415 https://bugzilla.redhat.com/show_bug.cgi?id=2360768 https://www.cve.org/CVERecord?id=CVE-2025-32415 https://nvd.nist.gov/vuln/detail/CVE-2025-32415 https://gitlab.gnome.org/GNOME/libxml2/-/issues/890 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32415.json https://access.redhat.com/errata/RHSA-2025:13428&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-12.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BbM0NZsMsZnNUi1ybIzssw==&#34;: {&#xA;      &#34;id&#34;: &#34;BbM0NZsMsZnNUi1ybIzssw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1151&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ld linker utility of GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-10T17:00:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1151 https://bugzilla.redhat.com/show_bug.cgi?id=2344713 https://www.cve.org/CVERecord?id=CVE-2025-1151 https://nvd.nist.gov/vuln/detail/CVE-2025-1151 https://sourceware.org/bugzilla/attachment.cgi?id=15887 https://sourceware.org/bugzilla/show_bug.cgi?id=32576 https://vuldb.com/?ctiid.295055 https://vuldb.com/?id.295055 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1151.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BbiEB28Kb+GaQAOEIfj+qQ==&#34;: {&#xA;      &#34;id&#34;: &#34;BbiEB28Kb+GaQAOEIfj+qQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-58190&#34;,&#xA;      &#34;description&#34;: &#34;The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) in an exposed go application if an attacker provides specially crafted HTML content.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T17:48:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-58190 https://bugzilla.redhat.com/show_bug.cgi?id=2437110 https://www.cve.org/CVERecord?id=CVE-2025-58190 https://nvd.nist.gov/vuln/detail/CVE-2025-58190 https://github.com/golang/vulndb/issues/4441 https://go.dev/cl/709875 https://groups.google.com/g/golang-announce/c/jnQcOYpiR2c https://pkg.go.dev/vuln/GO-2026-4441 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-58190.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BceQQXlChHEbiy2YYN7FvA==&#34;: {&#xA;      &#34;id&#34;: &#34;BceQQXlChHEbiy2YYN7FvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25136&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSH server (sshd), which introduced a double-free vulnerability during options.kex_algorithms handling. An unauthenticated attacker can trigger the double-free in the default configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25136 https://bugzilla.redhat.com/show_bug.cgi?id=2167636 https://www.cve.org/CVERecord?id=CVE-2023-25136 https://nvd.nist.gov/vuln/detail/CVE-2023-25136 https://bugzilla.mindrot.org/show_bug.cgi?id=3522 https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946 https://www.openwall.com/lists/oss-security/2023/02/02/2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25136.json https://access.redhat.com/errata/RHSA-2023:2645&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-29.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Bd+yU6xHUdyyaw65uiacIw==&#34;: {&#xA;      &#34;id&#34;: &#34;Bd+yU6xHUdyyaw65uiacIw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1752&#34;,&#xA;      &#34;description&#34;: &#34;Improper handling of JavaScript whitespace in html/template&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-05T21:10:22Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/59721 https://go.dev/cl/491616 https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.9&#34;&#xA;    },&#xA;    &#34;BfDjqoaYrd0NKCGGxtokTg==&#34;: {&#xA;      &#34;id&#34;: &#34;BfDjqoaYrd0NKCGGxtokTg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-48231&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free flaw was found in the vim package. When executing a `:s` command for the first time and using a sub-replace-special atom inside the substitution, it is possible that the recursive `:s` call causes memory to be freed, which may later then be accessed by the initial `:s` command. This issue may result in Vim crashing.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-48231 https://bugzilla.redhat.com/show_bug.cgi?id=2250268 https://www.cve.org/CVERecord?id=CVE-2023-48231 https://nvd.nist.gov/vuln/detail/CVE-2023-48231 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/25aabc2b8ee1e19ced6f4da9d866cf9378fc4c5a https://github.com/vim/vim/security/advisories/GHSA-8g46-v9ff-c765 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48231.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BfJzk+M/zKnbrBHcCrvIlA==&#34;: {&#xA;      &#34;id&#34;: &#34;BfJzk+M/zKnbrBHcCrvIlA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BgLn2RypgHsjIVj0SLunZg==&#34;: {&#xA;      &#34;id&#34;: &#34;BgLn2RypgHsjIVj0SLunZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29405&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. The go command may execute arbitrary code at build time when using cgo. This can occur when running \&#34;go get\&#34; on a malicious module, or when running any other command which builds untrusted code. This can be triggered by linker flags, specified via a \&#34;#cgo LDFLAGS\&#34; directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29405 https://bugzilla.redhat.com/show_bug.cgi?id=2217569 https://www.cve.org/CVERecord?id=CVE-2023-29405 https://nvd.nist.gov/vuln/detail/CVE-2023-29405 https://go.dev/cl/501224 https://go.dev/issue/60306 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1842 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29405.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Bh96oSV9q0619slTJCaM0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Bh96oSV9q0619slTJCaM0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-40403&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxslt package. Processing web content may disclose sensitive information. This issue was addressed with improved memory handling.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-26T20:14:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-40403 https://bugzilla.redhat.com/show_bug.cgi?id=2349766 https://www.cve.org/CVERecord?id=CVE-2023-40403 https://nvd.nist.gov/vuln/detail/CVE-2023-40403 http://seclists.org/fulldisclosure/2023/Oct/10 http://seclists.org/fulldisclosure/2023/Oct/3 http://seclists.org/fulldisclosure/2023/Oct/4 http://seclists.org/fulldisclosure/2023/Oct/5 http://seclists.org/fulldisclosure/2023/Oct/6 http://seclists.org/fulldisclosure/2023/Oct/8 http://seclists.org/fulldisclosure/2023/Oct/9 https://bugs.chromium.org/p/chromium/issues/detail?id=1356211 https://bugzilla.gnome.org/show_bug.cgi?id=751621 https://gitlab.gnome.org/GNOME/libxslt/-/issues/94 https://support.apple.com/en-us/HT213927 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-40403.json https://access.redhat.com/errata/RHSA-2026:6266&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxslt-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.1.34-14.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BhK7UpiFjhg7FsRQcftqbg==&#34;: {&#xA;      &#34;id&#34;: &#34;BhK7UpiFjhg7FsRQcftqbg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:11992&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-8.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;: {&#xA;      &#34;id&#34;: &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmount&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Bo7awcYyKS5mr2PoscvH4g==&#34;: {&#xA;      &#34;id&#34;: &#34;Bo7awcYyKS5mr2PoscvH4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32280&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32280 https://bugzilla.redhat.com/show_bug.cgi?id=2456339 https://www.cve.org/CVERecord?id=CVE-2026-32280 https://nvd.nist.gov/vuln/detail/CVE-2026-32280 https://go.dev/cl/758320 https://go.dev/issue/78282 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4947 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32280.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BofAiVtqC38hX5ZAkBLTpA==&#34;: {&#xA;      &#34;id&#34;: &#34;BofAiVtqC38hX5ZAkBLTpA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2024-2599&#34;,&#xA;      &#34;description&#34;: &#34;Memory exhaustion in multipart form parsing in net/textproto and net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T22:15:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/65383 https://go.dev/cl/569341 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.21.8&#34;&#xA;    },&#xA;    &#34;Bp0jmZLVDqekxjq/Mq7PPA==&#34;: {&#xA;      &#34;id&#34;: &#34;Bp0jmZLVDqekxjq/Mq7PPA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-1962&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the golang standard library, go/parser. When calling any Parse functions on the Go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion. This issue allows an attacker to impact system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-1962 https://bugzilla.redhat.com/show_bug.cgi?id=2107376 https://www.cve.org/CVERecord?id=CVE-2022-1962 https://nvd.nist.gov/vuln/detail/CVE-2022-1962 https://go.dev/issue/53616 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1962.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Bp4O+K+hM5aEmCc59xUWdA==&#34;: {&#xA;      &#34;id&#34;: &#34;Bp4O+K+hM5aEmCc59xUWdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24807&#34;,&#xA;      &#34;description&#34;: &#34;Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24807 https://bugzilla.redhat.com/show_bug.cgi?id=2172204 https://www.cve.org/CVERecord?id=CVE-2023-24807 https://nvd.nist.gov/vuln/detail/CVE-2023-24807 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24807.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BqzAZ5iQVHE6OkJ+a2YydQ==&#34;: {&#xA;      &#34;id&#34;: &#34;BqzAZ5iQVHE6OkJ+a2YydQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4342&#34;,&#xA;      &#34;description&#34;: &#34;Excessive CPU consumption when building archive index in archive/zip&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:08:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/736713 https://go.dev/issue/77102 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.12&#34;&#xA;    },&#xA;    &#34;BsGuSaqfP6qrCK8KTTY4qw==&#34;: {&#xA;      &#34;id&#34;: &#34;BsGuSaqfP6qrCK8KTTY4qw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici package for Node.js. Undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If an app has a mechanism that sends multipart requests to an attacker-controlled website, it can leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T17:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22150 https://bugzilla.redhat.com/show_bug.cgi?id=2339176 https://www.cve.org/CVERecord?id=CVE-2025-22150 https://nvd.nist.gov/vuln/detail/CVE-2025-22150 https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113 https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0 https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385 https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975 https://hackerone.com/reports/2913312 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22150.json https://access.redhat.com/errata/RHSA-2025:1443&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.18.2.1.module+el9.5.0+22758+4ad2c198&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Bu9dxnhmsLXDd3x0oRPHfA==&#34;: {&#xA;      &#34;id&#34;: &#34;Bu9dxnhmsLXDd3x0oRPHfA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11413&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted object file with the ld linker can trigger an out-of-bounds write in the bfd_putl64 function in the bfd/libbfd.c file due to an improper check, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-07T22:02:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11413 https://bugzilla.redhat.com/show_bug.cgi?id=2402423 https://www.cve.org/CVERecord?id=CVE-2025-11413 https://nvd.nist.gov/vuln/detail/CVE-2025-11413 https://sourceware.org/bugzilla/show_bug.cgi?id=33456 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0 https://vuldb.com/?id.327349 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11413.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Bua36N02B8W4H7+P8yixkw==&#34;: {&#xA;      &#34;id&#34;: &#34;Bua36N02B8W4H7+P8yixkw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24791&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go. The net/http module mishandles specific server responses from HTTP/1.1 client requests. This issue may render a connection invalid and cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24791 https://bugzilla.redhat.com/show_bug.cgi?id=2295310 https://www.cve.org/CVERecord?id=CVE-2024-24791 https://nvd.nist.gov/vuln/detail/CVE-2024-24791 https://go.dev/cl/591255 https://go.dev/issue/67555 https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24791.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BwQexIGmUvV9ONa+9gpe2w==&#34;: {&#xA;      &#34;id&#34;: &#34;BwQexIGmUvV9ONa+9gpe2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26461&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in krb5 in /krb5/src/lib/gssapi/krb5/k5sealv3.c. This issue can lead to a denial of service through memory exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-26461 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://www.cve.org/CVERecord?id=CVE-2024-26461 https://nvd.nist.gov/vuln/detail/CVE-2024-26461 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-26461.json https://access.redhat.com/errata/RHSA-2024:9331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ByykkIf8cqMarBUwgOjK0g==&#34;: {&#xA;      &#34;id&#34;: &#34;ByykkIf8cqMarBUwgOjK0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30588&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30588 https://bugzilla.redhat.com/show_bug.cgi?id=2219838 https://www.cve.org/CVERecord?id=CVE-2023-30588 https://nvd.nist.gov/vuln/detail/CVE-2023-30588 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30588.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;BzOgc4nzX2HHoodQY6X6vQ==&#34;: {&#xA;      &#34;id&#34;: &#34;BzOgc4nzX2HHoodQY6X6vQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45288&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45288 https://bugzilla.redhat.com/show_bug.cgi?id=2268273 https://www.cve.org/CVERecord?id=CVE-2023-45288 https://nvd.nist.gov/vuln/detail/CVE-2023-45288 https://nowotarski.info/http2-continuation-flood/ https://pkg.go.dev/vuln/GO-2024-2687 https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45288.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Bzc4r1UXMoCf7blNLHkQGw==&#34;: {&#xA;      &#34;id&#34;: &#34;Bzc4r1UXMoCf7blNLHkQGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4330&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython&#39;s tarfile module. This vulnerability allows bypassing of extraction filters, enabling symlink traversal outside the intended extraction directory and potential modification of file metadata via malicious tar archives using TarFile.extractall() or TarFile.extract() with the filter=\&#34;data\&#34; or filter=\&#34;tar\&#34; parameters. This issue leads to potentially overwriting or modifying system files and metadata.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:58:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4330 https://bugzilla.redhat.com/show_bug.cgi?id=2370014 https://www.cve.org/CVERecord?id=CVE-2025-4330 https://nvd.nist.gov/vuln/detail/CVE-2025-4330 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4330.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;C+2GxqMTQEZYKlJYDQE1Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;C+2GxqMTQEZYKlJYDQE1Pg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;C+zOyZD8CwAZei0FDIvlTA==&#34;: {&#xA;      &#34;id&#34;: &#34;C+zOyZD8CwAZei0FDIvlTA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27140&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Go programming language (golang) and its command-line tool (cmd/go). A remote attacker could exploit this during the build process by crafting malicious SWIG (Simplified Wrapper and Interface Generator) file names that contain \&#34;cgo\&#34; and specific payloads. This could lead to code smuggling and arbitrary code execution, bypassing trust mechanisms and allowing the attacker to run unauthorized code.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27140 https://bugzilla.redhat.com/show_bug.cgi?id=2456341 https://www.cve.org/CVERecord?id=CVE-2026-27140 https://nvd.nist.gov/vuln/detail/CVE-2026-27140 https://go.dev/cl/763768 https://go.dev/issue/78335 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4871 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27140.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;C/qQQwNpHdvLBRbvV/RD1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;C/qQQwNpHdvLBRbvV/RD1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21710&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21710 https://bugzilla.redhat.com/show_bug.cgi?id=2453151 https://www.cve.org/CVERecord?id=CVE-2026-21710 https://nvd.nist.gov/vuln/detail/CVE-2026-21710 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21710.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;C0udSo+foVK8TphEaJ9u7g==&#34;: {&#xA;      &#34;id&#34;: &#34;C0udSo+foVK8TphEaJ9u7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-1000383&#34;,&#xA;      &#34;description&#34;: &#34;It was found that emacs applies the opened file read permissions to the swap file, overriding the process&#39; umask. An attacker might search for vim swap files, that were not deleted properly, in order to retrieve sensible data.&#34;,&#xA;      &#34;issued&#34;: &#34;2017-10-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2017-1000383 https://bugzilla.redhat.com/show_bug.cgi?id=1508788 https://www.cve.org/CVERecord?id=CVE-2017-1000383 https://nvd.nist.gov/vuln/detail/CVE-2017-1000383 https://security.access.redhat.com/data/csaf/v2/vex/2017/cve-2017-1000383.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;C2ejCCBwa9n29Fq9gpW/sw==&#34;: {&#xA;      &#34;id&#34;: &#34;C2ejCCBwa9n29Fq9gpW/sw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26458&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in krb5 in /krb5/src/lib/rpc/pmap_rmt.c. This issue can lead to a denial of service through memory exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-26458 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://www.cve.org/CVERecord?id=CVE-2024-26458 https://nvd.nist.gov/vuln/detail/CVE-2024-26458 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-26458.json https://access.redhat.com/errata/RHSA-2024:9331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;C7VuSVoDHe6g3ERpzwYLFg==&#34;: {&#xA;      &#34;id&#34;: &#34;C7VuSVoDHe6g3ERpzwYLFg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11731&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the exsltFuncResultComp() function of libxslt, which handles EXSLT \u003cfunc:result\u003e elements during stylesheet parsing. Due to improper type handling, the function may treat an XML document node as a regular XML element node, resulting in a type confusion. This can cause unexpected memory reads and potential crashes. While difficult to exploit, the flaw could lead to application instability or denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11731 https://bugzilla.redhat.com/show_bug.cgi?id=2403688 https://www.cve.org/CVERecord?id=CVE-2025-11731 https://nvd.nist.gov/vuln/detail/CVE-2025-11731 https://gitlab.gnome.org/GNOME/libxslt/-/issues/151 https://gitlab.gnome.org/GNOME/libxslt/-/merge_requests/78 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11731.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxslt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;C7v5oMuGS9CuS5bfckNF/w==&#34;: {&#xA;      &#34;id&#34;: &#34;C7v5oMuGS9CuS5bfckNF/w==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0477&#34;,&#xA;      &#34;description&#34;: &#34;Indefinite hang with large buffers on Windows in crypto/rand&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-09T01:43:37Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/402257 https://go.googlesource.com/go/+/bb1f4416180511231de6d17a1f2f55c82aafc863 https://go.dev/issue/52561 https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3&#34;&#xA;    },&#xA;    &#34;C9NKmmH/EbcYxVOEg1uY9g==&#34;: {&#xA;      &#34;id&#34;: &#34;C9NKmmH/EbcYxVOEg1uY9g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CBFMybHyX4sHIYPIO6U5nw==&#34;: {&#xA;      &#34;id&#34;: &#34;CBFMybHyX4sHIYPIO6U5nw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26996&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-20T03:05:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26996 https://bugzilla.redhat.com/show_bug.cgi?id=2441268 https://www.cve.org/CVERecord?id=CVE-2026-26996 https://nvd.nist.gov/vuln/detail/CVE-2026-26996 https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26996.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CBxUpiwpFiagAj3ihqf+vQ==&#34;: {&#xA;      &#34;id&#34;: &#34;CBxUpiwpFiagAj3ihqf+vQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CCQ15lzJdM5OqfQf0dLnJQ==&#34;: {&#xA;      &#34;id&#34;: &#34;CCQ15lzJdM5OqfQf0dLnJQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds write in the extractContigSamplesShifted32bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited data modification.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0802 https://bugzilla.redhat.com/show_bug.cgi?id=2170178 https://www.cve.org/CVERecord?id=CVE-2023-0802 https://nvd.nist.gov/vuln/detail/CVE-2023-0802 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0802.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CD0KTiCn+kQ9+lGQdzy4Lw==&#34;: {&#xA;      &#34;id&#34;: &#34;CD0KTiCn+kQ9+lGQdzy4Lw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32002&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This vulnerability allows the malicious manipulation of repositories containing submodules, exploiting a bug that enables the writing of files into the .git/ directory instead of the submodule&#39;s intended worktree. This manipulation facilitates the execution of arbitrary code during the cloning process, bypassing user inspection and control.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32002 https://bugzilla.redhat.com/show_bug.cgi?id=2280421 https://www.cve.org/CVERecord?id=CVE-2024-32002 https://nvd.nist.gov/vuln/detail/CVE-2024-32002 https://github.com/git/git/security/advisories/GHSA-8h77-4q3w-gfgv https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32002.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CDo6xcGHS8cRMMAj5ptO4w==&#34;: {&#xA;      &#34;id&#34;: &#34;CDo6xcGHS8cRMMAj5ptO4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22801&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a reference library for PNG (Portable Network Graphics) raster image files. An integer truncation vulnerability exists in the png_write_image_16bit and png_write_image_8bit simplified write API functions. A local attacker could exploit this flaw by providing a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes, leading to a heap buffer over-read. This can result in information disclosure or a denial of service (DoS) to the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T22:57:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22801 https://bugzilla.redhat.com/show_bug.cgi?id=2428824 https://www.cve.org/CVERecord?id=CVE-2026-22801 https://nvd.nist.gov/vuln/detail/CVE-2026-22801 https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22801.json https://access.redhat.com/errata/RHSA-2026:3405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CFRtSPlXDJlgi28bdADXZg==&#34;: {&#xA;      &#34;id&#34;: &#34;CFRtSPlXDJlgi28bdADXZg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2024-3105&#34;,&#xA;      &#34;description&#34;: &#34;Stack exhaustion in all Parse functions in go/parser&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T19:15:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/611238 https://go.dev/issue/69138 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.22.7&#34;&#xA;    },&#xA;    &#34;CGXPj+Vc0sEcrUqgBw+BIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;CGXPj+Vc0sEcrUqgBw+BIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21710&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21710 https://bugzilla.redhat.com/show_bug.cgi?id=2453151 https://www.cve.org/CVERecord?id=CVE-2026-21710 https://nvd.nist.gov/vuln/detail/CVE-2026-21710 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21710.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CH/8kg0DShdiNjzv6+DZnA==&#34;: {&#xA;      &#34;id&#34;: &#34;CH/8kg0DShdiNjzv6+DZnA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35938&#34;,&#xA;      &#34;description&#34;: &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35938 https://bugzilla.redhat.com/show_bug.cgi?id=1964114 https://www.cve.org/CVERecord?id=CVE-2021-35938 https://nvd.nist.gov/vuln/detail/CVE-2021-35938 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35938.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-build-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CMGu0bZesU9cyPAc2vK34g==&#34;: {&#xA;      &#34;id&#34;: &#34;CMGu0bZesU9cyPAc2vK34g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-12900&#34;,&#xA;      &#34;description&#34;: &#34;A data integrity error was found in the bzip2 (User-space package) functionality when decompressing. This issue occurs when a user decompresses a particular kind of .bz2 files. A local user could get unexpected results (or corrupted data) as result of decompressing these files.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-15T10:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-12900 https://bugzilla.redhat.com/show_bug.cgi?id=2332075 https://www.cve.org/CVERecord?id=CVE-2019-12900 https://nvd.nist.gov/vuln/detail/CVE-2019-12900 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-12900.json https://access.redhat.com/errata/RHSA-2025:0925&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.0.8-10.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CPaw49wKw01O8KSP+trXbw==&#34;: {&#xA;      &#34;id&#34;: &#34;CPaw49wKw01O8KSP+trXbw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11081&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in GNU bin utilities. This issue affects the function dump_dwarf_section of the file binutils/objdump.c. Performing manipulation results in out-of-bounds read. The attack is only possible with local access.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-27T22:02:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11081 https://bugzilla.redhat.com/show_bug.cgi?id=2399944 https://www.cve.org/CVERecord?id=CVE-2025-11081 https://nvd.nist.gov/vuln/detail/CVE-2025-11081 https://github.com/user-attachments/files/20623354/hdf5_crash_3.txt https://sourceware.org/bugzilla/show_bug.cgi?id=33406 https://sourceware.org/bugzilla/show_bug.cgi?id=33406#c2 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b https://vuldb.com/?ctiid.326122 https://vuldb.com/?id.326122 https://vuldb.com/?submit.661275 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11081.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CQNzMQJa1wEomWRr1m5WUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;CQNzMQJa1wEomWRr1m5WUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34982&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. A modeline is used to set specific editor options directly from a text file. However, the `complete`, `guitabtooltip`, `printheader` options and the `mapset` function lack proper security checks, allowing an attacker to bypass restrictions and cause arbitrary OS command execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T15:16:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34982 https://bugzilla.redhat.com/show_bug.cgi?id=2455400 https://www.cve.org/CVERecord?id=CVE-2026-34982 https://nvd.nist.gov/vuln/detail/CVE-2026-34982 http://www.openwall.com/lists/oss-security/2026/04/01/1 https://github.com/vim/vim/commit/75661a66a1db1e1f3f1245c615 https://github.com/vim/vim/releases/tag/v9.2.0276 https://github.com/vim/vim/security/advisories/GHSA-8h6p-m6gr-mpw9 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34982.json https://access.redhat.com/errata/RHSA-2026:11510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CQPV/OxtJ+DwYc6C4gniNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;CQPV/OxtJ+DwYc6C4gniNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-47008&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak was found in binutils in the make_tempdir and make_tempname functions. This flaw allows an attacker to use a set of steps to trigger a memory leak and perform a denial of service, resulting in a loss of the system&#39;s availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-47008 https://bugzilla.redhat.com/show_bug.cgi?id=2233984 https://www.cve.org/CVERecord?id=CVE-2022-47008 https://nvd.nist.gov/vuln/detail/CVE-2022-47008 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47008.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CQXGvG5qF0LSGK3lgLUXJg==&#34;: {&#xA;      &#34;id&#34;: &#34;CQXGvG5qF0LSGK3lgLUXJg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2511&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A malicious client can trigger an uncontrolled memory consumption, resulting in a Denial of Service. This issue occurs due to OpenSSL&#39;s TLSv1.3 session cache going into an incorrect state, leading to it failing to flush properly as it fills. OpenSSL must be configured with the non-default SSL_OP_NO_TICKET option enabled to be vulnerable. This issue only affects TLSv1.3 servers, while TLS clients are not affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2511 https://bugzilla.redhat.com/show_bug.cgi?id=2274020 https://www.cve.org/CVERecord?id=CVE-2024-2511 https://nvd.nist.gov/vuln/detail/CVE-2024-2511 https://www.openssl.org/news/vulnerabilities.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2511.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CQY3y5mGXL6FhNg/bhr8Rw==&#34;: {&#xA;      &#34;id&#34;: &#34;CQY3y5mGXL6FhNg/bhr8Rw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Errno&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.30-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CSv4lPWUxMcEgRRI/WkPaA==&#34;: {&#xA;      &#34;id&#34;: &#34;CSv4lPWUxMcEgRRI/WkPaA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CUQJjAsDbX9xkyOrUzo/mg==&#34;: {&#xA;      &#34;id&#34;: &#34;CUQJjAsDbX9xkyOrUzo/mg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bsdtar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CV6bnIgwQPKblPGXrSplMA==&#34;: {&#xA;      &#34;id&#34;: &#34;CV6bnIgwQPKblPGXrSplMA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6993&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in go-kratos kratos. A remote attacker could exploit a vulnerability in the HTTP server&#39;s `NewServer` function, specifically within the `http.DefaultServeMux Fallback Handler`. This manipulation creates an unintended intermediary, which can lead to the disclosure of sensitive information.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-25T18:30:16Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6993 https://bugzilla.redhat.com/show_bug.cgi?id=2461841 https://www.cve.org/CVERecord?id=CVE-2026-6993 https://nvd.nist.gov/vuln/detail/CVE-2026-6993 https://github.com/Yanhu007/kratos/commit/0284a5bcf92b5a7ee015300ce3051baf7ae4718d https://github.com/go-kratos/kratos/ https://github.com/go-kratos/kratos/issues/3810 https://github.com/go-kratos/kratos/pull/3814 https://vuldb.com/submit/797099 https://vuldb.com/vuln/359545 https://vuldb.com/vuln/359545/cti https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6993.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CVEVcsUTo53Dm1KwYASf/w==&#34;: {&#xA;      &#34;id&#34;: &#34;CVEVcsUTo53Dm1KwYASf/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32289&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `html/template` package. This vulnerability arises from improper tracking of context and brace depth within JavaScript (JS) template literals. A remote attacker could exploit these issues to cause content to be incorrectly or improperly escaped, leading to Cross-Site Scripting (XSS) vulnerabilities. This could allow an attacker to inject malicious scripts into web pages viewed by other users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32289 https://bugzilla.redhat.com/show_bug.cgi?id=2456334 https://www.cve.org/CVERecord?id=CVE-2026-32289 https://nvd.nist.gov/vuln/detail/CVE-2026-32289 https://go.dev/cl/763762 https://go.dev/issue/78331 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4865 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32289.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CVNFdSU8eHIr3mZk7+SX/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;CVNFdSU8eHIr3mZk7+SX/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24539&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang where angle brackets (\u003c\u003e) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a &#39;/&#39; character could result in the CSS context unexpectedly closing, allowing for the injection of unexpected HMTL if executed with untrusted input.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24539 https://bugzilla.redhat.com/show_bug.cgi?id=2196026 https://www.cve.org/CVERecord?id=CVE-2023-24539 https://nvd.nist.gov/vuln/detail/CVE-2023-24539 https://github.com/golang/go/issues/59720 https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24539.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CW81Lp11K0nBc+3dYegY/g==&#34;: {&#xA;      &#34;id&#34;: &#34;CW81Lp11K0nBc+3dYegY/g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25629&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25629 https://bugzilla.redhat.com/show_bug.cgi?id=2265713 https://www.cve.org/CVERecord?id=CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629 https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25629.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CXlZx/1BY/yqrUCuQlON2w==&#34;: {&#xA;      &#34;id&#34;: &#34;CXlZx/1BY/yqrUCuQlON2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CYbzKTdqzfhVDluEF23Dxg==&#34;: {&#xA;      &#34;id&#34;: &#34;CYbzKTdqzfhVDluEF23Dxg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-24928&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a stack-based buffer overflow via DTD validation of an untrusted document or untrusted DTD.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-24928 https://bugzilla.redhat.com/show_bug.cgi?id=2346421 https://www.cve.org/CVERecord?id=CVE-2025-24928 https://nvd.nist.gov/vuln/detail/CVE-2025-24928 https://gitlab.gnome.org/GNOME/libxml2/-/issues/847 https://issues.oss-fuzz.com/issues/392687022 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-24928.json https://access.redhat.com/errata/RHSA-2025:2679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_5.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CYkHBvLQQf6RYY/2Qkr5gw==&#34;: {&#xA;      &#34;id&#34;: &#34;CYkHBvLQQf6RYY/2Qkr5gw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2511&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A malicious client can trigger an uncontrolled memory consumption, resulting in a Denial of Service. This issue occurs due to OpenSSL&#39;s TLSv1.3 session cache going into an incorrect state, leading to it failing to flush properly as it fills. OpenSSL must be configured with the non-default SSL_OP_NO_TICKET option enabled to be vulnerable. This issue only affects TLSv1.3 servers, while TLS clients are not affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2511 https://bugzilla.redhat.com/show_bug.cgi?id=2274020 https://www.cve.org/CVERecord?id=CVE-2024-2511 https://nvd.nist.gov/vuln/detail/CVE-2024-2511 https://www.openssl.org/news/vulnerabilities.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2511.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CaVsGPkqzxcrIauiEFdPpw==&#34;: {&#xA;      &#34;id&#34;: &#34;CaVsGPkqzxcrIauiEFdPpw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35937&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35937 https://bugzilla.redhat.com/show_bug.cgi?id=1964125 https://www.cve.org/CVERecord?id=CVE-2021-35937 https://nvd.nist.gov/vuln/detail/CVE-2021-35937 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35937.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-sign-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CacO7saUr+KLTbynVQRYzg==&#34;: {&#xA;      &#34;id&#34;: &#34;CacO7saUr+KLTbynVQRYzg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cpp&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Cbqd4MLPHY6FcToWh7U3IA==&#34;: {&#xA;      &#34;id&#34;: &#34;Cbqd4MLPHY6FcToWh7U3IA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-35252&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability found in curl. This security flaw happens when curl is used to retrieve and parse cookies from an HTTP(S) server, where it accepts cookies using control codes (byte values below 32), and also when cookies that contain such control codes are later sent back to an HTTP(S) server, possibly causing the server to return a 400 response. This issue effectively allows a \&#34;sister site\&#34; to deny service to siblings and cause a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-35252 https://bugzilla.redhat.com/show_bug.cgi?id=2120718 https://www.cve.org/CVERecord?id=CVE-2022-35252 https://nvd.nist.gov/vuln/detail/CVE-2022-35252 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-35252.json https://access.redhat.com/errata/RHSA-2023:2478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CfhyOTUZXzyZ1gBqX8Jz5Q==&#34;: {&#xA;      &#34;id&#34;: &#34;CfhyOTUZXzyZ1gBqX8Jz5Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27137&#34;,&#xA;      &#34;description&#34;: &#34;A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:28:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27137 https://bugzilla.redhat.com/show_bug.cgi?id=2445345 https://www.cve.org/CVERecord?id=CVE-2026-27137 https://nvd.nist.gov/vuln/detail/CVE-2026-27137 https://go.dev/cl/752182 https://go.dev/issue/77952 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://pkg.go.dev/vuln/GO-2026-4599 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27137.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CoMZiX0VsWNhKSQo1NCYkg==&#34;: {&#xA;      &#34;id&#34;: &#34;CoMZiX0VsWNhKSQo1NCYkg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1244&#34;,&#xA;      &#34;description&#34;: &#34;A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1244 https://bugzilla.redhat.com/show_bug.cgi?id=2345150 https://www.cve.org/CVERecord?id=CVE-2025-1244 https://nvd.nist.gov/vuln/detail/CVE-2025-1244 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1244.json https://access.redhat.com/errata/RHSA-2025:1915&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:27.2-11.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Cr4I2Hcgcf8xO3Bc2/KIfA==&#34;: {&#xA;      &#34;id&#34;: &#34;Cr4I2Hcgcf8xO3Bc2/KIfA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1840&#34;,&#xA;      &#34;description&#34;: &#34;Unsafe behavior in setuid/setgid binaries in runtime&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T20:16:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/60272 https://go.dev/cl/501223 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.10&#34;&#xA;    },&#xA;    &#34;CrxvMdhOPgYpnOjfUKfH3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;CrxvMdhOPgYpnOjfUKfH3Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7006&#34;,&#xA;      &#34;description&#34;: &#34;A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7006 https://bugzilla.redhat.com/show_bug.cgi?id=2302996 https://www.cve.org/CVERecord?id=CVE-2024-7006 https://nvd.nist.gov/vuln/detail/CVE-2024-7006 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7006.json https://access.redhat.com/errata/RHSA-2024:8914&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-12.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;CuWE9qOLaSI+JhOsCiY03Q==&#34;: {&#xA;      &#34;id&#34;: &#34;CuWE9qOLaSI+JhOsCiY03Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24540&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set \&#34;\\t\\n\\f\\r\\u0020\\u2028\\u2029\&#34; in JavaScript contexts that also contain actions may not be properly sanitized during execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24540 https://bugzilla.redhat.com/show_bug.cgi?id=2196027 https://www.cve.org/CVERecord?id=CVE-2023-24540 https://nvd.nist.gov/vuln/detail/CVE-2023-24540 https://go.dev/issue/59721 https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24540.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Cxqp3OmZ1TuIow2bpolrUA==&#34;: {&#xA;      &#34;id&#34;: &#34;Cxqp3OmZ1TuIow2bpolrUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;D17rv5OxhiqZrK+otc1Xcg==&#34;: {&#xA;      &#34;id&#34;: &#34;D17rv5OxhiqZrK+otc1Xcg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35386&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability allows a remote attacker to achieve arbitrary command execution by injecting shell metacharacters into a username provided on the command line. Exploitation requires an untrusted username and a non-default configuration of the &#39;%&#39; character in `ssh_config`.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:44:27Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35386 https://bugzilla.redhat.com/show_bug.cgi?id=2454506 https://www.cve.org/CVERecord?id=CVE-2026-35386 https://nvd.nist.gov/vuln/detail/CVE-2026-35386 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35386.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;D1jz5P28B8rwvnVaChXHiw==&#34;: {&#xA;      &#34;id&#34;: &#34;D1jz5P28B8rwvnVaChXHiw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39333&#34;,&#xA;      &#34;description&#34;: &#34;Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39333 https://bugzilla.redhat.com/show_bug.cgi?id=2244418 https://www.cve.org/CVERecord?id=CVE-2023-39333 https://nvd.nist.gov/vuln/detail/CVE-2023-39333 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39333.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;D2CamKwAHk5K+VusEH9d7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;D2CamKwAHk5K+VusEH9d7Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32281&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s `crypto/x509` package. A remote attacker could exploit this by presenting a specially crafted certificate chain containing a large number of policy mappings. This inefficient validation process consumes excessive resources, which can lead to a denial of service (DoS) for applications or systems performing certificate validation.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32281 https://bugzilla.redhat.com/show_bug.cgi?id=2456333 https://www.cve.org/CVERecord?id=CVE-2026-32281 https://nvd.nist.gov/vuln/detail/CVE-2026-32281 https://go.dev/cl/758061 https://go.dev/issue/78281 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4946 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32281.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;D5TjVz7ghGYgdoVa5+N8bw==&#34;: {&#xA;      &#34;id&#34;: &#34;D5TjVz7ghGYgdoVa5+N8bw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12088&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T15:06:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12088 https://bugzilla.redhat.com/show_bug.cgi?id=2330676 https://www.cve.org/CVERecord?id=CVE-2024-12088 https://nvd.nist.gov/vuln/detail/CVE-2024-12088 https://kb.cert.org/vuls/id/952657 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12088.json https://access.redhat.com/errata/RHSA-2025:7050&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.2.5-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;D7U85Qc3CYAscEzhSfT76A==&#34;: {&#xA;      &#34;id&#34;: &#34;D7U85Qc3CYAscEzhSfT76A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DAwq8wwWp0GN/p0AvtHE9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;DAwq8wwWp0GN/p0AvtHE9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46809&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The privateDecrypt() API of the crypto library may allow a covert timing side-channel during PKCS#1 v1.5 padding error handling. This issue revealed significant timing differences in decryption for valid and invalid ciphertexts, which may allow a remote attacker to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing JSON Web Encryption messages.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46809 https://bugzilla.redhat.com/show_bug.cgi?id=2264569 https://www.cve.org/CVERecord?id=CVE-2023-46809 https://nvd.nist.gov/vuln/detail/CVE-2023-46809 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46809.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DCflC/lDsmgt9IFXJM3PyA==&#34;: {&#xA;      &#34;id&#34;: &#34;DCflC/lDsmgt9IFXJM3PyA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DDPdyyhkyoDS2Vq0O3We0w==&#34;: {&#xA;      &#34;id&#34;: &#34;DDPdyyhkyoDS2Vq0O3We0w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;: {&#xA;      &#34;id&#34;: &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4156&#34;,&#xA;      &#34;description&#34;: &#34;A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4156 https://bugzilla.redhat.com/show_bug.cgi?id=2215930 https://www.cve.org/CVERecord?id=CVE-2023-4156 https://nvd.nist.gov/vuln/detail/CVE-2023-4156 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4156.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gawk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DE3GDsNl2faTwlhxzYBbYw==&#34;: {&#xA;      &#34;id&#34;: &#34;DE3GDsNl2faTwlhxzYBbYw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DFOoWHynQeFD6fZDvPyKMg==&#34;: {&#xA;      &#34;id&#34;: &#34;DFOoWHynQeFD6fZDvPyKMg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DG5z7r6LqnKlVNwHAxeXgA==&#34;: {&#xA;      &#34;id&#34;: &#34;DG5z7r6LqnKlVNwHAxeXgA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4674&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-29T21:19:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4674 https://bugzilla.redhat.com/show_bug.cgi?id=2384329 https://www.cve.org/CVERecord?id=CVE-2025-4674 https://nvd.nist.gov/vuln/detail/CVE-2025-4674 https://go.dev/cl/686515 https://go.dev/issue/74380 https://groups.google.com/g/golang-announce/c/gTNJnDXmn34 https://pkg.go.dev/vuln/GO-2025-3828 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4674.json https://access.redhat.com/errata/RHSA-2025:13935&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.6-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DGdHlHvCVlJgbLPDhdwSoA==&#34;: {&#xA;      &#34;id&#34;: &#34;DGdHlHvCVlJgbLPDhdwSoA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32989&#34;,&#xA;      &#34;description&#34;: &#34;A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T07:54:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32989 https://bugzilla.redhat.com/show_bug.cgi?id=2359621 https://www.cve.org/CVERecord?id=CVE-2025-32989 https://nvd.nist.gov/vuln/detail/CVE-2025-32989 https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32989.json https://access.redhat.com/errata/RHSA-2025:16116&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-6.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DI5ofU0JT+/wsYx2AeXNiA==&#34;: {&#xA;      &#34;id&#34;: &#34;DI5ofU0JT+/wsYx2AeXNiA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41724&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41724 https://bugzilla.redhat.com/show_bug.cgi?id=2178492 https://www.cve.org/CVERecord?id=CVE-2022-41724 https://nvd.nist.gov/vuln/detail/CVE-2022-41724 https://go.dev/cl/468125 https://go.dev/issue/58001 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E https://pkg.go.dev/vuln/GO-2023-1570 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41724.json https://access.redhat.com/errata/RHBA-2023:2181&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.6-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DI7HeHo8A/itZHGTOHOQIg==&#34;: {&#xA;      &#34;id&#34;: &#34;DI7HeHo8A/itZHGTOHOQIg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22866&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-06T16:54:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22866 https://bugzilla.redhat.com/show_bug.cgi?id=2344219 https://www.cve.org/CVERecord?id=CVE-2025-22866 https://nvd.nist.gov/vuln/detail/CVE-2025-22866 https://go.dev/cl/643735 https://go.dev/issue/71383 https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k https://pkg.go.dev/vuln/GO-2025-3447 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22866.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DIXgPb+QqAbL75dH7f2Zww==&#34;: {&#xA;      &#34;id&#34;: &#34;DIXgPb+QqAbL75dH7f2Zww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4741&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in OpenSSL. Calling the OpenSSL API SSL_free_buffers function may cause memory to be accessed that was previously freed in some situations.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4741 https://bugzilla.redhat.com/show_bug.cgi?id=2283757 https://www.cve.org/CVERecord?id=CVE-2024-4741 https://nvd.nist.gov/vuln/detail/CVE-2024-4741 https://www.openssl.org/news/secadv/20240528.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4741.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DK1x7B/vzgaKlXynN3g1KA==&#34;: {&#xA;      &#34;id&#34;: &#34;DK1x7B/vzgaKlXynN3g1KA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52006&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems, most notably .NET and node.js, interpret single Carriage Return characters as newlines, which render the protections against CVE-2020-5260 incomplete for credential helpers, which has the potential to expose stored credentials to malicious URLs.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T18:39:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52006 https://bugzilla.redhat.com/show_bug.cgi?id=2337956 https://www.cve.org/CVERecord?id=CVE-2024-52006 https://nvd.nist.gov/vuln/detail/CVE-2024-52006 https://github.com/git-ecosystem/git-credential-manager/security/advisories/GHSA-86c2-4x57-wc8g https://github.com/git/git/commit/b01b9b81d36759cdcd07305e78765199e1bc2060 https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q https://github.com/git/git/security/advisories/GHSA-r5ph-xg7q-xfrp https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52006.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DKQ/Jfye0O77T1m4bCFM9A==&#34;: {&#xA;      &#34;id&#34;: &#34;DKQ/Jfye0O77T1m4bCFM9A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52425&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Expat (libexpat). When parsing a large token that requires multiple buffer fills to complete, Expat has to re-parse the token from start numerous times. This process may trigger excessive resource consumption, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-52425 https://bugzilla.redhat.com/show_bug.cgi?id=2262877 https://www.cve.org/CVERecord?id=CVE-2023-52425 https://nvd.nist.gov/vuln/detail/CVE-2023-52425 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-52425.json https://access.redhat.com/errata/RHSA-2024:1530&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-1.el9_3.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DNd0sdbW83acQbIl3FDaPw==&#34;: {&#xA;      &#34;id&#34;: &#34;DNd0sdbW83acQbIl3FDaPw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0054&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in Vim, in the do_string_sub function in the eval.c file. The issue occurs because of an invalid memory access due to a missing check of the return value of the vim_regsub function when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file to trigger the out-of-bounds write, causing the application to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0054 https://bugzilla.redhat.com/show_bug.cgi?id=2161349 https://www.cve.org/CVERecord?id=CVE-2023-0054 https://nvd.nist.gov/vuln/detail/CVE-2023-0054 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0054.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DPcSz1MBKzyaMMMhJWVyEA==&#34;: {&#xA;      &#34;id&#34;: &#34;DPcSz1MBKzyaMMMhJWVyEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30774&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30774 https://bugzilla.redhat.com/show_bug.cgi?id=2187139 https://www.cve.org/CVERecord?id=CVE-2023-30774 https://nvd.nist.gov/vuln/detail/CVE-2023-30774 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30774.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DQIgoLb/8+6+HRbr8B6wHw==&#34;: {&#xA;      &#34;id&#34;: &#34;DQIgoLb/8+6+HRbr8B6wHw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38545&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \&#34;let the host resolve the name\&#34; could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38545 https://bugzilla.redhat.com/show_bug.cgi?id=2241933 https://www.cve.org/CVERecord?id=CVE-2023-38545 https://nvd.nist.gov/vuln/detail/CVE-2023-38545 https://curl.se/docs/CVE-2023-38545.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38545.json https://access.redhat.com/errata/RHSA-2023:5763&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DSmpC9N7HZQbvi76icwCgw==&#34;: {&#xA;      &#34;id&#34;: &#34;DSmpC9N7HZQbvi76icwCgw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22873&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability has been identified in the Go os package affecting the Root abstraction, where improper handling of trailing path separators could allow access to the parent directory of a configured root directory. By supplying a filename ending in \&#34;../\&#34;, an attacker may be able to open the immediate parent directory of the intended Root. Although this escape does not allow traversal to higher-level ancestors or direct access to files within the parent directory, it may expose directory metadata or unintended filesystem structure if the application passes untrusted path input to Root.Open.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-04T23:05:24Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22873 https://bugzilla.redhat.com/show_bug.cgi?id=2436992 https://www.cve.org/CVERecord?id=CVE-2025-22873 https://nvd.nist.gov/vuln/detail/CVE-2025-22873 http://www.openwall.com/lists/oss-security/2025/05/06/2 https://go.dev/cl/670036 https://go.dev/issue/73555 https://groups.google.com/g/golang-announce/c/UZoIkUT367A/m/5WDxKizJAQAJ https://pkg.go.dev/vuln/GO-2026-4403 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22873.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;: {&#xA;      &#34;id&#34;: &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1757&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1757 https://bugzilla.redhat.com/show_bug.cgi?id=2435940 https://www.cve.org/CVERecord?id=CVE-2026-1757 https://nvd.nist.gov/vuln/detail/CVE-2026-1757 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1757.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DUP5ugYJi+iUbcfFxoSiig==&#34;: {&#xA;      &#34;id&#34;: &#34;DUP5ugYJi+iUbcfFxoSiig==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27903&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch, a utility for converting glob expressions into JavaScript regular expressions. A remote attacker can exploit this vulnerability by providing a specially crafted glob pattern containing multiple non-adjacent `**` (GLOBSTAR) segments. This can lead to unbounded recursive backtracking in the `matchOne()` function, causing a Denial of Service (DoS) by stalling the Node.js event loop for an extended period.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-26T01:06:32Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27903 https://bugzilla.redhat.com/show_bug.cgi?id=2442919 https://www.cve.org/CVERecord?id=CVE-2026-27903 https://nvd.nist.gov/vuln/detail/CVE-2026-27903 https://github.com/isaacs/minimatch/security/advisories/GHSA-7r86-cg39-jmmj https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27903.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DWR1BhA44yRQDLUOFXdOpw==&#34;: {&#xA;      &#34;id&#34;: &#34;DWR1BhA44yRQDLUOFXdOpw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21711&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The Node.js Permission Model, designed to restrict network access, incorrectly omits permission checks for Unix Domain Socket (UDS) server operations. This allows local code, even when explicitly denied network access, to create and expose inter-process communication (IPC) endpoints. As a result, unauthorized communication can occur between processes on the same host, bypassing the intended network security restrictions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21711 https://bugzilla.redhat.com/show_bug.cgi?id=2453158 https://www.cve.org/CVERecord?id=CVE-2026-21711 https://nvd.nist.gov/vuln/detail/CVE-2026-21711 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21711.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DWl94vpEWRXsnNv1XWboVA==&#34;: {&#xA;      &#34;id&#34;: &#34;DWl94vpEWRXsnNv1XWboVA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6345&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the package_index module of pypa/setuptools. Affected versions of this package allow remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6345 https://bugzilla.redhat.com/show_bug.cgi?id=2297771 https://www.cve.org/CVERecord?id=CVE-2024-6345 https://nvd.nist.gov/vuln/detail/CVE-2024-6345 https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0 https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6345.json https://access.redhat.com/errata/RHSA-2024:5534&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-setuptools-wheel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:53.0.0-12.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DXoWfwXPN9ZCvCU/obObKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;DXoWfwXPN9ZCvCU/obObKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4878&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2451615 https://www.cve.org/CVERecord?id=CVE-2026-4878 https://nvd.nist.gov/vuln/detail/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2447554 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4878.json https://access.redhat.com/errata/RHSA-2026:12441&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.48-10.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DZWopkvTJiWmVsAADTNOUw==&#34;: {&#xA;      &#34;id&#34;: &#34;DZWopkvTJiWmVsAADTNOUw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4435&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython&#39;s tarfile module. This vulnerability allows unauthorized file extraction via crafted tar archives when TarFile.errorlevel=0, bypassing expected filtering mechanisms.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:59:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4435 https://bugzilla.redhat.com/show_bug.cgi?id=2370010 https://www.cve.org/CVERecord?id=CVE-2025-4435 https://nvd.nist.gov/vuln/detail/CVE-2025-4435 https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4435.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Daj39cn0p5rpBblQYRpPNw==&#34;: {&#xA;      &#34;id&#34;: &#34;Daj39cn0p5rpBblQYRpPNw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This issue occurs when hashing empty strings which aren&#39;t null-terminated, xmlDictComputeFastKey could produce inconsistent results, which may lead to various logic or memory errors, including double free errors.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29469 https://bugzilla.redhat.com/show_bug.cgi?id=2185984 https://www.cve.org/CVERecord?id=CVE-2023-29469 https://nvd.nist.gov/vuln/detail/CVE-2023-29469 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29469.json https://access.redhat.com/errata/RHSA-2023:4349&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-3.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DhF8bifcikVpxEkzi7eo9A==&#34;: {&#xA;      &#34;id&#34;: &#34;DhF8bifcikVpxEkzi7eo9A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DhiTSAV5nEGdAk1xkbjRsw==&#34;: {&#xA;      &#34;id&#34;: &#34;DhiTSAV5nEGdAk1xkbjRsw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1569&#34;,&#xA;      &#34;description&#34;: &#34;Excessive resource consumption in mime/multipart&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-21T20:44:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/58006 https://go.dev/cl/468124 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.6&#34;&#xA;    },&#xA;    &#34;DjTY6HUnX+COP0+KJxD8lg==&#34;: {&#xA;      &#34;id&#34;: &#34;DjTY6HUnX+COP0+KJxD8lg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js due to a lack of safeguards on chunk extension bytes. The server may read an unbounded number of bytes from a single connection, which can allow an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22019 https://bugzilla.redhat.com/show_bug.cgi?id=2264574 https://www.cve.org/CVERecord?id=CVE-2024-22019 https://nvd.nist.gov/vuln/detail/CVE-2024-22019 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22019.json https://access.redhat.com/errata/RHSA-2024:1438&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-4.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DjpSix06K6wkPOmaLpbGWg==&#34;: {&#xA;      &#34;id&#34;: &#34;DjpSix06K6wkPOmaLpbGWg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DjqCxCryg8LYvAZ67mAiSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;DjqCxCryg8LYvAZ67mAiSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json https://access.redhat.com/errata/RHSA-2026:13677&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Dlv776lHnCBm01HWpf1zZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Dlv776lHnCBm01HWpf1zZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31147&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs when /dev/urandom or RtlGenRandom() are unavailable, c-ares will use rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand(), so it will generate predictable output.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31147 https://bugzilla.redhat.com/show_bug.cgi?id=2209501 https://www.cve.org/CVERecord?id=CVE-2023-31147 https://nvd.nist.gov/vuln/detail/CVE-2023-31147 https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31147.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DlzGGXSItv6fZobEGaNWCA==&#34;: {&#xA;      &#34;id&#34;: &#34;DlzGGXSItv6fZobEGaNWCA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-1394&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \&#34;return nil, nil, fail(...)\&#34; pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-1394 https://bugzilla.redhat.com/show_bug.cgi?id=2262921 https://www.cve.org/CVERecord?id=CVE-2024-1394 https://nvd.nist.gov/vuln/detail/CVE-2024-1394 https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136 https://github.com/golang-fips/openssl/security/advisories/GHSA-78hx-gp6g-7mj6 https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f https://pkg.go.dev/vuln/GO-2024-2660 https://vuln.go.dev/ID/GO-2024-2660.json https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-1394.json https://access.redhat.com/errata/RHSA-2024:1462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-2.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DmDFGmfYPZVBn95oG8E43w==&#34;: {&#xA;      &#34;id&#34;: &#34;DmDFGmfYPZVBn95oG8E43w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55130&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55130 https://bugzilla.redhat.com/show_bug.cgi?id=2431352 https://www.cve.org/CVERecord?id=CVE-2025-55130 https://nvd.nist.gov/vuln/detail/CVE-2025-55130 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55130.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Dp0x43cNy9IQTCa5Vb7Uyw==&#34;: {&#xA;      &#34;id&#34;: &#34;Dp0x43cNy9IQTCa5Vb7Uyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29402&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program that uses cgo. This can occur when running an untrusted module that contains directories with newline characters in their names. Modules that are retrieved using the go command, for example, via \&#34;go get\&#34;, are not affected. Modules retrieved using GOPATH-mode, for example, GO111MODULE=off may be affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29402 https://bugzilla.redhat.com/show_bug.cgi?id=2217562 https://www.cve.org/CVERecord?id=CVE-2023-29402 https://nvd.nist.gov/vuln/detail/CVE-2023-29402 https://go.dev/cl/501226 https://go.dev/issue/60167 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1839 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29402.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DqajPgSmNnfF5+bVSuLXZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;DqajPgSmNnfF5+bVSuLXZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-34969&#34;,&#xA;      &#34;description&#34;: &#34;An assertion failure vulnerability was found in D-Bus. This issue occurs when a privileged monitoring connection (dbus-monitor, busctl monitor, gdbus monitor, or similar) is active, and a message from the bus driver cannot be delivered to a client connection due to \u003cdeny\u003e rules or outgoing message quota. If a privileged user with control over the dbus-daemon is monitoring the message bus traffic using the Monitoring clients like the dbus-monitor or busctl monitor interfaces, then an unprivileged local user with the ability to connect to the same dbus-daemon could send specially crafted request, causing a dbus-daemon to crash, resulting in a denial of service under some circumstances.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-34969 https://bugzilla.redhat.com/show_bug.cgi?id=2213166 https://www.cve.org/CVERecord?id=CVE-2023-34969 https://nvd.nist.gov/vuln/detail/CVE-2023-34969 https://gitlab.freedesktop.org/dbus/dbus/-/issues/457 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-34969.json https://access.redhat.com/errata/RHSA-2023:4569&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:1.12.20-7.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;: {&#xA;      &#34;id&#34;: &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DrIpfcclD2b0iXSNtu+I6Q==&#34;: {&#xA;      &#34;id&#34;: &#34;DrIpfcclD2b0iXSNtu+I6Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39325&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39325 https://bugzilla.redhat.com/show_bug.cgi?id=2243296 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-39325 https://nvd.nist.gov/vuln/detail/CVE-2023-39325 https://access.redhat.com/security/cve/CVE-2023-44487 https://go.dev/issue/63417 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39325.json https://access.redhat.com/errata/RHSA-2023:5738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.13-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DrL6S4TbqHyLJh/Go9vALA==&#34;: {&#xA;      &#34;id&#34;: &#34;DrL6S4TbqHyLJh/Go9vALA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28321&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. An incorrect International Domain Name (IDN) wildcard match may lead to improper certificate validation.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28321 https://bugzilla.redhat.com/show_bug.cgi?id=2196786 https://www.cve.org/CVERecord?id=CVE-2023-28321 https://nvd.nist.gov/vuln/detail/CVE-2023-28321 https://curl.se/docs/CVE-2023-28321.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28321.json https://access.redhat.com/errata/RHSA-2023:4354&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ds5dBDqvRggZONNskvuAwg==&#34;: {&#xA;      &#34;id&#34;: &#34;Ds5dBDqvRggZONNskvuAwg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s `http.cookies` module. The `Morsel.js_output()` function, responsible for generating JavaScript output for cookies, does not properly neutralize the `\u003c/script\u003e` HTML sequence. This oversight could allow a remote attacker to inject malicious script into a web page, potentially leading to Cross-Site Scripting (XSS) attacks. Such an attack could result in information disclosure or arbitrary code execution within the user&#39;s browser.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-22T19:28:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6019 https://bugzilla.redhat.com/show_bug.cgi?id=2460869 https://www.cve.org/CVERecord?id=CVE-2026-6019 https://nvd.nist.gov/vuln/detail/CVE-2026-6019 https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104 https://github.com/python/cpython/issues/90309 https://github.com/python/cpython/pull/148848 https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6019.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DtCtyEFA0WRhx44S/aRChA==&#34;: {&#xA;      &#34;id&#34;: &#34;DtCtyEFA0WRhx44S/aRChA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DtYmtBkxVMK6KVHn4U+2Yw==&#34;: {&#xA;      &#34;id&#34;: &#34;DtYmtBkxVMK6KVHn4U+2Yw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52533&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Glib library. A buffer overflow condition can be triggered in certain conditions due to an off-by-one error in SOCKS4_CONN_MSG_LEN. This issue may lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52533 https://bugzilla.redhat.com/show_bug.cgi?id=2325340 https://www.cve.org/CVERecord?id=CVE-2024-52533 https://nvd.nist.gov/vuln/detail/CVE-2024-52533 https://gitlab.gnome.org/GNOME/glib/-/issues/3461 https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1 https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52533.json https://access.redhat.com/errata/RHSA-2025:11140&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-16.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DtkRUkQTzcJrj8ZsC36kqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;DtkRUkQTzcJrj8ZsC36kqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-50181&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in urllib3. The `PoolManager` class allows redirects to be disabled by configuring retries in a specific manner, effectively bypassing intended HTTP redirection behavior. A network attacker can leverage this configuration to manipulate request flows and disrupt service. This bypass occurs through improper handling of retry parameters during PoolManager instantiation. This issue can reult in a denial of service or unintended data exposure due to altered request destinations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-19T01:08:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-50181 https://bugzilla.redhat.com/show_bug.cgi?id=2373799 https://www.cve.org/CVERecord?id=CVE-2025-50181 https://nvd.nist.gov/vuln/detail/CVE-2025-50181 https://github.com/urllib3/urllib3/commit/f05b1329126d5be6de501f9d1e3e36738bc08857 https://github.com/urllib3/urllib3/security/advisories/GHSA-pq67-6m6q-mj2v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-50181.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DwDznogCJiIx7SjddRcbCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;DwDznogCJiIx7SjddRcbCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-49794&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\&#34;...\&#34;/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program&#39;s crash using libxml or other possible undefined behaviors.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-49794 https://bugzilla.redhat.com/show_bug.cgi?id=2372373 https://www.cve.org/CVERecord?id=CVE-2025-49794 https://nvd.nist.gov/vuln/detail/CVE-2025-49794 https://gitlab.gnome.org/GNOME/libxml2/-/issues/931 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-49794.json https://access.redhat.com/errata/RHSA-2025:10699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DyteGYzEcNMaIwU0U8gq/w==&#34;: {&#xA;      &#34;id&#34;: &#34;DyteGYzEcNMaIwU0U8gq/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23166&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, specifically in the C++ method SignTraits::DeriveBits(). This vulnerability can allow a remote attacker to crash the Node.js runtime via untrusted input, triggering an exception in a background thread.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23166 https://bugzilla.redhat.com/show_bug.cgi?id=2367163 https://www.cve.org/CVERecord?id=CVE-2025-23166 https://nvd.nist.gov/vuln/detail/CVE-2025-23166 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23166.json https://access.redhat.com/errata/RHSA-2025:8468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.19.2-1.module+el9.6.0+23146+be9976bd&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DzB2GvXN7uyOKTXPPshLvg==&#34;: {&#xA;      &#34;id&#34;: &#34;DzB2GvXN7uyOKTXPPshLvg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DzmttTV7e68kFVXC8f9lew==&#34;: {&#xA;      &#34;id&#34;: &#34;DzmttTV7e68kFVXC8f9lew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26996&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-20T03:05:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26996 https://bugzilla.redhat.com/show_bug.cgi?id=2441268 https://www.cve.org/CVERecord?id=CVE-2026-26996 https://nvd.nist.gov/vuln/detail/CVE-2026-26996 https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26996.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;E6F4Bsc58fK+0x+N9LY6gA==&#34;: {&#xA;      &#34;id&#34;: &#34;E6F4Bsc58fK+0x+N9LY6gA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:5765&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-3.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;E90jB6HCh1KjzQXtmHMUUg==&#34;: {&#xA;      &#34;id&#34;: &#34;E90jB6HCh1KjzQXtmHMUUg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27613&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the gitk application that could lead to unauthorized file modification or data loss.\n\nThis flaw manifests in two primary scenarios:\n- Untrusted Repository Cloning: When a user is tricked into cloning an untrusted Git repository and then uses gitk to visualize it without any additional parameters, any writable file on the user&#39;s system can be arbitrarily created or truncated. Exploitation via this method also requires the Support per-file encoding option to be explicitly enabled in Gitk&#39;s preferences, which is not the default setting.\n- &#39;Show origin of this line&#39; Command: The vulnerability can also be triggered if a user employs the Show origin of this line command within gitk&#39;s main window while viewing a malicious repository. This method does not depend on the Support per-file encoding option being enabled.\n\nThe primary risk is unauthorized file system modification, which could lead to data integrity issues, data loss, or potentially open avenues for further system compromise.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T13:01:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27613 https://bugzilla.redhat.com/show_bug.cgi?id=2379124 https://www.cve.org/CVERecord?id=CVE-2025-27613 https://nvd.nist.gov/vuln/detail/CVE-2025-27613 https://github.com/j6t/gitk/security/advisories/GHSA-f3cw-xrj3-wr2v https://lore.kernel.org/git/xmqq5xg2wrd1.fsf@gitster.g/ https://www.openwall.com/lists/oss-security/2025/07/08/4 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27613.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EB6fg0YbdpF3FjycPEVN/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;EB6fg0YbdpF3FjycPEVN/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EBopL1hbi9GBQGXZUVNCAA==&#34;: {&#xA;      &#34;id&#34;: &#34;EBopL1hbi9GBQGXZUVNCAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31147&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs when /dev/urandom or RtlGenRandom() are unavailable, c-ares will use rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand(), so it will generate predictable output.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31147 https://bugzilla.redhat.com/show_bug.cgi?id=2209501 https://www.cve.org/CVERecord?id=CVE-2023-31147 https://nvd.nist.gov/vuln/detail/CVE-2023-31147 https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31147.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ECzeIHiPGDDmiEUQjBzFxg==&#34;: {&#xA;      &#34;id&#34;: &#34;ECzeIHiPGDDmiEUQjBzFxg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30589&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30589 https://bugzilla.redhat.com/show_bug.cgi?id=2219841 https://www.cve.org/CVERecord?id=CVE-2023-30589 https://nvd.nist.gov/vuln/detail/CVE-2023-30589 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30589.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EE23Ay78OLUGxmoM3vXPbA==&#34;: {&#xA;      &#34;id&#34;: &#34;EE23Ay78OLUGxmoM3vXPbA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0567&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0567 https://bugzilla.redhat.com/show_bug.cgi?id=2258544 https://www.cve.org/CVERecord?id=CVE-2024-0567 https://nvd.nist.gov/vuln/detail/CVE-2024-0567 https://gitlab.com/gnutls/gnutls/-/issues/1521 https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0567.json https://access.redhat.com/errata/RHSA-2024:0533&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.7.6-23.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EEMnwT7ARQJ+dbVETnKljw==&#34;: {&#xA;      &#34;id&#34;: &#34;EEMnwT7ARQJ+dbVETnKljw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Getopt-Std&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.12-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EEsEsfQRh24NPMdhg4HPHw==&#34;: {&#xA;      &#34;id&#34;: &#34;EEsEsfQRh24NPMdhg4HPHw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EFXoHkta9v8NXWXURLTCBw==&#34;: {&#xA;      &#34;id&#34;: &#34;EFXoHkta9v8NXWXURLTCBw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2297&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython. This vulnerability allows a local user with low privileges to bypass security auditing mechanisms. The issue occurs because the SourcelessFileLoader component, responsible for handling older Python compiled files (.pyc), does not properly trigger system audit events. This oversight could enable malicious activities to go undetected, compromising the integrity of the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-04T22:10:43Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2297 https://bugzilla.redhat.com/show_bug.cgi?id=2444691 https://www.cve.org/CVERecord?id=CVE-2026-2297 https://nvd.nist.gov/vuln/detail/CVE-2026-2297 https://github.com/python/cpython/commit/482d6f8bdba9da3725d272e8bb4a2d25fb6a603e https://github.com/python/cpython/commit/a51b1b512de1d56b3714b65628a2eae2b07e535e https://github.com/python/cpython/commit/e58e9802b9bec5cdbf48fc9bf1da5f4fda482e86 https://github.com/python/cpython/issues/145506 https://github.com/python/cpython/pull/145507 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2297.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EFfUhTiwNATI8s7BT2T3xA==&#34;: {&#xA;      &#34;id&#34;: &#34;EFfUhTiwNATI8s7BT2T3xA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3115&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang: cmd/go, in which Go can execute arbitrary commands at build time when cgo is in use on Windows OS. On Linux/Unix, only users who have \&#34;.\&#34; listed explicitly in their PATH variable are affected. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-01-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3115 https://bugzilla.redhat.com/show_bug.cgi?id=1918761 https://www.cve.org/CVERecord?id=CVE-2021-3115 https://nvd.nist.gov/vuln/detail/CVE-2021-3115 https://groups.google.com/g/golang-announce/c/mperVMGa98w https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3115.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EGDBCdh3xodxfhx6SFGa1w==&#34;: {&#xA;      &#34;id&#34;: &#34;EGDBCdh3xodxfhx6SFGa1w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27982&#34;,&#xA;      &#34;description&#34;: &#34;An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27982 https://bugzilla.redhat.com/show_bug.cgi?id=2275392 https://www.cve.org/CVERecord?id=CVE-2024-27982 https://nvd.nist.gov/vuln/detail/CVE-2024-27982 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27982.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EGiW9TUcKA6dU0wY//GJ7w==&#34;: {&#xA;      &#34;id&#34;: &#34;EGiW9TUcKA6dU0wY//GJ7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EHdSTtZdfwUmOpf3vIeLWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;EHdSTtZdfwUmOpf3vIeLWQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23916&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. A malicious server can insert an unlimited number of compression steps. This decompression chain could result in out-of-memory errors.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23916 https://bugzilla.redhat.com/show_bug.cgi?id=2167815 https://www.cve.org/CVERecord?id=CVE-2023-23916 https://nvd.nist.gov/vuln/detail/CVE-2023-23916 https://curl.se/docs/CVE-2023-23916.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23916.json https://access.redhat.com/errata/RHSA-2023:1701&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-19.el9_1.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EHm3zJn0ztZtx1t/Qo6ngA==&#34;: {&#xA;      &#34;id&#34;: &#34;EHm3zJn0ztZtx1t/Qo6ngA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:11802&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.16.0-2.module+el9.6.0+23339+d3c8acfa&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ENoYJ+9TEzYG+jTQB5meaw==&#34;: {&#xA;      &#34;id&#34;: &#34;ENoYJ+9TEzYG+jTQB5meaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ERpg5QsiyVdbxyySZngvaA==&#34;: {&#xA;      &#34;id&#34;: &#34;ERpg5QsiyVdbxyySZngvaA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24785&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s html/template standard library package. If errors returned from MarshalJSON methods contain user-controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing subsequent actions to inject unexpected content into templates.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24785 https://bugzilla.redhat.com/show_bug.cgi?id=2268022 https://www.cve.org/CVERecord?id=CVE-2024-24785 https://nvd.nist.gov/vuln/detail/CVE-2024-24785 https://go.dev/cl/564196 https://go.dev/issue/65697 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg https://vuln.go.dev/ID/GO-2024-2610.json https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24785.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ETHiyyNutSsXU1p7nfcRIA==&#34;: {&#xA;      &#34;id&#34;: &#34;ETHiyyNutSsXU1p7nfcRIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-49796&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-49796 https://bugzilla.redhat.com/show_bug.cgi?id=2372385 https://www.cve.org/CVERecord?id=CVE-2025-49796 https://nvd.nist.gov/vuln/detail/CVE-2025-49796 https://gitlab.gnome.org/GNOME/libxml2/-/issues/933 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-49796.json https://access.redhat.com/errata/RHSA-2025:10699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ETcQXJZrA6IUPRr4MXFUIw==&#34;: {&#xA;      &#34;id&#34;: &#34;ETcQXJZrA6IUPRr4MXFUIw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6228&#34;,&#xA;      &#34;description&#34;: &#34;An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6228 https://bugzilla.redhat.com/show_bug.cgi?id=2240995 https://www.cve.org/CVERecord?id=CVE-2023-6228 https://nvd.nist.gov/vuln/detail/CVE-2023-6228 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6228.json https://access.redhat.com/errata/RHSA-2024:2289&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-12.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ETjF+btf4DIblmTTbHaZSA==&#34;: {&#xA;      &#34;id&#34;: &#34;ETjF+btf4DIblmTTbHaZSA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28322&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free flaw was found in the Curl package. This issue may lead to unintended information disclosure by the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28322 https://bugzilla.redhat.com/show_bug.cgi?id=2196793 https://www.cve.org/CVERecord?id=CVE-2023-28322 https://nvd.nist.gov/vuln/detail/CVE-2023-28322 https://curl.se/docs/CVE-2023-28322.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28322.json https://access.redhat.com/errata/RHSA-2023:4354&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EUzfiOQu+qZDEDuD1AbDtA==&#34;: {&#xA;      &#34;id&#34;: &#34;EUzfiOQu+qZDEDuD1AbDtA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EVXEAewBnzdtEIOYHBpZfA==&#34;: {&#xA;      &#34;id&#34;: &#34;EVXEAewBnzdtEIOYHBpZfA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8176&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtiff. The `get_histogram` function in `file/tiffmedian.c` exhibits a use-after-free condition when processing a specially crafted file, allowing a local attacker to trigger memory corruption. This manipulation results in a use-after-free vulnerability, and can lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-26T03:32:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8176 https://bugzilla.redhat.com/show_bug.cgi?id=2383598 https://www.cve.org/CVERecord?id=CVE-2025-8176 https://nvd.nist.gov/vuln/detail/CVE-2025-8176 http://www.libtiff.org/ https://gitlab.com/libtiff/libtiff/-/commit/fe10872e53efba9cc36c66ac4ab3b41a839d5172 https://gitlab.com/libtiff/libtiff/-/issues/707 https://gitlab.com/libtiff/libtiff/-/merge_requests/727 https://vuldb.com/?ctiid.317590 https://vuldb.com/?id.317590 https://vuldb.com/?submit.621796 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8176.json https://access.redhat.com/errata/RHSA-2025:19113&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-13.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EX/jsJKUxl+Y92LbkHwIVg==&#34;: {&#xA;      &#34;id&#34;: &#34;EX/jsJKUxl+Y92LbkHwIVg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-2186&#34;,&#xA;      &#34;description&#34;: &#34;Incorrect detection of reserved device names on Windows in path/filepath&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-08T22:42:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/63713 https://go.dev/cl/540277 https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.20.11&#34;&#xA;    },&#xA;    &#34;EXLHkqcreyuJdfrNBsxdNw==&#34;: {&#xA;      &#34;id&#34;: &#34;EXLHkqcreyuJdfrNBsxdNw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1525&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \&#34;Content-Length\&#34; and \&#34;content-length\&#34;). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T19:56:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1525 https://bugzilla.redhat.com/show_bug.cgi?id=2447144 https://www.cve.org/CVERecord?id=CVE-2026-1525 https://nvd.nist.gov/vuln/detail/CVE-2026-1525 https://cna.openjsf.org/security-advisories.html https://cwe.mitre.org/data/definitions/444.html https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm https://hackerone.com/reports/3556037 https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1525.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EXWaDNivW550gBh9Dm6gCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;EXWaDNivW550gBh9Dm6gCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EXi8j2JWeu5xYuWml6Ellg==&#34;: {&#xA;      &#34;id&#34;: &#34;EXi8j2JWeu5xYuWml6Ellg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31124&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This issue occurs when cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross-compiling aarch64 android. As a result, it will downgrade to rand(), which could allow an attacker to utilize the lack of entropy by not using a CSPRNG.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31124 https://bugzilla.redhat.com/show_bug.cgi?id=2209494 https://www.cve.org/CVERecord?id=CVE-2023-31124 https://nvd.nist.gov/vuln/detail/CVE-2023-31124 https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31124.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EYkM0DDu8tbFKzGysEiO0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;EYkM0DDu8tbFKzGysEiO0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27538&#34;,&#xA;      &#34;description&#34;: &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27538 https://bugzilla.redhat.com/show_bug.cgi?id=2179103 https://www.cve.org/CVERecord?id=CVE-2023-27538 https://nvd.nist.gov/vuln/detail/CVE-2023-27538 https://curl.se/docs/CVE-2023-27538.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27538.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EZo12eG9Obl1kmhRKBmcvA==&#34;: {&#xA;      &#34;id&#34;: &#34;EZo12eG9Obl1kmhRKBmcvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38546&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. This flaw allows an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38546 https://bugzilla.redhat.com/show_bug.cgi?id=2241938 https://access.redhat.com/errata/RHSA-2024:2101 https://www.cve.org/CVERecord?id=CVE-2023-38546 https://nvd.nist.gov/vuln/detail/CVE-2023-38546 https://curl.se/docs/CVE-2023-38546.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38546.json https://access.redhat.com/errata/RHSA-2023:5763&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EahYBNc6RsapXfHOvUMG/A==&#34;: {&#xA;      &#34;id&#34;: &#34;EahYBNc6RsapXfHOvUMG/A==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-4008&#34;,&#xA;      &#34;description&#34;: &#34;ALPN negotiation error contains attacker controlled information in crypto/tls&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T21:49:53Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/707776 https://go.dev/issue/75652 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.8&#34;&#xA;    },&#xA;    &#34;Ec/FYvTTz4riEqnQe1G+Fw==&#34;: {&#xA;      &#34;id&#34;: &#34;Ec/FYvTTz4riEqnQe1G+Fw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22871&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/http golang package. The net/http package incorrectly accepts messages that end with a line feed (LF) instead of the proper line ending. When used with another server that also misinterprets this, it can lead to request smuggling—where an attacker tricks the system to send hidden or unauthorized requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T20:04:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22871 https://bugzilla.redhat.com/show_bug.cgi?id=2358493 https://www.cve.org/CVERecord?id=CVE-2025-22871 https://nvd.nist.gov/vuln/detail/CVE-2025-22871 https://go.dev/cl/652998 https://go.dev/issue/71988 https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk https://pkg.go.dev/vuln/GO-2025-3563 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22871.json https://access.redhat.com/errata/RHSA-2025:8476&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.9-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ee2apAGC0PFcPNtPjyeqbg==&#34;: {&#xA;      &#34;id&#34;: &#34;Ee2apAGC0PFcPNtPjyeqbg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23166&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, specifically in the C++ method SignTraits::DeriveBits(). This vulnerability can allow a remote attacker to crash the Node.js runtime via untrusted input, triggering an exception in a background thread.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23166 https://bugzilla.redhat.com/show_bug.cgi?id=2367163 https://www.cve.org/CVERecord?id=CVE-2025-23166 https://nvd.nist.gov/vuln/detail/CVE-2025-23166 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23166.json https://access.redhat.com/errata/RHSA-2025:8467&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.16.0-1.module+el9.6.0+23151+b1496e9d&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EfJCfNem+1eUwnsxx2dNOg==&#34;: {&#xA;      &#34;id&#34;: &#34;EfJCfNem+1eUwnsxx2dNOg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;: {&#xA;      &#34;id&#34;: &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EhGXJy3ul8A4j+8SbzYCkw==&#34;: {&#xA;      &#34;id&#34;: &#34;EhGXJy3ul8A4j+8SbzYCkw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6021&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2&#39;s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6021 https://bugzilla.redhat.com/show_bug.cgi?id=2372406 https://www.cve.org/CVERecord?id=CVE-2025-6021 https://nvd.nist.gov/vuln/detail/CVE-2025-6021 https://gitlab.gnome.org/GNOME/libxml2/-/issues/926 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6021.json https://access.redhat.com/errata/RHSA-2025:10699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EhVqWSecC9djAkoW+k/+hQ==&#34;: {&#xA;      &#34;id&#34;: &#34;EhVqWSecC9djAkoW+k/+hQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2975&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries, which are unauthenticated as a consequence. Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be misled by removing, adding, or reordering such empty entries as these are ignored by the OpenSSL implementation. The AES-SIV algorithm allows for the authentication of multiple associated data entries and encryption. To authenticate empty data, the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with a NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL returns success for such a call instead of performing the associated data authentication operation. Thus, the empty data will not be authenticated.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2975 https://bugzilla.redhat.com/show_bug.cgi?id=2223016 https://www.cve.org/CVERecord?id=CVE-2023-2975 https://nvd.nist.gov/vuln/detail/CVE-2023-2975 https://www.openssl.org/news/secadv/20230714.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2975.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EhcxS6FJz0RDq0+uuwuiEA==&#34;: {&#xA;      &#34;id&#34;: &#34;EhcxS6FJz0RDq0+uuwuiEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24784&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s net/mail standard library package. The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions made by programs using different parsers.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24784 https://bugzilla.redhat.com/show_bug.cgi?id=2268021 https://www.cve.org/CVERecord?id=CVE-2024-24784 https://nvd.nist.gov/vuln/detail/CVE-2024-24784 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24784.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EhgsZTFIUAr2YMmtGzoFMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;EhgsZTFIUAr2YMmtGzoFMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34158&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the go/build/constraint package of the Golang standard library. Calling Parse on a \&#34;// +build\&#34; build tag line with deeply nested expressions can cause a panic due to stack exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34158 https://bugzilla.redhat.com/show_bug.cgi?id=2310529 https://www.cve.org/CVERecord?id=CVE-2024-34158 https://nvd.nist.gov/vuln/detail/CVE-2024-34158 https://go.dev/cl/611240 https://go.dev/issue/69141 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3107 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34158.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ElE6r7xQZAfd5MScs95BXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ElE6r7xQZAfd5MScs95BXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3198&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU Binutils. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-04T01:31:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3198 https://bugzilla.redhat.com/show_bug.cgi?id=2357358 https://www.cve.org/CVERecord?id=CVE-2025-3198 https://nvd.nist.gov/vuln/detail/CVE-2025-3198 https://sourceware.org/bugzilla/show_bug.cgi?id=32716 https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d https://vuldb.com/?ctiid.303151 https://vuldb.com/?id.303151 https://vuldb.com/?submit.545773 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3198.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EpmDyksRTsldGi5rxDcMlA==&#34;: {&#xA;      &#34;id&#34;: &#34;EpmDyksRTsldGi5rxDcMlA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3598&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the extractContigSamplesShifted24bits function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3598 https://bugzilla.redhat.com/show_bug.cgi?id=2142738 https://www.cve.org/CVERecord?id=CVE-2022-3598 https://nvd.nist.gov/vuln/detail/CVE-2022-3598 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3598.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Eptc9iAtWcHP72eK8tBCkA==&#34;: {&#xA;      &#34;id&#34;: &#34;Eptc9iAtWcHP72eK8tBCkA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23083&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js diagnostics_channel. This vulnerability allows an attacker to reinstate and misuse worker constructors, potentially bypassing the Permission Model via hooking into events when a worker thread is created.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T01:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23083 https://bugzilla.redhat.com/show_bug.cgi?id=2339392 https://www.cve.org/CVERecord?id=CVE-2025-23083 https://nvd.nist.gov/vuln/detail/CVE-2025-23083 https://nodejs.org/en/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23083.json https://access.redhat.com/errata/RHSA-2025:1443&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.18.2-1.module+el9.5.0+22758+4ad2c198&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Es53GFQ6IFbSLBefLkbOEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Es53GFQ6IFbSLBefLkbOEQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61728&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61728 https://bugzilla.redhat.com/show_bug.cgi?id=2434431 https://www.cve.org/CVERecord?id=CVE-2025-61728 https://nvd.nist.gov/vuln/detail/CVE-2025-61728 https://go.dev/cl/736713 https://go.dev/issue/77102 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4342 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61728.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Et5t375uu538q7zsCZ9I3w==&#34;: {&#xA;      &#34;id&#34;: &#34;Et5t375uu538q7zsCZ9I3w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6020 https://bugzilla.redhat.com/show_bug.cgi?id=2372512 https://www.cve.org/CVERecord?id=CVE-2025-6020 https://nvd.nist.gov/vuln/detail/CVE-2025-6020 https://github.com/linux-pam/linux-pam/security/advisories/GHSA-f9p8-gjr4-j9gx https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6020.json https://access.redhat.com/errata/RHSA-2025:15099&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.5.1-26.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;EwaSk27OsoNLQFoZ6FCsfw==&#34;: {&#xA;      &#34;id&#34;: &#34;EwaSk27OsoNLQFoZ6FCsfw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T17:48:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68121 https://bugzilla.redhat.com/show_bug.cgi?id=2437111 https://www.cve.org/CVERecord?id=CVE-2025-68121 https://nvd.nist.gov/vuln/detail/CVE-2025-68121 https://go.dev/cl/737700 https://go.dev/issue/77217 https://groups.google.com/g/golang-announce/c/K09ubi9FQFk https://pkg.go.dev/vuln/GO-2026-4337 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68121.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ewdn+P1XzA/h+WRvejvm/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Ewdn+P1XzA/h+WRvejvm/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38545&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \&#34;let the host resolve the name\&#34; could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38545 https://bugzilla.redhat.com/show_bug.cgi?id=2241933 https://www.cve.org/CVERecord?id=CVE-2023-38545 https://nvd.nist.gov/vuln/detail/CVE-2023-38545 https://curl.se/docs/CVE-2023-38545.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38545.json https://access.redhat.com/errata/RHSA-2023:5763&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;: {&#xA;      &#34;id&#34;: &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4426&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can exploit this by supplying a specially crafted ISO file. This can lead to incorrect memory allocation and potential application crashes, resulting in a denial-of-service (DoS) condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4426 https://bugzilla.redhat.com/show_bug.cgi?id=2449010 https://www.cve.org/CVERecord?id=CVE-2026-4426 https://nvd.nist.gov/vuln/detail/CVE-2026-4426 https://github.com/libarchive/libarchive/pull/2897 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4426.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EzveB8rJWscHHRZtJKOdRA==&#34;: {&#xA;      &#34;id&#34;: &#34;EzveB8rJWscHHRZtJKOdRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12718&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython&#39;s tarfile module. This vulnerability allows modification of file metadata, such as timestamps or permissions, outside the intended extraction directory via maliciously crafted tar archives using the filter=\&#34;data\&#34; or filter=\&#34;tar\&#34; extraction filters.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:59:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12718 https://bugzilla.redhat.com/show_bug.cgi?id=2370013 https://www.cve.org/CVERecord?id=CVE-2024-12718 https://nvd.nist.gov/vuln/detail/CVE-2024-12718 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/127987 https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12718.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;F/boCR7kXAGa4+GAELD7Tg==&#34;: {&#xA;      &#34;id&#34;: &#34;F/boCR7kXAGa4+GAELD7Tg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11413&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted object file with the ld linker can trigger an out-of-bounds write in the bfd_putl64 function in the bfd/libbfd.c file due to an improper check, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-07T22:02:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11413 https://bugzilla.redhat.com/show_bug.cgi?id=2402423 https://www.cve.org/CVERecord?id=CVE-2025-11413 https://nvd.nist.gov/vuln/detail/CVE-2025-11413 https://sourceware.org/bugzilla/show_bug.cgi?id=33456 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0 https://vuldb.com/?id.327349 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11413.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;F0PQEZy2PTlCGjp9J75Btw==&#34;: {&#xA;      &#34;id&#34;: &#34;F0PQEZy2PTlCGjp9J75Btw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32559&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(&#39;spawn_sync&#39;) to run arbitrary code outside of the limits defined in a policy.json file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32559 https://bugzilla.redhat.com/show_bug.cgi?id=2230956 https://www.cve.org/CVERecord?id=CVE-2023-32559 https://nvd.nist.gov/vuln/detail/CVE-2023-32559 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32559.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.17.1-1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;F1KNP85q9V8sONVWKuOzrw==&#34;: {&#xA;      &#34;id&#34;: &#34;F1KNP85q9V8sONVWKuOzrw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-2041&#34;,&#xA;      &#34;description&#34;: &#34;Improper handling of HTML-like comments in script contexts in html/template&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-07T16:11:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/62196 https://go.dev/cl/526156 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.20.8&#34;&#xA;    },&#xA;    &#34;F2QVfam7Idr3v4Y7g3wf/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;F2QVfam7Idr3v4Y7g3wf/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;: {&#xA;      &#34;id&#34;: &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6170&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6170 https://bugzilla.redhat.com/show_bug.cgi?id=2372952 https://www.cve.org/CVERecord?id=CVE-2025-6170 https://nvd.nist.gov/vuln/detail/CVE-2025-6170 https://gitlab.gnome.org/GNOME/libxml2/-/issues/941 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6170.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;F4g8Bboy9/sMyy+EusFlpA==&#34;: {&#xA;      &#34;id&#34;: &#34;F4g8Bboy9/sMyy+EusFlpA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27983&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27983 https://bugzilla.redhat.com/show_bug.cgi?id=2272764 https://www.cve.org/CVERecord?id=CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27983.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;F54ap+bUe0qceQi67ZX30w==&#34;: {&#xA;      &#34;id&#34;: &#34;F54ap+bUe0qceQi67ZX30w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js due to a lack of safeguards on chunk extension bytes. The server may read an unbounded number of bytes from a single connection, which can allow an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22019 https://bugzilla.redhat.com/show_bug.cgi?id=2264574 https://www.cve.org/CVERecord?id=CVE-2024-22019 https://nvd.nist.gov/vuln/detail/CVE-2024-22019 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22019.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;F6i42vx+GvZ/9LpnToKHcw==&#34;: {&#xA;      &#34;id&#34;: &#34;F6i42vx+GvZ/9LpnToKHcw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FAES1XlWFCETbKQytoq57Q==&#34;: {&#xA;      &#34;id&#34;: &#34;FAES1XlWFCETbKQytoq57Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-base&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.27-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FAgeMhGaGcH9QOhQHw5rhQ==&#34;: {&#xA;      &#34;id&#34;: &#34;FAgeMhGaGcH9QOhQHw5rhQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-13978&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtiff. The `t2p_read_tiff_init` function in the fax2ps component incorrectly handles TIFF files, leading to a null pointer dereference. A local attacker can trigger this condition by providing a specially crafted TIFF file. This can result in an application level denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-01T21:32:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-13978 https://bugzilla.redhat.com/show_bug.cgi?id=2386059 https://www.cve.org/CVERecord?id=CVE-2024-13978 https://nvd.nist.gov/vuln/detail/CVE-2024-13978 http://www.libtiff.org/ https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4 https://gitlab.com/libtiff/libtiff/-/issues/649 https://gitlab.com/libtiff/libtiff/-/merge_requests/667 https://vuldb.com/?ctiid.318355 https://vuldb.com/?id.318355 https://vuldb.com/?submit.624562 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-13978.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FAoi5hf12Vg9h7NFehHyBg==&#34;: {&#xA;      &#34;id&#34;: &#34;FAoi5hf12Vg9h7NFehHyBg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Fcntl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.13-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FCO2B+o+asJ7qjlQcg/SPw==&#34;: {&#xA;      &#34;id&#34;: &#34;FCO2B+o+asJ7qjlQcg/SPw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11494&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the GNU Binutils package. The impacted function is _bfd_x86_elf_late_size_sections of the file bfd/elfxx-x86.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-08T19:32:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11494 https://bugzilla.redhat.com/show_bug.cgi?id=2402559 https://www.cve.org/CVERecord?id=CVE-2025-11494 https://nvd.nist.gov/vuln/detail/CVE-2025-11494 https://sourceware.org/bugzilla/attachment.cgi?id=16389 https://sourceware.org/bugzilla/show_bug.cgi?id=33499 https://sourceware.org/bugzilla/show_bug.cgi?id=33499#c2 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a https://vuldb.com/?ctiid.327619 https://vuldb.com/?id.327619 https://vuldb.com/?submit.668281 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11494.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FInGJTEa3gToUzpaoDNNQw==&#34;: {&#xA;      &#34;id&#34;: &#34;FInGJTEa3gToUzpaoDNNQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35388&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability allows for a low integrity impact due to the omission of connection multiplexing confirmation for proxy-mode multiplexing sessions. A local user, under specific and complex conditions requiring user interaction, could potentially establish a multiplexed session without explicit confirmation, leading to unintended data handling.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:57:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35388 https://bugzilla.redhat.com/show_bug.cgi?id=2454500 https://www.cve.org/CVERecord?id=CVE-2026-35388 https://nvd.nist.gov/vuln/detail/CVE-2026-35388 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35388.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FKu6EFoCfpksmq+M7pL02Q==&#34;: {&#xA;      &#34;id&#34;: &#34;FKu6EFoCfpksmq+M7pL02Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libstdc++&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;: {&#xA;      &#34;id&#34;: &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FM2lHn17qlO5uIZtM+Ehmg==&#34;: {&#xA;      &#34;id&#34;: &#34;FM2lHn17qlO5uIZtM+Ehmg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-B&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.80-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FMxCd9UpiJciq+gDQcTY5g==&#34;: {&#xA;      &#34;id&#34;: &#34;FMxCd9UpiJciq+gDQcTY5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FMzc9QFitxthf16XR1P0QA==&#34;: {&#xA;      &#34;id&#34;: &#34;FMzc9QFitxthf16XR1P0QA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js due to a lack of safeguards on chunk extension bytes. The server may read an unbounded number of bytes from a single connection, which can allow an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22019 https://bugzilla.redhat.com/show_bug.cgi?id=2264574 https://www.cve.org/CVERecord?id=CVE-2024-22019 https://nvd.nist.gov/vuln/detail/CVE-2024-22019 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22019.json https://access.redhat.com/errata/RHSA-2024:1438&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.2.4.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FOhuL+ZLaAMigc1crKc/uA==&#34;: {&#xA;      &#34;id&#34;: &#34;FOhuL+ZLaAMigc1crKc/uA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27363&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in FreeType. In affected versions, an out-of-bounds write condition may be triggered when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value, causing it to wrap around and allocate a heap buffer that is too small. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This issue could result in arbitrary code execution or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-11T13:28:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27363 https://bugzilla.redhat.com/show_bug.cgi?id=2351357 https://www.cve.org/CVERecord?id=CVE-2025-27363 https://nvd.nist.gov/vuln/detail/CVE-2025-27363 https://www.facebook.com/security/advisories/cve-2025-27363 https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27363.json https://access.redhat.com/errata/RHSA-2025:3407&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;freetype-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.10.4-10.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FPJOQAbsBSaId8RmD/1j8g==&#34;: {&#xA;      &#34;id&#34;: &#34;FPJOQAbsBSaId8RmD/1j8g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js due to a lack of safeguards on chunk extension bytes. The server may read an unbounded number of bytes from a single connection, which can allow an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22019 https://bugzilla.redhat.com/show_bug.cgi?id=2264574 https://www.cve.org/CVERecord?id=CVE-2024-22019 https://nvd.nist.gov/vuln/detail/CVE-2024-22019 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22019.json https://access.redhat.com/errata/RHSA-2024:1503&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.19.1-1.module+el9.3.0+21388+22892fb9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;: {&#xA;      &#34;id&#34;: &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13034&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server&#39;s identity.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13034 https://bugzilla.redhat.com/show_bug.cgi?id=2426406 https://www.cve.org/CVERecord?id=CVE-2025-13034 https://nvd.nist.gov/vuln/detail/CVE-2025-13034 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13034.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FTPBk9LaoSZGiQO5kXSorA==&#34;: {&#xA;      &#34;id&#34;: &#34;FTPBk9LaoSZGiQO5kXSorA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1528&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici&#39;s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:21:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1528 https://bugzilla.redhat.com/show_bug.cgi?id=2447145 https://www.cve.org/CVERecord?id=CVE-2026-1528 https://nvd.nist.gov/vuln/detail/CVE-2026-1528 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj https://hackerone.com/reports/3537648 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1528.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FTUrLe1XMNYvUzaxMdsWeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;FTUrLe1XMNYvUzaxMdsWeQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4373&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4373 https://bugzilla.redhat.com/show_bug.cgi?id=2364265 https://www.cve.org/CVERecord?id=CVE-2025-4373 https://nvd.nist.gov/vuln/detail/CVE-2025-4373 https://gitlab.gnome.org/GNOME/glib/-/issues/3677 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4373.json https://access.redhat.com/errata/RHSA-2025:11140&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-16.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FUR7T9AnekkZ5hPUz2WP6Q==&#34;: {&#xA;      &#34;id&#34;: &#34;FUR7T9AnekkZ5hPUz2WP6Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4517&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the CPython tarfile module. This vulnerability allows arbitrary filesystem writes outside the extraction directory via extracting untrusted tar archives using the TarFile.extractall() or TarFile.extract() methods with the extraction filter parameter set to \&#34;data\&#34; or \&#34;tar\&#34;.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:58:50Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4517 https://bugzilla.redhat.com/show_bug.cgi?id=2370016 https://www.cve.org/CVERecord?id=CVE-2025-4517 https://nvd.nist.gov/vuln/detail/CVE-2025-4517 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4517.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FUeASYCa2REKwmC0CFlz2g==&#34;: {&#xA;      &#34;id&#34;: &#34;FUeASYCa2REKwmC0CFlz2g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2975&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries, which are unauthenticated as a consequence. Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be misled by removing, adding, or reordering such empty entries as these are ignored by the OpenSSL implementation. The AES-SIV algorithm allows for the authentication of multiple associated data entries and encryption. To authenticate empty data, the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with a NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL returns success for such a call instead of performing the associated data authentication operation. Thus, the empty data will not be authenticated.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2975 https://bugzilla.redhat.com/show_bug.cgi?id=2223016 https://www.cve.org/CVERecord?id=CVE-2023-2975 https://nvd.nist.gov/vuln/detail/CVE-2023-2975 https://www.openssl.org/news/secadv/20230714.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2975.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FV18DPtJsW6qZZIHDbkGJA==&#34;: {&#xA;      &#34;id&#34;: &#34;FV18DPtJsW6qZZIHDbkGJA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FWn8i7eSvTTcwwX8x1YMmg==&#34;: {&#xA;      &#34;id&#34;: &#34;FWn8i7eSvTTcwwX8x1YMmg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4870&#34;,&#xA;      &#34;description&#34;: &#34;Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T22:53:49Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/763767 https://go.dev/issue/78334 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.25.9&#34;&#xA;    },&#xA;    &#34;FcmkgsiNKCrDAJ6OFK/Y8g==&#34;: {&#xA;      &#34;id&#34;: &#34;FcmkgsiNKCrDAJ6OFK/Y8g==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-2102&#34;,&#xA;      &#34;description&#34;: &#34;HTTP/2 rapid reset can cause excessive work in net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T16:49:53Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/63417 https://go.dev/cl/534215 https://go.dev/cl/534235 https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.20.10&#34;&#xA;    },&#xA;    &#34;FdtzK6tyT53moDNlzBGPBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;FdtzK6tyT53moDNlzBGPBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29499&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29499 https://bugzilla.redhat.com/show_bug.cgi?id=2211828 https://www.cve.org/CVERecord?id=CVE-2023-29499 https://nvd.nist.gov/vuln/detail/CVE-2023-29499 https://gitlab.gnome.org/GNOME/glib/-/issues/2794 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29499.json https://access.redhat.com/errata/RHSA-2023:6631&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FecDYUjbiWlU3PuXl5vs5w==&#34;: {&#xA;      &#34;id&#34;: &#34;FecDYUjbiWlU3PuXl5vs5w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Fg8qijPO2mYzPczZJG7NiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Fg8qijPO2mYzPczZJG7NiQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32006&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32006 https://bugzilla.redhat.com/show_bug.cgi?id=2230955 https://www.cve.org/CVERecord?id=CVE-2023-32006 https://nvd.nist.gov/vuln/detail/CVE-2023-32006 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32006.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FgTFx5g45j7WzA+bfAHPzQ==&#34;: {&#xA;      &#34;id&#34;: &#34;FgTFx5g45j7WzA+bfAHPzQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8088&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s zipfile module. When iterating over the entries of a zip archive, the process can enter into an infinite loop state and become unresponsive. This flaw allows an attacker to craft a malicious ZIP archive, leading to a denial of service from the application consuming the zipfile module. Only applications that handle user-controlled zip archives are affected by this vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-22T19:15:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-8088 https://bugzilla.redhat.com/show_bug.cgi?id=2307370 https://www.cve.org/CVERecord?id=CVE-2024-8088 https://nvd.nist.gov/vuln/detail/CVE-2024-8088 https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64 https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea https://github.com/python/cpython/issues/122905 https://github.com/python/cpython/pull/122906 https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8088.json https://access.redhat.com/errata/RHSA-2024:9371&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.19-8.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Fi7GXCkkqJvYQw6Co8Nk7A==&#34;: {&#xA;      &#34;id&#34;: &#34;Fi7GXCkkqJvYQw6Co8Nk7A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-34969&#34;,&#xA;      &#34;description&#34;: &#34;An assertion failure vulnerability was found in D-Bus. This issue occurs when a privileged monitoring connection (dbus-monitor, busctl monitor, gdbus monitor, or similar) is active, and a message from the bus driver cannot be delivered to a client connection due to \u003cdeny\u003e rules or outgoing message quota. If a privileged user with control over the dbus-daemon is monitoring the message bus traffic using the Monitoring clients like the dbus-monitor or busctl monitor interfaces, then an unprivileged local user with the ability to connect to the same dbus-daemon could send specially crafted request, causing a dbus-daemon to crash, resulting in a denial of service under some circumstances.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-34969 https://bugzilla.redhat.com/show_bug.cgi?id=2213166 https://www.cve.org/CVERecord?id=CVE-2023-34969 https://nvd.nist.gov/vuln/detail/CVE-2023-34969 https://gitlab.freedesktop.org/dbus/dbus/-/issues/457 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-34969.json https://access.redhat.com/errata/RHSA-2023:4569&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:1.12.20-7.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FjB9AnugxBHu7Kwf86C67w==&#34;: {&#xA;      &#34;id&#34;: &#34;FjB9AnugxBHu7Kwf86C67w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-IPC-Open3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FjluGqmW83eEOEvyKIkrSA==&#34;: {&#xA;      &#34;id&#34;: &#34;FjluGqmW83eEOEvyKIkrSA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-4012&#34;,&#xA;      &#34;description&#34;: &#34;Lack of limit when parsing cookies can cause memory exhaustion in net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T21:50:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/75672 https://go.dev/cl/709855 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.8&#34;&#xA;    },&#xA;    &#34;FkUafBj1ekysZyPIbZi5fg==&#34;: {&#xA;      &#34;id&#34;: &#34;FkUafBj1ekysZyPIbZi5fg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-NDBM_File&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.15-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FkxoK2aSVfPglVllnxzplw==&#34;: {&#xA;      &#34;id&#34;: &#34;FkxoK2aSVfPglVllnxzplw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4603&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use the EVP_PKEY_param_check() or EVP_PKEY_public_check() function to check a DSA public key or DSA parameters may experience long delays when checking excessively long DSA keys or parameters.  In applications that allow untrusted sources to provide the key or parameters that are checked, an attacker may be able to cause a denial of service. These functions are not called by OpenSSL on untrusted DSA keys. The applications that directly call these functions are the ones that may be vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4603 https://bugzilla.redhat.com/show_bug.cgi?id=2281029 https://www.cve.org/CVERecord?id=CVE-2024-4603 https://nvd.nist.gov/vuln/detail/CVE-2024-4603 https://www.openssl.org/news/secadv/20240516.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4603.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FlgtpglQEkjGT66EnFUHMg==&#34;: {&#xA;      &#34;id&#34;: &#34;FlgtpglQEkjGT66EnFUHMg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FnsKxnhjNS+E4Y6hrazjUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;FnsKxnhjNS+E4Y6hrazjUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FpA1FaTnKUwdPkl0KHAbaw==&#34;: {&#xA;      &#34;id&#34;: &#34;FpA1FaTnKUwdPkl0KHAbaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11412&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted object file with the ld linker can trigger an out-of-bounds read in the bfd_elf_gc_record_vtentry function in the bfd/elflink.c file due to a missing sanity check, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-07T22:02:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11412 https://bugzilla.redhat.com/show_bug.cgi?id=2402425 https://www.cve.org/CVERecord?id=CVE-2025-11412 https://nvd.nist.gov/vuln/detail/CVE-2025-11412 https://sourceware.org/bugzilla/show_bug.cgi?id=33452 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc https://vuldb.com/?id.327348 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11412.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FroZeKbNhNx69+bj8o0OqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;FroZeKbNhNx69+bj8o0OqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11082&#34;,&#xA;      &#34;description&#34;: &#34;A head based buffer overflow flaw has been discovered in GNU bin utilities. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-27T22:32:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11082 https://bugzilla.redhat.com/show_bug.cgi?id=2399943 https://www.cve.org/CVERecord?id=CVE-2025-11082 https://nvd.nist.gov/vuln/detail/CVE-2025-11082 https://sourceware.org/bugzilla/attachment.cgi?id=16358 https://sourceware.org/bugzilla/show_bug.cgi?id=33464 https://sourceware.org/bugzilla/show_bug.cgi?id=33464#c2 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8 https://vuldb.com/?ctiid.326123 https://vuldb.com/?id.326123 https://vuldb.com/?submit.661276 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11082.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FsYbwBEvKH6FW81JU3KSvw==&#34;: {&#xA;      &#34;id&#34;: &#34;FsYbwBEvKH6FW81JU3KSvw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4904 https://bugzilla.redhat.com/show_bug.cgi?id=2168631 https://www.cve.org/CVERecord?id=CVE-2022-4904 https://nvd.nist.gov/vuln/detail/CVE-2022-4904 https://github.com/c-ares/c-ares/issues/496 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4904.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ft+9wGiX7gFQHYNS5do1oA==&#34;: {&#xA;      &#34;id&#34;: &#34;Ft+9wGiX7gFQHYNS5do1oA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12088&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T15:06:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12088 https://bugzilla.redhat.com/show_bug.cgi?id=2330676 https://www.cve.org/CVERecord?id=CVE-2024-12088 https://nvd.nist.gov/vuln/detail/CVE-2024-12088 https://kb.cert.org/vuls/id/952657 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12088.json https://access.redhat.com/errata/RHSA-2025:7050&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.2.5-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FtF7hWwlQYu4clVsrpBd0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;FtF7hWwlQYu4clVsrpBd0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29400&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. Templates containing actions in unquoted HTML attributes, for example, \&#34;attr={{.}}\&#34;) executed with empty input, could result in output that has unexpected results when parsed due to HTML normalization rules. This issue may allow the injection of arbitrary attributes into tags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29400 https://bugzilla.redhat.com/show_bug.cgi?id=2196029 https://www.cve.org/CVERecord?id=CVE-2023-29400 https://nvd.nist.gov/vuln/detail/CVE-2023-29400 https://go.dev/issue/59722 https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29400.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Fw+ArhlgBhD30C7D93vYhg==&#34;: {&#xA;      &#34;id&#34;: &#34;Fw+ArhlgBhD30C7D93vYhg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6069&#34;,&#xA;      &#34;description&#34;: &#34;A denial-of-service (DoS) vulnerability has been discovered in Python&#39;s html.parser.HTMLParser class. When processing specially malformed HTML input, the parsing runtime can become quadratic with respect to the input size. This significantly increased processing time can lead to excessive resource consumption, ultimately causing a denial-of-service condition in applications that rely on this parser.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-17T13:39:46Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6069 https://bugzilla.redhat.com/show_bug.cgi?id=2373234 https://www.cve.org/CVERecord?id=CVE-2025-6069 https://nvd.nist.gov/vuln/detail/CVE-2025-6069 https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949 https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41 https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b https://github.com/python/cpython/issues/135462 https://github.com/python/cpython/pull/135464 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6069.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FwvyPIBVlE1fAIgwJ1H6Sw==&#34;: {&#xA;      &#34;id&#34;: &#34;FwvyPIBVlE1fAIgwJ1H6Sw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0466&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The X509_VERIFY_PARAM_add0_policy() function is documented to enable the certificate policy check when doing certificate verification implicitly. However, implementing the function does not enable the check, allowing certificates with invalid or incorrect policies to pass the certificate verification. Suddenly enabling the policy check could break existing deployments, so it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. The applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0466 https://bugzilla.redhat.com/show_bug.cgi?id=2182565 https://www.cve.org/CVERecord?id=CVE-2023-0466 https://nvd.nist.gov/vuln/detail/CVE-2023-0466 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0466.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FyNQxVBbour86huhtgTOzA==&#34;: {&#xA;      &#34;id&#34;: &#34;FyNQxVBbour86huhtgTOzA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2603&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2603 https://bugzilla.redhat.com/show_bug.cgi?id=2209113 https://www.cve.org/CVERecord?id=CVE-2023-2603 https://nvd.nist.gov/vuln/detail/CVE-2023-2603 https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2603.json https://access.redhat.com/errata/RHSA-2023:5071&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.48-9.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Fys7cTDgnkqkKy/A1tAWPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Fys7cTDgnkqkKy/A1tAWPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29403&#34;,&#xA;      &#34;description&#34;: &#34;On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state or assuming the status of standard I/O file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29403 https://bugzilla.redhat.com/show_bug.cgi?id=2216965 https://www.cve.org/CVERecord?id=CVE-2023-29403 https://nvd.nist.gov/vuln/detail/CVE-2023-29403 https://go.dev/cl/501223 https://go.dev/issue/60272 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1840 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29403.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FzTxCzGYtLmJVoQ1syBiUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;FzTxCzGYtLmJVoQ1syBiUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bsdtar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;G/EKAYKB/V29JLdsy1wFCA==&#34;: {&#xA;      &#34;id&#34;: &#34;G/EKAYKB/V29JLdsy1wFCA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31486&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Tiny, where a Perl core module and standalone CPAN package, does not verify TLS certificates by default. Users need to explicitly enable certificate verification with the verify_SSL=\u003e1 flag to ensure secure HTTPS connections. This oversight can potentially expose applications to man-in-the-middle (MITM) attacks, where an attacker might intercept and manipulate data transmitted between the client and server.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31486 https://bugzilla.redhat.com/show_bug.cgi?id=2228392 https://www.cve.org/CVERecord?id=CVE-2023-31486 https://nvd.nist.gov/vuln/detail/CVE-2023-31486 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31486.json https://access.redhat.com/errata/RHSA-2023:6542&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-HTTP-Tiny&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch|src&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:0.076-461.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;G/dmoDOpwh0GrsMovfySVw==&#34;: {&#xA;      &#34;id&#34;: &#34;G/dmoDOpwh0GrsMovfySVw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;G1ju8KSMzz6zOg31bF5lRw==&#34;: {&#xA;      &#34;id&#34;: &#34;G1ju8KSMzz6zOg31bF5lRw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24783&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s crypto/x509 standard library package. Verifying a certificate chain that contains a certificate with an unknown public key algorithm will cause a Certificate.Verify to panic. This issue affects all crypto/tls clients and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24783 https://bugzilla.redhat.com/show_bug.cgi?id=2268019 https://www.cve.org/CVERecord?id=CVE-2024-24783 https://nvd.nist.gov/vuln/detail/CVE-2024-24783 http://www.openwall.com/lists/oss-security/2024/03/08/4 https://github.com/advisories/GHSA-3q2c-pvp5-3cqp https://go.dev/cl/569339 https://go.dev/issue/65390 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg https://pkg.go.dev/vuln/GO-2024-2598 https://security.netapp.com/advisory/ntap-20240329-0005 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24783.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;G33a+jVnMZNg6liymp9Lyg==&#34;: {&#xA;      &#34;id&#34;: &#34;G33a+jVnMZNg6liymp9Lyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-58183&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T22:10:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-58183 https://bugzilla.redhat.com/show_bug.cgi?id=2407258 https://www.cve.org/CVERecord?id=CVE-2025-58183 https://nvd.nist.gov/vuln/detail/CVE-2025-58183 https://go.dev/cl/709861 https://go.dev/issue/75677 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://pkg.go.dev/vuln/GO-2025-4014 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-58183.json https://access.redhat.com/errata/RHSA-2025:21815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;delve&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.2-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;G4J4D/HzBef3xun2GfNS3g==&#34;: {&#xA;      &#34;id&#34;: &#34;G4J4D/HzBef3xun2GfNS3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:11992&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-8.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;G77a8vVkDX/8Yt/v29MOhA==&#34;: {&#xA;      &#34;id&#34;: &#34;G77a8vVkDX/8Yt/v29MOhA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;G7l0N6DSTPJhrn3beR4QLg==&#34;: {&#xA;      &#34;id&#34;: &#34;G7l0N6DSTPJhrn3beR4QLg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69648&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted ELF binary file containing malformed DWARF .debug_rnglists data with the readelf program can trigger an infinite loop and result in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69648 https://bugzilla.redhat.com/show_bug.cgi?id=2445774 https://www.cve.org/CVERecord?id=CVE-2025-69648 https://nvd.nist.gov/vuln/detail/CVE-2025-69648 https://sourceware.org/bugzilla/show_bug.cgi?id=33641 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=598704a00cbac5e85c2bedd363357b5bf6fcee33 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69648.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GAn7gWUe2pFr7PbwechqxA==&#34;: {&#xA;      &#34;id&#34;: &#34;GAn7gWUe2pFr7PbwechqxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-30258&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. In affected versions, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, leading to a verification denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-30258 https://bugzilla.redhat.com/show_bug.cgi?id=2353427 https://www.cve.org/CVERecord?id=CVE-2025-30258 https://nvd.nist.gov/vuln/detail/CVE-2025-30258 https://dev.gnupg.org/T7527 https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-30258.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GDAkupnsjiTl71rwzH5RJg==&#34;: {&#xA;      &#34;id&#34;: &#34;GDAkupnsjiTl71rwzH5RJg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21538&#34;,&#xA;      &#34;description&#34;: &#34;A Regular Expression Denial of Service (ReDoS) vulnerability was found in the cross-spawn package for Node.js. Due to improper input sanitization, an attacker can increase CPU usage and crash the program with a large, specially crafted string.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-08T05:00:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21538 https://bugzilla.redhat.com/show_bug.cgi?id=2324550 https://www.cve.org/CVERecord?id=CVE-2024-21538 https://nvd.nist.gov/vuln/detail/CVE-2024-21538 https://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ff https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374f https://github.com/moxystudio/node-cross-spawn/pull/160 https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21538.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GEDO3j20WMwIj0JMNMq5Iw==&#34;: {&#xA;      &#34;id&#34;: &#34;GEDO3j20WMwIj0JMNMq5Iw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GJ6//hGiIsio2zBFuudd/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;GJ6//hGiIsio2zBFuudd/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21890&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js Permission Model, where it is not clarified in the documentation that wildcards should only be used as the last character of a file path. For example: --allow-fs-read=/home/node/.ssh/*.pub will ignore pub and give access to everything after .ssh/.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21890 https://bugzilla.redhat.com/show_bug.cgi?id=2265722 https://www.cve.org/CVERecord?id=CVE-2024-21890 https://nvd.nist.gov/vuln/detail/CVE-2024-21890 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21890.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GJy8g/4zoy4CPDvWLZr9kQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GJy8g/4zoy4CPDvWLZr9kQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-25724&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libarchive package. Affected versions of libarchive do not check a strftime return value, which can lead to a denial of service or unspecified other impacts via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-25724 https://bugzilla.redhat.com/show_bug.cgi?id=2349221 https://www.cve.org/CVERecord?id=CVE-2025-25724 https://nvd.nist.gov/vuln/detail/CVE-2025-25724 https://gist.github.com/Ekkosun/a83870ce7f3b7813b9b462a395e8ad92 https://github.com/Ekkosun/pocs/blob/main/bsdtarbug https://github.com/libarchive/libarchive/blob/b439d586f53911c84be5e380445a8a259e19114c/tar/util.c#L751-L752 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-25724.json https://access.redhat.com/errata/RHSA-2025:9431&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bsdtar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-5.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GKtgrnguQJIeMtP51nnNZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GKtgrnguQJIeMtP51nnNZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24788&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net package of the Go stdlib. When a malformed DNS message is received as a response to a query, the Lookup functions within the net package can get stuck in an infinite loop. This issue can lead to resource exhaustion and denial of service (DoS) conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24788 https://bugzilla.redhat.com/show_bug.cgi?id=2279814 https://www.cve.org/CVERecord?id=CVE-2024-24788 https://nvd.nist.gov/vuln/detail/CVE-2024-24788 https://pkg.go.dev/vuln/GO-2024-2824 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24788.json https://access.redhat.com/errata/RHBA-2024:3840&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.10-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GMnASWjZHihDlhJdlv57Iw==&#34;: {&#xA;      &#34;id&#34;: &#34;GMnASWjZHihDlhJdlv57Iw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64505&#34;,&#xA;      &#34;description&#34;: &#34;A heap buffer over-read vulnerability exists in libpng&#39;s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:38:40Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64505 https://bugzilla.redhat.com/show_bug.cgi?id=2416905 https://www.cve.org/CVERecord?id=CVE-2025-64505 https://nvd.nist.gov/vuln/detail/CVE-2025-64505 https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37 https://github.com/pnggroup/libpng/pull/748 https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64505.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GPyfUVX9W8Bmxm38kovI0g==&#34;: {&#xA;      &#34;id&#34;: &#34;GPyfUVX9W8Bmxm38kovI0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21715&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The Node.js Permission Model, intended to restrict filesystem access, does not properly enforce read permission checks for the `fs.realpathSync.native()` function. This vulnerability allows code operating under `--permission` with restricted `--allow-fs-read` flags to bypass security controls. Consequently, an attacker can use `fs.realpathSync.native()` to determine file existence, resolve symbolic link targets, and enumerate filesystem paths outside of permitted directories, leading to information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21715 https://bugzilla.redhat.com/show_bug.cgi?id=2453152 https://www.cve.org/CVERecord?id=CVE-2026-21715 https://nvd.nist.gov/vuln/detail/CVE-2026-21715 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21715.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GR80zW702W+xho6dTSNlyw==&#34;: {&#xA;      &#34;id&#34;: &#34;GR80zW702W+xho6dTSNlyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24806&#34;,&#xA;      &#34;description&#34;: &#34;A server-side request forgery (SSRF) flaw was found in the libuv package due to how the `hostname_ascii` variable is handled in `uv_getaddrinfo` and `uv__idna_toascii`. When the hostname exceeds 256 characters, it gets truncated without a terminating null byte. As a result, attackers may be able to access internal APIs or for websites that allow users to have `username.example.com` pages. Internal services that crawl or cache these user pages can be exposed to SSRF attacks if a malicious user chooses a long vulnerable username. This issue could allow an attacker to craft payloads that resolve to unintended IP addresses, bypassing developer checks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24806 https://bugzilla.redhat.com/show_bug.cgi?id=2263292 https://www.cve.org/CVERecord?id=CVE-2024-24806 https://nvd.nist.gov/vuln/detail/CVE-2024-24806 https://github.com/libuv/libuv/security/advisories/GHSA-f74f-cvh7-c6q6 https://www.chainguard.dev/unchained/unpacking-libuvs-cve-2024-24806-software-dark-matter-will-go-under-the-radar-not-in-chainguard-images-tho https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24806.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GVOb0whjVXBMMGVZhZjH0g==&#34;: {&#xA;      &#34;id&#34;: &#34;GVOb0whjVXBMMGVZhZjH0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GVXQ1XPPQkuhZ4SIFGoF+w==&#34;: {&#xA;      &#34;id&#34;: &#34;GVXQ1XPPQkuhZ4SIFGoF+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22017&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, where the setuid() does not affect libuv&#39;s internal io_uring operations if initialized before the call to setuid(). This issue allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22017 https://bugzilla.redhat.com/show_bug.cgi?id=2265727 https://www.cve.org/CVERecord?id=CVE-2024-22017 https://nvd.nist.gov/vuln/detail/CVE-2024-22017 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22017.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GVpKc+ySNcDAOMrSpk+5bQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GVpKc+ySNcDAOMrSpk+5bQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61729&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-02T18:54:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61729 https://bugzilla.redhat.com/show_bug.cgi?id=2418462 https://www.cve.org/CVERecord?id=CVE-2025-61729 https://nvd.nist.gov/vuln/detail/CVE-2025-61729 https://go.dev/cl/725920 https://go.dev/issue/76445 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 https://pkg.go.dev/vuln/GO-2025-4155 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61729.json https://access.redhat.com/errata/RHSA-2026:0923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.5-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GW37uYQxwwgJBIDtA/dT2g==&#34;: {&#xA;      &#34;id&#34;: &#34;GW37uYQxwwgJBIDtA/dT2g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. When a separating comma ends up on a folded line during an address list folding of email headers, the comma is unintentionally unicode encoded. The expected behavior is that the separating comma remains unencoded. This can result in the address header being misinterpreted by some mail servers.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-28T18:59:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1795 https://bugzilla.redhat.com/show_bug.cgi?id=2349061 https://www.cve.org/CVERecord?id=CVE-2025-1795 https://nvd.nist.gov/vuln/detail/CVE-2025-1795 https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48 https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593 https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74 https://github.com/python/cpython/issues/100884 https://github.com/python/cpython/pull/100885 https://github.com/python/cpython/pull/119099 https://mail.python.org/archives/list/security-announce@python.org/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1795.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;: {&#xA;      &#34;id&#34;: &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GXMpRf2go/wGEbwpp9BPPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GXMpRf2go/wGEbwpp9BPPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1175&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. There is an incorrect calculation of buffer size issue found in Vim&#39;s yank_copy_line() function of the register.c file. This flaw allows illegal memory access when using virtual editing as \&#34;startspaces\&#34; goes negative. An attacker can trick a user into opening a specially crafted file, triggering an issue that causes an application to crash leading to a denial of service, corrupting memory, and possibly executing code.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1175 https://bugzilla.redhat.com/show_bug.cgi?id=2176457 https://www.cve.org/CVERecord?id=CVE-2023-1175 https://nvd.nist.gov/vuln/detail/CVE-2023-1175 https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1175.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GXObP88ZOLkWQuVeVgHh/g==&#34;: {&#xA;      &#34;id&#34;: &#34;GXObP88ZOLkWQuVeVgHh/g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35939&#34;,&#xA;      &#34;description&#34;: &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35939 https://bugzilla.redhat.com/show_bug.cgi?id=1964129 https://www.cve.org/CVERecord?id=CVE-2021-35939 https://nvd.nist.gov/vuln/detail/CVE-2021-35939 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35939.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-sign-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ga3lVfExNl500JGwW345sQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Ga3lVfExNl500JGwW345sQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-3956&#34;,&#xA;      &#34;description&#34;: &#34;Unexpected paths returned from LookPath in os/exec&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-18T18:21:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/691775 https://go.dev/issue/74466 https://groups.google.com/g/golang-announce/c/x5MKroML2yM&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.23.12&#34;&#xA;    },&#xA;    &#34;GaZVgTbcdJiJMvdUeofqTA==&#34;: {&#xA;      &#34;id&#34;: &#34;GaZVgTbcdJiJMvdUeofqTA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34397&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNOME GLib. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This issue could lead to the GDBus-based client behaving incorrectly with an application-dependent impact.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34397 https://bugzilla.redhat.com/show_bug.cgi?id=2279632 https://www.cve.org/CVERecord?id=CVE-2024-34397 https://nvd.nist.gov/vuln/detail/CVE-2024-34397 https://gitlab.gnome.org/GNOME/glib/-/issues/3268 https://www.openwall.com/lists/oss-security/2024/05/07/5 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34397.json https://access.redhat.com/errata/RHSA-2024:6464&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-14.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GbZa+XIQtfFHtHWs5gm0wg==&#34;: {&#xA;      &#34;id&#34;: &#34;GbZa+XIQtfFHtHWs5gm0wg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27043&#34;,&#xA;      &#34;description&#34;: &#34;The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27043 https://bugzilla.redhat.com/show_bug.cgi?id=2196183 https://www.cve.org/CVERecord?id=CVE-2023-27043 https://nvd.nist.gov/vuln/detail/CVE-2023-27043 https://access.redhat.com/articles/7051467 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27043.json https://access.redhat.com/errata/RHSA-2024:0466&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-1.el9_3.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GeI10LHPuNgyyt295MOmIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GeI10LHPuNgyyt295MOmIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-3596&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-3596 https://bugzilla.redhat.com/show_bug.cgi?id=2263240 https://www.cve.org/CVERecord?id=CVE-2024-3596 https://nvd.nist.gov/vuln/detail/CVE-2024-3596 https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/ https://datatracker.ietf.org/doc/html/rfc2865 https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt https://www.blastradius.fail/ https://www.kb.cert.org/vuls/id/456537 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-3596.json https://access.redhat.com/errata/RHSA-2024:9474&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-4.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Geg0mw2hzdsfDbJ9adcmWg==&#34;: {&#xA;      &#34;id&#34;: &#34;Geg0mw2hzdsfDbJ9adcmWg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0804&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds write in the extractContigSamplesShifted24bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited data modification.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0804 https://bugzilla.redhat.com/show_bug.cgi?id=2170192 https://www.cve.org/CVERecord?id=CVE-2023-0804 https://nvd.nist.gov/vuln/detail/CVE-2023-0804 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0804.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GfPY5zBbHJQI4ZGaDcJj2A==&#34;: {&#xA;      &#34;id&#34;: &#34;GfPY5zBbHJQI4ZGaDcJj2A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3278&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference vulnerability was found in Vim&#39;s eval_next_non_blank() function of the src/eval.c file. The flaw occurs when using NUL in buffer uses :source. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL pointer dereference that causes a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3278 https://bugzilla.redhat.com/show_bug.cgi?id=2129831 https://www.cve.org/CVERecord?id=CVE-2022-3278 https://nvd.nist.gov/vuln/detail/CVE-2022-3278 https://huntr.dev/bounties/a9fad77e-f245-4ce9-ba15-c7d4c86c4612 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3278.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GjK0gO1QmNQJ/ZsCakqCdA==&#34;: {&#xA;      &#34;id&#34;: &#34;GjK0gO1QmNQJ/ZsCakqCdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Gn9qNy1ITVhOKz+nUviaSg==&#34;: {&#xA;      &#34;id&#34;: &#34;Gn9qNy1ITVhOKz+nUviaSg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4517&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the CPython tarfile module. This vulnerability allows arbitrary filesystem writes outside the extraction directory via extracting untrusted tar archives using the TarFile.extractall() or TarFile.extract() methods with the extraction filter parameter set to \&#34;data\&#34; or \&#34;tar\&#34;.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:58:50Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4517 https://bugzilla.redhat.com/show_bug.cgi?id=2370016 https://www.cve.org/CVERecord?id=CVE-2025-4517 https://nvd.nist.gov/vuln/detail/CVE-2025-4517 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4517.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GnBCRP9H+R6do428z3nOkQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GnBCRP9H+R6do428z3nOkQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-4173&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim. A possible use after free vulnerability could allow an attacker to input a specially crafted file leading to a crash or code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-12-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-4173 https://bugzilla.redhat.com/show_bug.cgi?id=2035930 https://www.cve.org/CVERecord?id=CVE-2021-4173 https://nvd.nist.gov/vuln/detail/CVE-2021-4173 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-4173.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GnJD0wUWuwBPc7SVZsuSoQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GnJD0wUWuwBPc7SVZsuSoQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability in Node.js HTTP/2 servers by sending specially crafted WINDOW_UPDATE frames on stream 0 (connection-level). These frames can cause the flow control window to exceed its maximum value, leading to a memory leak as Http2Session objects are not properly cleaned up. This can result in resource exhaustion and a Denial of Service (DoS) condition for the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21714 https://bugzilla.redhat.com/show_bug.cgi?id=2453161 https://www.cve.org/CVERecord?id=CVE-2026-21714 https://nvd.nist.gov/vuln/detail/CVE-2026-21714 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21714.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GoHsuuxRgbGb3lm852rQmg==&#34;: {&#xA;      &#34;id&#34;: &#34;GoHsuuxRgbGb3lm852rQmg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GolUr/klMsQNQ9QFMdcAmw==&#34;: {&#xA;      &#34;id&#34;: &#34;GolUr/klMsQNQ9QFMdcAmw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0799&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to a use-after-free problem in the extractContigSamplesShifted32bits function in tools/tiffcrop.c, resulting in a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0799 https://bugzilla.redhat.com/show_bug.cgi?id=2170162 https://www.cve.org/CVERecord?id=CVE-2023-0799 https://nvd.nist.gov/vuln/detail/CVE-2023-0799 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0799.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GpJjElMhBMa2ZIh0g/0hAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GpJjElMhBMa2ZIh0g/0hAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27538&#34;,&#xA;      &#34;description&#34;: &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27538 https://bugzilla.redhat.com/show_bug.cgi?id=2179103 https://www.cve.org/CVERecord?id=CVE-2023-27538 https://nvd.nist.gov/vuln/detail/CVE-2023-27538 https://curl.se/docs/CVE-2023-27538.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27538.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Gs2+AgmYyHSIFlXrCWZVZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Gs2+AgmYyHSIFlXrCWZVZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4519&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The `webbrowser.open()` API, used to launch web browsers, does not properly sanitize input. This allows a remote attacker to craft a malicious URL containing leading dashes. When such a URL is opened, certain web browsers may interpret these dashes as command-line options, which could lead to unexpected behavior, information disclosure, or potentially arbitrary code execution, impacting the integrity of the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T15:08:32Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4519 https://bugzilla.redhat.com/show_bug.cgi?id=2449649 https://www.cve.org/CVERecord?id=CVE-2026-4519 https://nvd.nist.gov/vuln/detail/CVE-2026-4519 https://github.com/python/cpython/issues/143930 https://github.com/python/cpython/pull/143931 https://mail.python.org/archives/list/security-announce@python.org/thread/AY5NDSS433JK56Q7Q5IS7B37QFZVVOUS/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4519.json https://access.redhat.com/errata/RHSA-2026:6766&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GtECMHzRoeZKh1TLvpCt+A==&#34;: {&#xA;      &#34;id&#34;: &#34;GtECMHzRoeZKh1TLvpCt+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-IPC-Open3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GuM8+Ku1VtBzfPk3/FCgzw==&#34;: {&#xA;      &#34;id&#34;: &#34;GuM8+Ku1VtBzfPk3/FCgzw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-1056&#34;,&#xA;      &#34;description&#34;: &#34;Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 46dc8fcd.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-1056 https://bugzilla.redhat.com/show_bug.cgi?id=2233599 https://www.cve.org/CVERecord?id=CVE-2022-1056 https://nvd.nist.gov/vuln/detail/CVE-2022-1056 https://security.gentoo.org/glsa/202210-10 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1056.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GwJvkFMzYrKrZEvvNMbc6A==&#34;: {&#xA;      &#34;id&#34;: &#34;GwJvkFMzYrKrZEvvNMbc6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24791&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go. The net/http module mishandles specific server responses from HTTP/1.1 client requests. This issue may render a connection invalid and cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24791 https://bugzilla.redhat.com/show_bug.cgi?id=2295310 https://www.cve.org/CVERecord?id=CVE-2024-24791 https://nvd.nist.gov/vuln/detail/CVE-2024-24791 https://go.dev/cl/591255 https://go.dev/issue/67555 https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24791.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GwdBWjTMLLj14UbkCrmh/A==&#34;: {&#xA;      &#34;id&#34;: &#34;GwdBWjTMLLj14UbkCrmh/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-40090&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libtiff library. This issue allows an attacker who can submit a specially crafted file to an application linked with libtiff to cause an infinite loop, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-40090 https://bugzilla.redhat.com/show_bug.cgi?id=2234970 https://www.cve.org/CVERecord?id=CVE-2022-40090 https://nvd.nist.gov/vuln/detail/CVE-2022-40090 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-40090.json https://access.redhat.com/errata/RHSA-2024:2289&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-12.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;GzRz/FwkFLGO3g4HmoZPSA==&#34;: {&#xA;      &#34;id&#34;: &#34;GzRz/FwkFLGO3g4HmoZPSA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Gzt3Aov08YmfW0b/CN7tHw==&#34;: {&#xA;      &#34;id&#34;: &#34;Gzt3Aov08YmfW0b/CN7tHw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41862&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found In PostgreSQL. A modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. In certain conditions, a server can cause a libpq client to over-read and report an error message containing uninitialized bytes.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41862 https://bugzilla.redhat.com/show_bug.cgi?id=2165722 https://www.cve.org/CVERecord?id=CVE-2022-41862 https://nvd.nist.gov/vuln/detail/CVE-2022-41862 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41862.json https://access.redhat.com/errata/RHSA-2023:6429&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpq&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:13.11-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;H+x0VPepDcitQiESaSwIwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;H+x0VPepDcitQiESaSwIwQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38546&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. This flaw allows an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38546 https://bugzilla.redhat.com/show_bug.cgi?id=2241938 https://access.redhat.com/errata/RHSA-2024:2101 https://www.cve.org/CVERecord?id=CVE-2023-38546 https://nvd.nist.gov/vuln/detail/CVE-2023-38546 https://curl.se/docs/CVE-2023-38546.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38546.json https://access.redhat.com/errata/RHSA-2023:6745&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;H003kvHQyN0gsWRXOrXzxA==&#34;: {&#xA;      &#34;id&#34;: &#34;H003kvHQyN0gsWRXOrXzxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2603&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2603 https://bugzilla.redhat.com/show_bug.cgi?id=2209113 https://www.cve.org/CVERecord?id=CVE-2023-2603 https://nvd.nist.gov/vuln/detail/CVE-2023-2603 https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2603.json https://access.redhat.com/errata/RHSA-2023:5071&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.48-9.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;H04yzALMJAjmclexKFeS2w==&#34;: {&#xA;      &#34;id&#34;: &#34;H04yzALMJAjmclexKFeS2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;H09E3JrUNhQlgS4Jd5yiVw==&#34;: {&#xA;      &#34;id&#34;: &#34;H09E3JrUNhQlgS4Jd5yiVw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25547&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-04T21:51:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25547 https://bugzilla.redhat.com/show_bug.cgi?id=2436942 https://www.cve.org/CVERecord?id=CVE-2026-25547 https://nvd.nist.gov/vuln/detail/CVE-2026-25547 https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25547.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;H1wshPoazj8pmzsnWAztZA==&#34;: {&#xA;      &#34;id&#34;: &#34;H1wshPoazj8pmzsnWAztZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6276&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl. This vulnerability allows for information disclosure when a custom `Host:` header is used in an initial HTTP request, and a subsequent request reuses the same connection without specifying a new `Host:` header. This can lead to libcurl incorrectly sending cookies intended for the first host to the second host, resulting in a cookie leak. This issue is categorized as an Origin Validation Error (CWE-346). Exploitation typically requires specific debugging configurations.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6276 https://bugzilla.redhat.com/show_bug.cgi?id=2461203 https://www.cve.org/CVERecord?id=CVE-2026-6276 https://nvd.nist.gov/vuln/detail/CVE-2026-6276 https://curl.se/docs/CVE-2026-6276.html https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6276.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;H1xPFeyk3sWGXc+DXLkdaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;H1xPFeyk3sWGXc+DXLkdaQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1526&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \&#34;decompression bomb,\&#34; during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:08:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1526 https://bugzilla.redhat.com/show_bug.cgi?id=2447142 https://www.cve.org/CVERecord?id=CVE-2026-1526 https://nvd.nist.gov/vuln/detail/CVE-2026-1526 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q https://hackerone.com/reports/3481206 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1526.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;H4boG/V+MB7stA7jG8O6Tw==&#34;: {&#xA;      &#34;id&#34;: &#34;H4boG/V+MB7stA7jG8O6Tw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7104&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in SQLite3. This issue affects the sessionReadRecord function of the ext/session/sqlite3session.c function in the make alltest Handler component. Manipulation may cause a heap-based buffer overflow to occur.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7104 https://bugzilla.redhat.com/show_bug.cgi?id=2256194 https://www.cve.org/CVERecord?id=CVE-2023-7104 https://nvd.nist.gov/vuln/detail/CVE-2023-7104 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7104.json https://access.redhat.com/errata/RHSA-2024:0465&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-7.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;H5vm/YCKZciOb4TXZmGZlg==&#34;: {&#xA;      &#34;id&#34;: &#34;H5vm/YCKZciOb4TXZmGZlg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22018&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js package. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files they do not have explicit read access to.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22018 https://bugzilla.redhat.com/show_bug.cgi?id=2296990 https://www.cve.org/CVERecord?id=CVE-2024-22018 https://nvd.nist.gov/vuln/detail/CVE-2024-22018 https://hackerone.com/reports/2145862 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22018.json https://access.redhat.com/errata/RHSA-2024:5815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.16.0-1.module+el9.4.0+22197+9e60f127&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;H7H9wMobv6DOqzUUAdOqGA==&#34;: {&#xA;      &#34;id&#34;: &#34;H7H9wMobv6DOqzUUAdOqGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21890&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js Permission Model, where it is not clarified in the documentation that wildcards should only be used as the last character of a file path. For example: --allow-fs-read=/home/node/.ssh/*.pub will ignore pub and give access to everything after .ssh/.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21890 https://bugzilla.redhat.com/show_bug.cgi?id=2265722 https://www.cve.org/CVERecord?id=CVE-2024-21890 https://nvd.nist.gov/vuln/detail/CVE-2024-21890 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21890.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;H8XwHNDIkW12mW+y74dsdQ==&#34;: {&#xA;      &#34;id&#34;: &#34;H8XwHNDIkW12mW+y74dsdQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32004&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This vulnerability can be exploited by an unauthenticated attacker who places a specialized repository on the target&#39;s local system. If the victim clones this repository, the attacker can execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32004 https://bugzilla.redhat.com/show_bug.cgi?id=2280428 https://www.cve.org/CVERecord?id=CVE-2024-32004 https://nvd.nist.gov/vuln/detail/CVE-2024-32004 https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32004.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HBDLPf0FBMppxrTwW+gqlA==&#34;: {&#xA;      &#34;id&#34;: &#34;HBDLPf0FBMppxrTwW+gqlA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:5765&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-3.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HFchxDnUHv0YgEfYisGA6A==&#34;: {&#xA;      &#34;id&#34;: &#34;HFchxDnUHv0YgEfYisGA6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31130&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs in the ares_inet_net_pton() function, which is vulnerable to a buffer underflow for certain ipv6 addresses. \&#34;0::00:00:00/2\&#34; in particular was found to cause an issue. C-ares only uses this function internally for configuration purposes, which would require an administrator to configure such an address via ares_set_sortlist().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31130 https://bugzilla.redhat.com/show_bug.cgi?id=2209497 https://www.cve.org/CVERecord?id=CVE-2023-31130 https://nvd.nist.gov/vuln/detail/CVE-2023-31130 https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31130.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HHBOKYlzeD2Busv7btyBAA==&#34;: {&#xA;      &#34;id&#34;: &#34;HHBOKYlzeD2Busv7btyBAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-48232&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, an open source command line text editor. A floating point exception may occur when calculating the line offset for overlong lines when smooth scrolling is enabled and the cpo-settings include the &#39;n&#39; flag. This issue may occur when a window border is present and when the wrapped line continues on the next physical line directly in the window border because the &#39;cpo&#39; setting includes the &#39;n&#39; flag. Only users with non-default settings are affected and the exception should only result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-48232 https://bugzilla.redhat.com/show_bug.cgi?id=2250269 https://www.cve.org/CVERecord?id=CVE-2023-48232 https://nvd.nist.gov/vuln/detail/CVE-2023-48232 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/cb0b99f0672d8446585d26e998343dceca17d1ce https://github.com/vim/vim/security/advisories/GHSA-f6cx-x634-hqpw https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48232.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HHpOVRDbzmY2UhydU+uwcg==&#34;: {&#xA;      &#34;id&#34;: &#34;HHpOVRDbzmY2UhydU+uwcg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6237&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When the EVP_PKEY_public_check() function is called in RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is a large prime, this computation takes a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6237 https://bugzilla.redhat.com/show_bug.cgi?id=2258502 https://www.cve.org/CVERecord?id=CVE-2023-6237 https://nvd.nist.gov/vuln/detail/CVE-2023-6237 https://www.openssl.org/news/secadv/20240115.txt https://www.openwall.com/lists/oss-security/2024/01/15/2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6237.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HJRWtVFOp4GhofsLDJveWg==&#34;: {&#xA;      &#34;id&#34;: &#34;HJRWtVFOp4GhofsLDJveWg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1528&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici&#39;s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:21:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1528 https://bugzilla.redhat.com/show_bug.cgi?id=2447145 https://www.cve.org/CVERecord?id=CVE-2026-1528 https://nvd.nist.gov/vuln/detail/CVE-2026-1528 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj https://hackerone.com/reports/3537648 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1528.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HJf9PCZx5YjpyYLqECiTKg==&#34;: {&#xA;      &#34;id&#34;: &#34;HJf9PCZx5YjpyYLqECiTKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12797&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL&#39;s RFC7250 Raw Public Key (RPK) authentication. This vulnerability allows man-in-the-middle (MITM) attacks via failure to abort TLS/DTLS handshakes when the server&#39;s RPK does not match the expected key despite the SSL_VERIFY_PEER verification mode being set.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-11T15:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12797 https://bugzilla.redhat.com/show_bug.cgi?id=2342757 https://www.cve.org/CVERecord?id=CVE-2024-12797 https://nvd.nist.gov/vuln/detail/CVE-2024-12797 https://openssl-library.org/news/secadv/20250211.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12797.json https://access.redhat.com/errata/RHSA-2025:1330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HMF5qYGPMt4Fb5i6RtdwRA==&#34;: {&#xA;      &#34;id&#34;: &#34;HMF5qYGPMt4Fb5i6RtdwRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-12900&#34;,&#xA;      &#34;description&#34;: &#34;A data integrity error was found in the bzip2 (User-space package) functionality when decompressing. This issue occurs when a user decompresses a particular kind of .bz2 files. A local user could get unexpected results (or corrupted data) as result of decompressing these files.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-15T10:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-12900 https://bugzilla.redhat.com/show_bug.cgi?id=2332075 https://www.cve.org/CVERecord?id=CVE-2019-12900 https://nvd.nist.gov/vuln/detail/CVE-2019-12900 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-12900.json https://access.redhat.com/errata/RHSA-2025:0925&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.0.8-10.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HMytRAMTGJlQRfqVbIzzVg==&#34;: {&#xA;      &#34;id&#34;: &#34;HMytRAMTGJlQRfqVbIzzVg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0525&#34;,&#xA;      &#34;description&#34;: &#34;Improper sanitization of Transfer-Encoding headers in net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-25T17:34:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/409874 https://go.googlesource.com/go/+/e5017a93fcde94f09836200bca55324af037ee5f https://go.dev/issue/53188 https://go.dev/cl/410714 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.4&#34;&#xA;    },&#xA;    &#34;HNWibMRA8AF0jyyBYQthdA==&#34;: {&#xA;      &#34;id&#34;: &#34;HNWibMRA8AF0jyyBYQthdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-50349&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git. This vulnerability occurs when Git requests credentials via a terminal prompt, for example, without the use of a credential helper. During this process, Git displays the host name for which the credentials are needed, but any URL-encoded parts are decoded and displayed directly. This can allow an attacker to manipulate URLs by including ANSI escape sequences, which can be interpreted by the terminal to mislead users by tricking them into entering passwords that are redirected to malicious attacker-controlled sites.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T18:43:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-50349 https://bugzilla.redhat.com/show_bug.cgi?id=2337824 https://www.cve.org/CVERecord?id=CVE-2024-50349 https://nvd.nist.gov/vuln/detail/CVE-2024-50349 https://github.com/git/git/commit/7725b8100ffbbff2750ee4d61a0fcc1f53a086e8 https://github.com/git/git/commit/c903985bf7e772e2d08275c1a95c8a55ab011577 https://github.com/git/git/security/advisories/GHSA-hmg8-h7qf-7cxr https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-50349.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HOYwG5Rw5KtCLqSTp9IaXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HOYwG5Rw5KtCLqSTp9IaXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4752&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, where it is vulnerable to a use-after-free in the ins_compl_get_exp function. This flaw allows a specially crafted file to crash software, use unexpected values, or possibly execute code when opened in Vim.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4752 https://bugzilla.redhat.com/show_bug.cgi?id=2237311 https://www.cve.org/CVERecord?id=CVE-2023-4752 https://nvd.nist.gov/vuln/detail/CVE-2023-4752 https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4752.json https://access.redhat.com/errata/RHSA-2025:7440&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-22.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HRagOYGIDOKfFoQakG4CEA==&#34;: {&#xA;      &#34;id&#34;: &#34;HRagOYGIDOKfFoQakG4CEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6021&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2&#39;s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6021 https://bugzilla.redhat.com/show_bug.cgi?id=2372406 https://www.cve.org/CVERecord?id=CVE-2025-6021 https://nvd.nist.gov/vuln/detail/CVE-2025-6021 https://gitlab.gnome.org/GNOME/libxml2/-/issues/926 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6021.json https://access.redhat.com/errata/RHSA-2025:10699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HS96brYtpBiaYpW7OxT5Wg==&#34;: {&#xA;      &#34;id&#34;: &#34;HS96brYtpBiaYpW7OxT5Wg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27533&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27533 https://bugzilla.redhat.com/show_bug.cgi?id=2179062 https://www.cve.org/CVERecord?id=CVE-2023-27533 https://nvd.nist.gov/vuln/detail/CVE-2023-27533 https://curl.se/docs/CVE-2023-27533.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27533.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HSaKorahiaNwGqqE2DJSaw==&#34;: {&#xA;      &#34;id&#34;: &#34;HSaKorahiaNwGqqE2DJSaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3235&#34;,&#xA;      &#34;description&#34;: &#34;A use after free vulnerability has been found in the vim package of the linux kernals such that Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3235 https://bugzilla.redhat.com/show_bug.cgi?id=2129371 https://www.cve.org/CVERecord?id=CVE-2022-3235 https://nvd.nist.gov/vuln/detail/CVE-2022-3235 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3235.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HT2SNCYX7dkF36jwcJ6tBg==&#34;: {&#xA;      &#34;id&#34;: &#34;HT2SNCYX7dkF36jwcJ6tBg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23166&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, specifically in the C++ method SignTraits::DeriveBits(). This vulnerability can allow a remote attacker to crash the Node.js runtime via untrusted input, triggering an exception in a background thread.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23166 https://bugzilla.redhat.com/show_bug.cgi?id=2367163 https://www.cve.org/CVERecord?id=CVE-2025-23166 https://nvd.nist.gov/vuln/detail/CVE-2025-23166 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23166.json https://access.redhat.com/errata/RHSA-2025:8467&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.16.0-1.module+el9.6.0+23151+b1496e9d&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HT4k6+0VwtXXrNi4IFV2ug==&#34;: {&#xA;      &#34;id&#34;: &#34;HT4k6+0VwtXXrNi4IFV2ug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7008&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222672 https://www.cve.org/CVERecord?id=CVE-2023-7008 https://nvd.nist.gov/vuln/detail/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222261 https://github.com/systemd/systemd/issues/25676 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7008.json https://access.redhat.com/errata/RHSA-2024:2463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-32.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HUhIlH+/4z8COoDr8jeAaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HUhIlH+/4z8COoDr8jeAaQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55131&#34;,&#xA;      &#34;description&#34;: &#34;A memory exposure flaw has been discovered in Node.js. A flaw in Node.js&#39;s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55131 https://bugzilla.redhat.com/show_bug.cgi?id=2431350 https://www.cve.org/CVERecord?id=CVE-2025-55131 https://nvd.nist.gov/vuln/detail/CVE-2025-55131 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55131.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HW1HxtJFrKBktMKHARGGeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HW1HxtJFrKBktMKHARGGeQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39321&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39321 https://bugzilla.redhat.com/show_bug.cgi?id=2237777 https://www.cve.org/CVERecord?id=CVE-2023-39321 https://nvd.nist.gov/vuln/detail/CVE-2023-39321 https://go.dev/cl/523039 https://go.dev/issue/62266 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2044.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39321.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HeemEcWe2JVMYkjGWbuiFA==&#34;: {&#xA;      &#34;id&#34;: &#34;HeemEcWe2JVMYkjGWbuiFA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24788&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net package of the Go stdlib. When a malformed DNS message is received as a response to a query, the Lookup functions within the net package can get stuck in an infinite loop. This issue can lead to resource exhaustion and denial of service (DoS) conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24788 https://bugzilla.redhat.com/show_bug.cgi?id=2279814 https://www.cve.org/CVERecord?id=CVE-2024-24788 https://nvd.nist.gov/vuln/detail/CVE-2024-24788 https://pkg.go.dev/vuln/GO-2024-2824 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24788.json https://access.redhat.com/errata/RHBA-2024:3840&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.10-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HemNnBPTgSHasXNahNqsQg==&#34;: {&#xA;      &#34;id&#34;: &#34;HemNnBPTgSHasXNahNqsQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47906&#34;,&#xA;      &#34;description&#34;: &#34;A path handling flaw has been discovered in the os/exec go package. If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\&#34;\&#34;, \&#34;.\&#34;, and \&#34;..\&#34;), can result in the binaries listed in the PATH being unexpectedly returned.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-18T18:41:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47906 https://bugzilla.redhat.com/show_bug.cgi?id=2396546 https://www.cve.org/CVERecord?id=CVE-2025-47906 https://nvd.nist.gov/vuln/detail/CVE-2025-47906 https://go.dev/cl/691775 https://go.dev/issue/74466 https://groups.google.com/g/golang-announce/c/x5MKroML2yM https://pkg.go.dev/vuln/GO-2025-3956 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47906.json https://access.redhat.com/errata/RHSA-2025:13935&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.6-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HfjDJmml2JYJ9YjdaPe+zQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HfjDJmml2JYJ9YjdaPe+zQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2398&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an application configures libcurl to use HTTP/2 server push and the amount of received headers for the push surpasses the maximum allowed limit, libcurl aborts the server push. When aborting, libcurl does not free all the previously allocated headers, resulting in a memory leak.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2398 https://bugzilla.redhat.com/show_bug.cgi?id=2270498 https://www.cve.org/CVERecord?id=CVE-2024-2398 https://nvd.nist.gov/vuln/detail/CVE-2024-2398 https://curl.se/docs/CVE-2024-2398.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2398.json https://access.redhat.com/errata/RHSA-2024:5529&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-29.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HiF486OoQCfE4Hwc8DTxrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HiF486OoQCfE4Hwc8DTxrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HjJnWaqrr4SaFPjzu8hVkg==&#34;: {&#xA;      &#34;id&#34;: &#34;HjJnWaqrr4SaFPjzu8hVkg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-46663&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in less. This flaw allows crafted data to result in \&#34;less -R\&#34; not filtering ANSI escape sequences sent to the terminal.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-46663 https://bugzilla.redhat.com/show_bug.cgi?id=2169621 https://www.cve.org/CVERecord?id=CVE-2022-46663 https://nvd.nist.gov/vuln/detail/CVE-2022-46663 https://www.openwall.com/lists/oss-security/2023/02/07/7 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-46663.json https://access.redhat.com/errata/RHSA-2023:3725&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;less&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:590-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Hk/EnuFgs+4rtDh2D0OPZg==&#34;: {&#xA;      &#34;id&#34;: &#34;Hk/EnuFgs+4rtDh2D0OPZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js due to a lack of safeguards on chunk extension bytes. The server may read an unbounded number of bytes from a single connection, which can allow an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22019 https://bugzilla.redhat.com/show_bug.cgi?id=2264574 https://www.cve.org/CVERecord?id=CVE-2024-22019 https://nvd.nist.gov/vuln/detail/CVE-2024-22019 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22019.json https://access.redhat.com/errata/RHSA-2024:1438&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-4.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Hk8k4qPIhaJI1mipqA9iiw==&#34;: {&#xA;      &#34;id&#34;: &#34;Hk8k4qPIhaJI1mipqA9iiw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41080&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing a specially crafted XML document that leverages insufficient entropy in the hash function. This can lead to hash flooding, a type of Denial of Service (DoS) attack, where the system becomes unresponsive or crashes due to excessive resource consumption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-16T16:52:01Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-41080 https://bugzilla.redhat.com/show_bug.cgi?id=2458967 https://www.cve.org/CVERecord?id=CVE-2026-41080 https://nvd.nist.gov/vuln/detail/CVE-2026-41080 https://github.com/libexpat/libexpat/issues/47 https://github.com/libexpat/libexpat/pull/1183 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-41080.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HlOu0EmTxHkjzmJeJEuJmw==&#34;: {&#xA;      &#34;id&#34;: &#34;HlOu0EmTxHkjzmJeJEuJmw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4735&#34;,&#xA;      &#34;description&#34;: &#34;Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4735 https://bugzilla.redhat.com/show_bug.cgi?id=2237165 https://www.cve.org/CVERecord?id=CVE-2023-4735 https://nvd.nist.gov/vuln/detail/CVE-2023-4735 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4735.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HlmfsCkhcIqBoptvS1F7pQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HlmfsCkhcIqBoptvS1F7pQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31124&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This issue occurs when cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross-compiling aarch64 android. As a result, it will downgrade to rand(), which could allow an attacker to utilize the lack of entropy by not using a CSPRNG.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31124 https://bugzilla.redhat.com/show_bug.cgi?id=2209494 https://www.cve.org/CVERecord?id=CVE-2023-31124 https://nvd.nist.gov/vuln/detail/CVE-2023-31124 https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31124.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HmZXdUV/ycFcRK+m71pC+w==&#34;: {&#xA;      &#34;id&#34;: &#34;HmZXdUV/ycFcRK+m71pC+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-11168&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The `urllib.parse.urlsplit()` and `urlparse()` functions improperly validated bracketed hosts (`[]`), allowing hosts that weren&#39;t IPv6 or IPvFuture compliant. This behavior was not conformant to RFC 3986 and was potentially vulnerable to server-side request forgery (SSRF) if a URL is processed by more than one URL parser.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-12T21:22:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-11168 https://bugzilla.redhat.com/show_bug.cgi?id=2325776 https://www.cve.org/CVERecord?id=CVE-2024-11168 https://nvd.nist.gov/vuln/detail/CVE-2024-11168 https://github.com/python/cpython/commit/29f348e232e82938ba2165843c448c2b291504c5 https://github.com/python/cpython/commit/b2171a2fd41416cf68afd67460578631d755a550 https://github.com/python/cpython/issues/103848 https://github.com/python/cpython/pull/103849 https://mail.python.org/archives/list/security-announce@python.org/thread/XPWB6XVZ5G5KGEI63M4AWLIEUF5BPH4T/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11168.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HnNhAdInEg3yPEHYo7Hl+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;HnNhAdInEg3yPEHYo7Hl+Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0567&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0567 https://bugzilla.redhat.com/show_bug.cgi?id=2258544 https://www.cve.org/CVERecord?id=CVE-2024-0567 https://nvd.nist.gov/vuln/detail/CVE-2024-0567 https://gitlab.com/gnutls/gnutls/-/issues/1521 https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0567.json https://access.redhat.com/errata/RHSA-2024:0533&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.7.6-23.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HqbYURF/7TaXoQPMqtdsIA==&#34;: {&#xA;      &#34;id&#34;: &#34;HqbYURF/7TaXoQPMqtdsIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0464&#34;,&#xA;      &#34;description&#34;: &#34;A security vulnerability has been identified in all supported OpenSSL versions related to verifying X.509 certificate chains that include policy constraints. This flaw allows attackers to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial of service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the -policy&#39; argument to the command line utilities or calling the X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0464 https://bugzilla.redhat.com/show_bug.cgi?id=2181082 https://www.cve.org/CVERecord?id=CVE-2023-0464 https://nvd.nist.gov/vuln/detail/CVE-2023-0464 https://www.openssl.org/news/secadv/20230322.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0464.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HrQTGWot7zXPyYbisnzShg==&#34;: {&#xA;      &#34;id&#34;: &#34;HrQTGWot7zXPyYbisnzShg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6409&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was discovered in how signals are handled by OpenSSH&#39;s server (sshd). If a remote attacker does not authenticate within a set time period, then sshd&#39;s SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-08T17:45:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6409 https://bugzilla.redhat.com/show_bug.cgi?id=2295085 https://www.cve.org/CVERecord?id=CVE-2024-6409 https://nvd.nist.gov/vuln/detail/CVE-2024-6409 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6409.json https://access.redhat.com/errata/RHSA-2024:4457&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-38.el9_4.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ht/FCT7E55SLIJNr/AHy9A==&#34;: {&#xA;      &#34;id&#34;: &#34;Ht/FCT7E55SLIJNr/AHy9A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23919&#34;,&#xA;      &#34;description&#34;: &#34;A cryptographic vulnerability exists in Node.js \u003c19.2.0, \u003c18.14.1, \u003c16.19.1, \u003c14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23919 https://bugzilla.redhat.com/show_bug.cgi?id=2172170 https://www.cve.org/CVERecord?id=CVE-2023-23919 https://nvd.nist.gov/vuln/detail/CVE-2023-23919 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23919.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HtyjDn7BTHlrC40bO1Itjw==&#34;: {&#xA;      &#34;id&#34;: &#34;HtyjDn7BTHlrC40bO1Itjw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33812&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang.org/x/image. A remote attacker could exploit this vulnerability by providing a specially crafted font file. Parsing this malicious file can lead to excessive memory allocation, which may result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-21T19:21:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33812 https://bugzilla.redhat.com/show_bug.cgi?id=2460227 https://www.cve.org/CVERecord?id=CVE-2026-33812 https://nvd.nist.gov/vuln/detail/CVE-2026-33812 https://go.dev/cl/761180 https://go.dev/issue/78382 https://pkg.go.dev/vuln/GO-2026-4962 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33812.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Hv5r2lArsZsqnS0cLJ2sfw==&#34;: {&#xA;      &#34;id&#34;: &#34;Hv5r2lArsZsqnS0cLJ2sfw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61731&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in cmd/go. An attacker can exploit this by building a malicious Go source file that uses the &#39;#cgo pkg-config:&#39; directive. This allows the attacker to write to an arbitrary file with partial control over its content, by providing a &#39;--log-file&#39; argument to the pkg-config command. This vulnerability can lead to arbitrary file write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61731 https://bugzilla.redhat.com/show_bug.cgi?id=2434433 https://www.cve.org/CVERecord?id=CVE-2025-61731 https://nvd.nist.gov/vuln/detail/CVE-2025-61731 https://go.dev/cl/736711 https://go.dev/issue/77100 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4339 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61731.json https://access.redhat.com/errata/RHSA-2026:5942&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.8-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HveCNT+j0lknlUOFTaqgtg==&#34;: {&#xA;      &#34;id&#34;: &#34;HveCNT+j0lknlUOFTaqgtg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22693&#34;,&#xA;      &#34;description&#34;: &#34;A null pointer dereference vector has been discovered in the harfbuzz package. A null pointer dereference vulnerability exists in the SubtableUnicodesCache::create function located in src/hb-ot-cmap-table.hh:1672-1673. The function fails to check if hb_malloc returns NULL before using placement new to construct an object at the returned pointer address. When hb_malloc fails to allocate memory (which can occur in low-memory conditions or when using custom allocators that simulate allocation failures), it returns NULL. The code then attempts to call the constructor on this null pointer using placement new syntax, resulting in undefined behavior and a Segmentation Fault.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-10T05:53:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22693 https://bugzilla.redhat.com/show_bug.cgi?id=2428439 https://www.cve.org/CVERecord?id=CVE-2026-22693 https://nvd.nist.gov/vuln/detail/CVE-2026-22693 https://github.com/harfbuzz/harfbuzz/commit/1265ff8d990284f04d8768f35b0e20ae5f60daae https://github.com/harfbuzz/harfbuzz/security/advisories/GHSA-xvjr-f2r9-c7ww https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22693.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;harfbuzz&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HxI42iSjURjRki+uV6q/9w==&#34;: {&#xA;      &#34;id&#34;: &#34;HxI42iSjURjRki+uV6q/9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0232&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0232 https://bugzilla.redhat.com/show_bug.cgi?id=2243754 https://www.cve.org/CVERecord?id=CVE-2024-0232 https://nvd.nist.gov/vuln/detail/CVE-2024-0232 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0232.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HxiMqPnG14UzA9oHqqI6Ng==&#34;: {&#xA;      &#34;id&#34;: &#34;HxiMqPnG14UzA9oHqqI6Ng==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;I1n6/nf1BmKoqYe/GXCV3A==&#34;: {&#xA;      &#34;id&#34;: &#34;I1n6/nf1BmKoqYe/GXCV3A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5535&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the &#39;no overlap&#39; response in ALPN or uses the output as the opportunistic protocol in NPN.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-5535 https://bugzilla.redhat.com/show_bug.cgi?id=2294581 https://www.cve.org/CVERecord?id=CVE-2024-5535 https://nvd.nist.gov/vuln/detail/CVE-2024-5535 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-5535.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;I2RIq/DddjMUlHYGWhmsEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;I2RIq/DddjMUlHYGWhmsEQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32990&#34;,&#xA;      &#34;description&#34;: &#34;A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-09T07:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32990 https://bugzilla.redhat.com/show_bug.cgi?id=2359620 https://www.cve.org/CVERecord?id=CVE-2025-32990 https://nvd.nist.gov/vuln/detail/CVE-2025-32990 https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32990.json https://access.redhat.com/errata/RHSA-2025:16116&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-6.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;I2w7mAdeccRvDV/HeaBOoA==&#34;: {&#xA;      &#34;id&#34;: &#34;I2w7mAdeccRvDV/HeaBOoA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29187&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw occurs due to Git not checking the ownership of directories in a local multi-user system when running commands specified in the local repository configuration. This issue allows the owner of the repository to cause arbitrary commands to be executed by other users who access the repository.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-29187 https://bugzilla.redhat.com/show_bug.cgi?id=2107439 https://www.cve.org/CVERecord?id=CVE-2022-29187 https://nvd.nist.gov/vuln/detail/CVE-2022-29187 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-29187.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;I3+uP7bb+nPtzRYHH2UUgw==&#34;: {&#xA;      &#34;id&#34;: &#34;I3+uP7bb+nPtzRYHH2UUgw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3826&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Libiberty. A heap and stack buffer overflow found in the dlang_lname function in d-demangle.c leads to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-09-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3826 https://bugzilla.redhat.com/show_bug.cgi?id=2122627 https://www.cve.org/CVERecord?id=CVE-2021-3826 https://nvd.nist.gov/vuln/detail/CVE-2021-3826 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3826.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;I362Vwh1x92yigOP2ZDpKA==&#34;: {&#xA;      &#34;id&#34;: &#34;I362Vwh1x92yigOP2ZDpKA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27983&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27983 https://bugzilla.redhat.com/show_bug.cgi?id=2272764 https://www.cve.org/CVERecord?id=CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27983.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;I3Zso12Z+9mUcVEvUKWJ8w==&#34;: {&#xA;      &#34;id&#34;: &#34;I3Zso12Z+9mUcVEvUKWJ8w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cpp&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;I3vwwgMxzxWo15otCOgvAw==&#34;: {&#xA;      &#34;id&#34;: &#34;I3vwwgMxzxWo15otCOgvAw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3928&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim. A possible stack-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-10-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3928 https://bugzilla.redhat.com/show_bug.cgi?id=2021292 https://www.cve.org/CVERecord?id=CVE-2021-3928 https://nvd.nist.gov/vuln/detail/CVE-2021-3928 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3928.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;I44fXMfux3yPYaBHaNxgsg==&#34;: {&#xA;      &#34;id&#34;: &#34;I44fXMfux3yPYaBHaNxgsg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27536&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. Libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, the GSS delegation setting was left out from the configuration match checks, making them match too easily, affecting krb5/kerberos/negotiate/GSSAPI transfers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27536 https://bugzilla.redhat.com/show_bug.cgi?id=2179092 https://www.cve.org/CVERecord?id=CVE-2023-27536 https://nvd.nist.gov/vuln/detail/CVE-2023-27536 https://curl.se/docs/CVE-2023-27536.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27536.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;I4HPpXHWYdmlm5nIZYX2Zw==&#34;: {&#xA;      &#34;id&#34;: &#34;I4HPpXHWYdmlm5nIZYX2Zw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45336&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45336 https://bugzilla.redhat.com/show_bug.cgi?id=2341751 https://www.cve.org/CVERecord?id=CVE-2024-45336 https://nvd.nist.gov/vuln/detail/CVE-2024-45336 https://github.com/golang/go/issues/70530 https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45336.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;delve&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.1-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;I53ZVLR4IycE9d0CU5r5nA==&#34;: {&#xA;      &#34;id&#34;: &#34;I53ZVLR4IycE9d0CU5r5nA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;I5CKvoKqBhFd1vY7fxFKtQ==&#34;: {&#xA;      &#34;id&#34;: &#34;I5CKvoKqBhFd1vY7fxFKtQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30775&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30775 https://bugzilla.redhat.com/show_bug.cgi?id=2187141 https://www.cve.org/CVERecord?id=CVE-2023-30775 https://nvd.nist.gov/vuln/detail/CVE-2023-30775 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30775.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;I9Xc2JiRiPWfOFS5AHY1Ww==&#34;: {&#xA;      &#34;id&#34;: &#34;I9Xc2JiRiPWfOFS5AHY1Ww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7008&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222672 https://www.cve.org/CVERecord?id=CVE-2023-7008 https://nvd.nist.gov/vuln/detail/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222261 https://github.com/systemd/systemd/issues/25676 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7008.json https://access.redhat.com/errata/RHSA-2024:2463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-32.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IDAwc/hZzIcM4IBkaUT9YA==&#34;: {&#xA;      &#34;id&#34;: &#34;IDAwc/hZzIcM4IBkaUT9YA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-3563&#34;,&#xA;      &#34;description&#34;: &#34;Request smuggling due to acceptance of invalid chunked data in net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T19:46:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/652998 https://go.dev/issue/71988 https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.23.8&#34;&#xA;    },&#xA;    &#34;IDDFCE+x3YM7koS2SvW5fA==&#34;: {&#xA;      &#34;id&#34;: &#34;IDDFCE+x3YM7koS2SvW5fA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3446&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security flaw occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3446 https://bugzilla.redhat.com/show_bug.cgi?id=2224962 https://www.cve.org/CVERecord?id=CVE-2023-3446 https://nvd.nist.gov/vuln/detail/CVE-2023-3446 https://www.openssl.org/news/secadv/20230719.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3446.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IENtFrOwfEqYX/lp+0u2Gw==&#34;: {&#xA;      &#34;id&#34;: &#34;IENtFrOwfEqYX/lp+0u2Gw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-48385&#34;,&#xA;      &#34;description&#34;: &#34;A bundled uri handling flaw was found in Git. When cloning a repository, Git knows to optionally fetch a bundle advertised by the remote server, which allows the server side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T18:23:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-48385 https://bugzilla.redhat.com/show_bug.cgi?id=2378808 https://www.cve.org/CVERecord?id=CVE-2025-48385 https://nvd.nist.gov/vuln/detail/CVE-2025-48385 https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-48385.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IERk9xwccKWSGr20Hb5U6g==&#34;: {&#xA;      &#34;id&#34;: &#34;IERk9xwccKWSGr20Hb5U6g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24539&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang where angle brackets (\u003c\u003e) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a &#39;/&#39; character could result in the CSS context unexpectedly closing, allowing for the injection of unexpected HMTL if executed with untrusted input.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24539 https://bugzilla.redhat.com/show_bug.cgi?id=2196026 https://www.cve.org/CVERecord?id=CVE-2023-24539 https://nvd.nist.gov/vuln/detail/CVE-2023-24539 https://github.com/golang/go/issues/59720 https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24539.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IEgg0w4Stl0SPUBA3ppc4w==&#34;: {&#xA;      &#34;id&#34;: &#34;IEgg0w4Stl0SPUBA3ppc4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61984&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH where control characters in usernames were not properly validated when sourced from untrusted inputs like the command line or configuration expansion. If a ProxyCommand is used, these control characters could modify command behavior, potentially leading to code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61984 https://bugzilla.redhat.com/show_bug.cgi?id=2401960 https://www.cve.org/CVERecord?id=CVE-2025-61984 https://nvd.nist.gov/vuln/detail/CVE-2025-61984 https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2 https://www.openssh.com/releasenotes.html#10.1p1 https://www.openwall.com/lists/oss-security/2025/10/06/1 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61984.json https://access.redhat.com/errata/RHSA-2025:23480&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-47.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IFJrKlOefqh8BMNkCUNhqA==&#34;: {&#xA;      &#34;id&#34;: &#34;IFJrKlOefqh8BMNkCUNhqA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55131&#34;,&#xA;      &#34;description&#34;: &#34;A memory exposure flaw has been discovered in Node.js. A flaw in Node.js&#39;s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55131 https://bugzilla.redhat.com/show_bug.cgi?id=2431350 https://www.cve.org/CVERecord?id=CVE-2025-55131 https://nvd.nist.gov/vuln/detail/CVE-2025-55131 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55131.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IFUwSX5dX69QHRHfvOeQDg==&#34;: {&#xA;      &#34;id&#34;: &#34;IFUwSX5dX69QHRHfvOeQDg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6429&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl. When configured to use a .netrc file for credentials and follow HTTP redirects, libcurl can inadvertently send the password from the initial connection to the redirected host. This sensitive information disclosure occurs when both the original and redirect URLs use clear text HTTP, are performed over the same HTTP proxy, and the same connection is reused. This vulnerability, categorized as an Exposure of Sensitive Information to an Unauthorized Actor (CWE-200), could allow an attacker to obtain user credentials.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6429 https://bugzilla.redhat.com/show_bug.cgi?id=2461205 https://www.cve.org/CVERecord?id=CVE-2026-6429 https://nvd.nist.gov/vuln/detail/CVE-2026-6429 https://curl.se/docs/CVE-2026-6429.html https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6429.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IGjKj/4HsFqLB1NtljhGnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;IGjKj/4HsFqLB1NtljhGnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21711&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The Node.js Permission Model, designed to restrict network access, incorrectly omits permission checks for Unix Domain Socket (UDS) server operations. This allows local code, even when explicitly denied network access, to create and expose inter-process communication (IPC) endpoints. As a result, unauthorized communication can occur between processes on the same host, bypassing the intended network security restrictions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21711 https://bugzilla.redhat.com/show_bug.cgi?id=2453158 https://www.cve.org/CVERecord?id=CVE-2026-21711 https://nvd.nist.gov/vuln/detail/CVE-2026-21711 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21711.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IGsR1pj6qXRBH+0hYVXsew==&#34;: {&#xA;      &#34;id&#34;: &#34;IGsR1pj6qXRBH+0hYVXsew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27536&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. Libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, the GSS delegation setting was left out from the configuration match checks, making them match too easily, affecting krb5/kerberos/negotiate/GSSAPI transfers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27536 https://bugzilla.redhat.com/show_bug.cgi?id=2179092 https://www.cve.org/CVERecord?id=CVE-2023-27536 https://nvd.nist.gov/vuln/detail/CVE-2023-27536 https://curl.se/docs/CVE-2023-27536.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27536.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IH0yoiWyuDmG+HH8h9dKLw==&#34;: {&#xA;      &#34;id&#34;: &#34;IH0yoiWyuDmG+HH8h9dKLw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27536&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. Libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, the GSS delegation setting was left out from the configuration match checks, making them match too easily, affecting krb5/kerberos/negotiate/GSSAPI transfers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27536 https://bugzilla.redhat.com/show_bug.cgi?id=2179092 https://www.cve.org/CVERecord?id=CVE-2023-27536 https://nvd.nist.gov/vuln/detail/CVE-2023-27536 https://curl.se/docs/CVE-2023-27536.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27536.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IIfJmT1yzMqBOVKMy3nlyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;IIfJmT1yzMqBOVKMy3nlyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4674&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-29T21:19:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4674 https://bugzilla.redhat.com/show_bug.cgi?id=2384329 https://www.cve.org/CVERecord?id=CVE-2025-4674 https://nvd.nist.gov/vuln/detail/CVE-2025-4674 https://go.dev/cl/686515 https://go.dev/issue/74380 https://groups.google.com/g/golang-announce/c/gTNJnDXmn34 https://pkg.go.dev/vuln/GO-2025-3828 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4674.json https://access.redhat.com/errata/RHSA-2025:13935&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.6-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IJSMEZBpGJDyClVadkCLsA==&#34;: {&#xA;      &#34;id&#34;: &#34;IJSMEZBpGJDyClVadkCLsA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11083&#34;,&#xA;      &#34;description&#34;: &#34;A head based buffer overflow flaw has been discovered in GNU bin utilities. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-27T23:02:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11083 https://bugzilla.redhat.com/show_bug.cgi?id=2399948 https://www.cve.org/CVERecord?id=CVE-2025-11083 https://nvd.nist.gov/vuln/detail/CVE-2025-11083 https://sourceware.org/bugzilla/attachment.cgi?id=16353 https://sourceware.org/bugzilla/show_bug.cgi?id=33457 https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490 https://vuldb.com/?ctiid.326124 https://vuldb.com/?id.326124 https://vuldb.com/?submit.661277 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11083.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IL9yoqEJiA7P9oRxQrj7SQ==&#34;: {&#xA;      &#34;id&#34;: &#34;IL9yoqEJiA7P9oRxQrj7SQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32002&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32002 https://bugzilla.redhat.com/show_bug.cgi?id=2230948 https://www.cve.org/CVERecord?id=CVE-2023-32002 https://nvd.nist.gov/vuln/detail/CVE-2023-32002 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32002.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.17.1-1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IRgMJoQA4x1xizY2hEw96w==&#34;: {&#xA;      &#34;id&#34;: &#34;IRgMJoQA4x1xizY2hEw96w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32559&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(&#39;spawn_sync&#39;) to run arbitrary code outside of the limits defined in a policy.json file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32559 https://bugzilla.redhat.com/show_bug.cgi?id=2230956 https://www.cve.org/CVERecord?id=CVE-2023-32559 https://nvd.nist.gov/vuln/detail/CVE-2023-32559 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32559.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ISgjA2mi+Q9vbdNEhDKXOA==&#34;: {&#xA;      &#34;id&#34;: &#34;ISgjA2mi+Q9vbdNEhDKXOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici package for Node.js. Undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If an app has a mechanism that sends multipart requests to an attacker-controlled website, it can leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T17:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22150 https://bugzilla.redhat.com/show_bug.cgi?id=2339176 https://www.cve.org/CVERecord?id=CVE-2025-22150 https://nvd.nist.gov/vuln/detail/CVE-2025-22150 https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113 https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0 https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385 https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975 https://hackerone.com/reports/2913312 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22150.json https://access.redhat.com/errata/RHSA-2025:1446&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.6-1.module+el9.5.0+22773+9a359385&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ITIiuf1dzb05+JHj8h65fg==&#34;: {&#xA;      &#34;id&#34;: &#34;ITIiuf1dzb05+JHj8h65fg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22025&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22025 https://bugzilla.redhat.com/show_bug.cgi?id=2270559 https://www.cve.org/CVERecord?id=CVE-2024-22025 https://nvd.nist.gov/vuln/detail/CVE-2024-22025 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22025.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ITpj/wESnpXzi/8j4E382w==&#34;: {&#xA;      &#34;id&#34;: &#34;ITpj/wESnpXzi/8j4E382w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64720&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow flaw has been discovered in libpng. An out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:45:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64720 https://bugzilla.redhat.com/show_bug.cgi?id=2416904 https://www.cve.org/CVERecord?id=CVE-2025-64720 https://nvd.nist.gov/vuln/detail/CVE-2025-64720 https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643 https://github.com/pnggroup/libpng/issues/686 https://github.com/pnggroup/libpng/pull/751 https://github.com/pnggroup/libpng/security/advisories/GHSA-hfc7-ph9c-wcww https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64720.json https://access.redhat.com/errata/RHSA-2026:0238&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IUI8ka2AYA1twZAQi4gL5Q==&#34;: {&#xA;      &#34;id&#34;: &#34;IUI8ka2AYA1twZAQi4gL5Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29409&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service vulnerability was found in the Golang Go package caused by an uncontrolled resource consumption flaw. By persuading a victim to use a specially crafted certificate with large RSA keys, a remote attacker can cause a client/server to expend significant CPU time verifying signatures, resulting in a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29409 https://bugzilla.redhat.com/show_bug.cgi?id=2228743 https://www.cve.org/CVERecord?id=CVE-2023-29409 https://nvd.nist.gov/vuln/detail/CVE-2023-29409 https://go.dev/cl/515257 https://go.dev/issue/61460 https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ https://pkg.go.dev/vuln/GO-2023-1987 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29409.json https://access.redhat.com/errata/RHSA-2023:5738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.13-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IV554NtP1F9KO4IyBit26g==&#34;: {&#xA;      &#34;id&#34;: &#34;IV554NtP1F9KO4IyBit26g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35065&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35065 https://bugzilla.redhat.com/show_bug.cgi?id=2156324 https://www.cve.org/CVERecord?id=CVE-2021-35065 https://nvd.nist.gov/vuln/detail/CVE-2021-35065 https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35065.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IWplUWF011EXddGnkU5Png==&#34;: {&#xA;      &#34;id&#34;: &#34;IWplUWF011EXddGnkU5Png==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-overloading&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:0.02-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IaNq7BGSUI5KW7kcB5RXdQ==&#34;: {&#xA;      &#34;id&#34;: &#34;IaNq7BGSUI5KW7kcB5RXdQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27982&#34;,&#xA;      &#34;description&#34;: &#34;An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27982 https://bugzilla.redhat.com/show_bug.cgi?id=2275392 https://www.cve.org/CVERecord?id=CVE-2024-27982 https://nvd.nist.gov/vuln/detail/CVE-2024-27982 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27982.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IbhdAqkTe4EMzAhoNvBoZw==&#34;: {&#xA;      &#34;id&#34;: &#34;IbhdAqkTe4EMzAhoNvBoZw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29491&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in ncurses and occurs when used by a setuid application. This flaw allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29491 https://bugzilla.redhat.com/show_bug.cgi?id=2191704 https://www.cve.org/CVERecord?id=CVE-2023-29491 https://nvd.nist.gov/vuln/detail/CVE-2023-29491 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29491.json https://access.redhat.com/errata/RHSA-2023:6698&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:6.2-10.20210508.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;: {&#xA;      &#34;id&#34;: &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2673&#34;,&#xA;      &#34;description&#34;: &#34;A key group selection preference flaw has been discovered in OpenSSL. An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the \&#34;DEFAULT\&#34; keyword. A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client&#39;s initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-13T13:23:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2673 https://bugzilla.redhat.com/show_bug.cgi?id=2447327 https://www.cve.org/CVERecord?id=CVE-2026-2673 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://openssl-library.org/news/secadv/20260313.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2673.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IeTK1HBLKpS1+gfVSPrpvg==&#34;: {&#xA;      &#34;id&#34;: &#34;IeTK1HBLKpS1+gfVSPrpvg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-47007&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak was found in function  stab_demangle_v3_arg in stabs.c in Binutils, allows local attacker to exploit the vulnerability using specially crafted file to cause Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-47007 https://bugzilla.redhat.com/show_bug.cgi?id=2233980 https://www.cve.org/CVERecord?id=CVE-2022-47007 https://nvd.nist.gov/vuln/detail/CVE-2022-47007 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47007.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IfJyKZ52fwKruf/mbOKmYg==&#34;: {&#xA;      &#34;id&#34;: &#34;IfJyKZ52fwKruf/mbOKmYg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-57360&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the nm utility of binutils. A local user who specifies the `--without-symbol-versions` option on a specially crafted ELF file can trigger a segmentation fault condition. This may lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-57360 https://bugzilla.redhat.com/show_bug.cgi?id=2339263 https://www.cve.org/CVERecord?id=CVE-2024-57360 https://nvd.nist.gov/vuln/detail/CVE-2024-57360 https://sourceware.org/bugzilla/show_bug.cgi?id=32467 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-57360.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IfZDrkeHpfXHfjHzETuKbw==&#34;: {&#xA;      &#34;id&#34;: &#34;IfZDrkeHpfXHfjHzETuKbw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ih4ScPgmvAttJN/czzciaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Ih4ScPgmvAttJN/czzciaQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ihq7mkhGM9sf/8QM05o7gw==&#34;: {&#xA;      &#34;id&#34;: &#34;Ihq7mkhGM9sf/8QM05o7gw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6277&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6277 https://bugzilla.redhat.com/show_bug.cgi?id=2251311 https://www.cve.org/CVERecord?id=CVE-2023-6277 https://nvd.nist.gov/vuln/detail/CVE-2023-6277 https://gitlab.com/libtiff/libtiff/-/issues/614 https://gitlab.com/libtiff/libtiff/-/merge_requests/545 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6277.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IkLJJWoz7DjiEwkwHd9+Bw==&#34;: {&#xA;      &#34;id&#34;: &#34;IkLJJWoz7DjiEwkwHd9+Bw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2024-2610&#34;,&#xA;      &#34;description&#34;: &#34;Errors returned from JSON marshaling may break template escaping in html/template&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T22:15:40Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/65697 https://go.dev/cl/564196 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.21.8&#34;&#xA;    },&#xA;    &#34;IoeuDKI/vu/XCDGoDKzX3g==&#34;: {&#xA;      &#34;id&#34;: &#34;IoeuDKI/vu/XCDGoDKzX3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-1394&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \&#34;return nil, nil, fail(...)\&#34; pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-1394 https://bugzilla.redhat.com/show_bug.cgi?id=2262921 https://www.cve.org/CVERecord?id=CVE-2024-1394 https://nvd.nist.gov/vuln/detail/CVE-2024-1394 https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136 https://github.com/golang-fips/openssl/security/advisories/GHSA-78hx-gp6g-7mj6 https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f https://pkg.go.dev/vuln/GO-2024-2660 https://vuln.go.dev/ID/GO-2024-2660.json https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-1394.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IqAfwTRGJO3I/HkfDNLMoQ==&#34;: {&#xA;      &#34;id&#34;: &#34;IqAfwTRGJO3I/HkfDNLMoQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31124&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This issue occurs when cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross-compiling aarch64 android. As a result, it will downgrade to rand(), which could allow an attacker to utilize the lack of entropy by not using a CSPRNG.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31124 https://bugzilla.redhat.com/show_bug.cgi?id=2209494 https://www.cve.org/CVERecord?id=CVE-2023-31124 https://nvd.nist.gov/vuln/detail/CVE-2023-31124 https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31124.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;: {&#xA;      &#34;id&#34;: &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system&#39;s `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T22:08:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0915 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://www.cve.org/CVERecord?id=CVE-2026-0915 https://nvd.nist.gov/vuln/detail/CVE-2026-0915 https://sourceware.org/bugzilla/show_bug.cgi?id=33802 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0915.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ira5htRPGofy9veGMRD7Vg==&#34;: {&#xA;      &#34;id&#34;: &#34;Ira5htRPGofy9veGMRD7Vg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23919&#34;,&#xA;      &#34;description&#34;: &#34;A cryptographic vulnerability exists in Node.js \u003c19.2.0, \u003c18.14.1, \u003c16.19.1, \u003c14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23919 https://bugzilla.redhat.com/show_bug.cgi?id=2172170 https://www.cve.org/CVERecord?id=CVE-2023-23919 https://nvd.nist.gov/vuln/detail/CVE-2023-23919 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23919.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IsqBfnAxrh9UbW8oQaSR7w==&#34;: {&#xA;      &#34;id&#34;: &#34;IsqBfnAxrh9UbW8oQaSR7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9287&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been found in the Python `venv` module and CLI. Path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \&#34;activation\&#34; scripts, for example, \&#34;source venv/bin/activate\&#34;. This flaw allows attacker-controlled virtual environments to run commands when the virtual environment is activated.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-10-22T16:34:39Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9287 https://bugzilla.redhat.com/show_bug.cgi?id=2321440 https://www.cve.org/CVERecord?id=CVE-2024-9287 https://nvd.nist.gov/vuln/detail/CVE-2024-9287 https://github.com/python/cpython/issues/124651 https://github.com/python/cpython/pull/124712 https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9287.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ItuvzyMGym4CNyVuxWwH3w==&#34;: {&#xA;      &#34;id&#34;: &#34;ItuvzyMGym4CNyVuxWwH3w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27536&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. Libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, the GSS delegation setting was left out from the configuration match checks, making them match too easily, affecting krb5/kerberos/negotiate/GSSAPI transfers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27536 https://bugzilla.redhat.com/show_bug.cgi?id=2179092 https://www.cve.org/CVERecord?id=CVE-2023-27536 https://nvd.nist.gov/vuln/detail/CVE-2023-27536 https://curl.se/docs/CVE-2023-27536.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27536.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IvL651FnAzrxSYOiOuXMlw==&#34;: {&#xA;      &#34;id&#34;: &#34;IvL651FnAzrxSYOiOuXMlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-47010&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in binutils in the pr_function_type function. This flaw allows an attacker to use a set of steps to trigger a memory leak and perform a denial of service, resulting in a loss of the system&#39;s availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-47010 https://bugzilla.redhat.com/show_bug.cgi?id=2233988 https://www.cve.org/CVERecord?id=CVE-2022-47010 https://nvd.nist.gov/vuln/detail/CVE-2022-47010 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47010.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;: {&#xA;      &#34;id&#34;: &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system&#39;s `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T22:08:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0915 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://www.cve.org/CVERecord?id=CVE-2026-0915 https://nvd.nist.gov/vuln/detail/CVE-2026-0915 https://sourceware.org/bugzilla/show_bug.cgi?id=33802 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0915.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;IzDqrZ8Ru35rI4iCSSk/pw==&#34;: {&#xA;      &#34;id&#34;: &#34;IzDqrZ8Ru35rI4iCSSk/pw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;J+a2wc6cR5fLyNj39ghgVg==&#34;: {&#xA;      &#34;id&#34;: &#34;J+a2wc6cR5fLyNj39ghgVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6119&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6119 https://bugzilla.redhat.com/show_bug.cgi?id=2306158 https://www.cve.org/CVERecord?id=CVE-2024-6119 https://nvd.nist.gov/vuln/detail/CVE-2024-6119 https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6119.json https://access.redhat.com/errata/RHSA-2024:6783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-28.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;J/vqYu1qTz7dsS8oVaCTTw==&#34;: {&#xA;      &#34;id&#34;: &#34;J/vqYu1qTz7dsS8oVaCTTw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-34969&#34;,&#xA;      &#34;description&#34;: &#34;An assertion failure vulnerability was found in D-Bus. This issue occurs when a privileged monitoring connection (dbus-monitor, busctl monitor, gdbus monitor, or similar) is active, and a message from the bus driver cannot be delivered to a client connection due to \u003cdeny\u003e rules or outgoing message quota. If a privileged user with control over the dbus-daemon is monitoring the message bus traffic using the Monitoring clients like the dbus-monitor or busctl monitor interfaces, then an unprivileged local user with the ability to connect to the same dbus-daemon could send specially crafted request, causing a dbus-daemon to crash, resulting in a denial of service under some circumstances.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-34969 https://bugzilla.redhat.com/show_bug.cgi?id=2213166 https://www.cve.org/CVERecord?id=CVE-2023-34969 https://nvd.nist.gov/vuln/detail/CVE-2023-34969 https://gitlab.freedesktop.org/dbus/dbus/-/issues/457 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-34969.json https://access.redhat.com/errata/RHSA-2023:4569&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:1.12.20-7.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;J1MkSCEBivWCQoYUEvHXOw==&#34;: {&#xA;      &#34;id&#34;: &#34;J1MkSCEBivWCQoYUEvHXOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32415&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libxml2 library. A heap-based underflow can be triggered when a crafted XML document is validated against an XML schema with certain identity constraints or when a crafted XML schema is used, causing a crash to the application linked to the library and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32415 https://bugzilla.redhat.com/show_bug.cgi?id=2360768 https://www.cve.org/CVERecord?id=CVE-2025-32415 https://nvd.nist.gov/vuln/detail/CVE-2025-32415 https://gitlab.gnome.org/GNOME/libxml2/-/issues/890 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32415.json https://access.redhat.com/errata/RHSA-2025:13428&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-12.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;J1SK5zSFZI94azX3jybBbw==&#34;: {&#xA;      &#34;id&#34;: &#34;J1SK5zSFZI94azX3jybBbw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27534&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27534 https://bugzilla.redhat.com/show_bug.cgi?id=2179069 https://www.cve.org/CVERecord?id=CVE-2023-27534 https://nvd.nist.gov/vuln/detail/CVE-2023-27534 https://curl.se/docs/CVE-2023-27534.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27534.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;J1cvee8xy6oZDEdA21dqEg==&#34;: {&#xA;      &#34;id&#34;: &#34;J1cvee8xy6oZDEdA21dqEg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46809&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The privateDecrypt() API of the crypto library may allow a covert timing side-channel during PKCS#1 v1.5 padding error handling. This issue revealed significant timing differences in decryption for valid and invalid ciphertexts, which may allow a remote attacker to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing JSON Web Encryption messages.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46809 https://bugzilla.redhat.com/show_bug.cgi?id=2264569 https://www.cve.org/CVERecord?id=CVE-2023-46809 https://nvd.nist.gov/vuln/detail/CVE-2023-46809 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46809.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;J3RGaCFhZHnCvtta/VAJIw==&#34;: {&#xA;      &#34;id&#34;: &#34;J3RGaCFhZHnCvtta/VAJIw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-50602&#34;,&#xA;      &#34;description&#34;: &#34;A security issue was found in Expat (libexpat). A crash can be triggered in the XML_ResumeParser function due to XML_StopParser&#39;s ability to stop or suspend an unstarted parser, which can lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-10-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-50602 https://bugzilla.redhat.com/show_bug.cgi?id=2321987 https://www.cve.org/CVERecord?id=CVE-2024-50602 https://nvd.nist.gov/vuln/detail/CVE-2024-50602 https://github.com/libexpat/libexpat/pull/915 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-50602.json https://access.redhat.com/errata/RHSA-2024:9541&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-3.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;J4ecrOEw69avIhhOznG+2w==&#34;: {&#xA;      &#34;id&#34;: &#34;J4ecrOEw69avIhhOznG+2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22365&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Linux PAM. An unprivileged user that is not yet in a corresponding mount namespace with ~/tmp mounted as a polyinstantiated dir can place a FIFO there, and a subsequent attempt to login as this user with `pam_namespace` configured will cause the `openat()` in `protect_dir()` to block the attempt, causing a local denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22365 https://bugzilla.redhat.com/show_bug.cgi?id=2257722 https://www.cve.org/CVERecord?id=CVE-2024-22365 https://nvd.nist.gov/vuln/detail/CVE-2024-22365 https://www.openwall.com/lists/oss-security/2024/01/18/3 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22365.json https://access.redhat.com/errata/RHSA-2024:2438&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.5.1-19.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;J5i8I5ZRQGDUXQI4WkC0FQ==&#34;: {&#xA;      &#34;id&#34;: &#34;J5i8I5ZRQGDUXQI4WkC0FQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28321&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. An incorrect International Domain Name (IDN) wildcard match may lead to improper certificate validation.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28321 https://bugzilla.redhat.com/show_bug.cgi?id=2196786 https://www.cve.org/CVERecord?id=CVE-2023-28321 https://nvd.nist.gov/vuln/detail/CVE-2023-28321 https://curl.se/docs/CVE-2023-28321.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28321.json https://access.redhat.com/errata/RHSA-2023:4354&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;J6GavUf0zh8+C0zHHTDYfw==&#34;: {&#xA;      &#34;id&#34;: &#34;J6GavUf0zh8+C0zHHTDYfw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-40217&#34;,&#xA;      &#34;description&#34;: &#34;Python ssl.SSLSocket is vulnerable to a bypass of the TLS handshake in certain instances for HTTPS servers and other server-side protocols that use TLS client authentication such as mTLS. This issue may result in a breach of integrity as its possible to modify or delete resources that are authenticated only by a TLS certificate. No breach of confidentiality is possible.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-40217 https://bugzilla.redhat.com/show_bug.cgi?id=2235789 https://www.cve.org/CVERecord?id=CVE-2023-40217 https://nvd.nist.gov/vuln/detail/CVE-2023-40217 https://github.com/python/cpython/issues/108310 https://github.com/python/cpython/pull/108315 https://mail.python.org/archives/list/security-announce@python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-40217.json https://access.redhat.com/errata/RHSA-2023:5462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.16-1.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;J6JEqF6+PkBwS7J9B0Lefw==&#34;: {&#xA;      &#34;id&#34;: &#34;J6JEqF6+PkBwS7J9B0Lefw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21712&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. This vulnerability allows an attacker to cause a Denial of Service (DoS) by providing a malformed Internationalized Domain Name (IDN) to the `url.format()` function. When processed, this malformed input triggers an internal error, causing the Node.js application to crash. This can disrupt services and make them unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T15:13:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21712 https://bugzilla.redhat.com/show_bug.cgi?id=2453037 https://www.cve.org/CVERecord?id=CVE-2026-21712 https://nvd.nist.gov/vuln/detail/CVE-2026-21712 https://hackerone.com/reports/3546390 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21712.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;J9wD9ZF9kAJd1nu03TllBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;J9wD9ZF9kAJd1nu03TllBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2024-2600&#34;,&#xA;      &#34;description&#34;: &#34;Incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T22:15:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/65065 https://go.dev/cl/569340 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.21.8&#34;&#xA;    },&#xA;    &#34;JAlZO0sgdy1FBW5F7Zj+Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;JAlZO0sgdy1FBW5F7Zj+Pg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35388&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability allows for a low integrity impact due to the omission of connection multiplexing confirmation for proxy-mode multiplexing sessions. A local user, under specific and complex conditions requiring user interaction, could potentially establish a multiplexed session without explicit confirmation, leading to unintended data handling.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:57:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35388 https://bugzilla.redhat.com/show_bug.cgi?id=2454500 https://www.cve.org/CVERecord?id=CVE-2026-35388 https://nvd.nist.gov/vuln/detail/CVE-2026-35388 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35388.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JAo3AhiUcpCO3tqtc2i6uQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JAo3AhiUcpCO3tqtc2i6uQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21712&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. This vulnerability allows an attacker to cause a Denial of Service (DoS) by providing a malformed Internationalized Domain Name (IDN) to the `url.format()` function. When processed, this malformed input triggers an internal error, causing the Node.js application to crash. This can disrupt services and make them unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T15:13:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21712 https://bugzilla.redhat.com/show_bug.cgi?id=2453037 https://www.cve.org/CVERecord?id=CVE-2026-21712 https://nvd.nist.gov/vuln/detail/CVE-2026-21712 https://hackerone.com/reports/3546390 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21712.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JBIWl7TA4AzjcNVfFPjHaw==&#34;: {&#xA;      &#34;id&#34;: &#34;JBIWl7TA4AzjcNVfFPjHaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43785&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43785 https://bugzilla.redhat.com/show_bug.cgi?id=2242252 https://www.cve.org/CVERecord?id=CVE-2023-43785 https://nvd.nist.gov/vuln/detail/CVE-2023-43785 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43785.json https://access.redhat.com/errata/RHSA-2024:2145&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JD0llI0bGUOG/VBz+9LeVQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JD0llI0bGUOG/VBz+9LeVQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-48235&#34;,&#xA;      &#34;description&#34;: &#34;A flaw as found in Vim, an open source command line text editor. When parsing relative ex addresses, one may unintentionally cause an overflow. Ironically, this happens in the existing overflow check because the line number becomes negative and LONG_MAX - lnum will cause the overflow. The impact is low because user interaction is required and a crash may not happen in all situations.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-48235 https://bugzilla.redhat.com/show_bug.cgi?id=2250272 https://www.cve.org/CVERecord?id=CVE-2023-48235 https://nvd.nist.gov/vuln/detail/CVE-2023-48235 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/060623e4a3bc72b011e7cd92bedb3bfb64e06200 https://github.com/vim/vim/security/advisories/GHSA-6g74-hr6q-pr8g https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48235.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JDKdFwYwkAoUNrTYp3XIYA==&#34;: {&#xA;      &#34;id&#34;: &#34;JDKdFwYwkAoUNrTYp3XIYA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59375&#34;,&#xA;      &#34;description&#34;: &#34;A memory amplification vulnerability in libexpat allows attackers to trigger excessive dynamic memory allocations by submitting specially crafted XML input. A small input (~250 KiB) can cause the parser to allocate hundreds of megabytes, leading to denial-of-service (DoS) through memory exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59375 https://bugzilla.redhat.com/show_bug.cgi?id=2395108 https://www.cve.org/CVERecord?id=CVE-2025-59375 https://nvd.nist.gov/vuln/detail/CVE-2025-59375 https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2025-59375 https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2025-59375 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59375.json https://access.redhat.com/errata/RHSA-2025:22175&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-5.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JLZyRakMGnyMKNtD6nnqpQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JLZyRakMGnyMKNtD6nnqpQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23916&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. A malicious server can insert an unlimited number of compression steps. This decompression chain could result in out-of-memory errors.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23916 https://bugzilla.redhat.com/show_bug.cgi?id=2167815 https://www.cve.org/CVERecord?id=CVE-2023-23916 https://nvd.nist.gov/vuln/detail/CVE-2023-23916 https://curl.se/docs/CVE-2023-23916.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23916.json https://access.redhat.com/errata/RHSA-2023:1701&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-19.el9_1.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JLdsQ9mzV76+v5Ttq5j2hA==&#34;: {&#xA;      &#34;id&#34;: &#34;JLdsQ9mzV76+v5Ttq5j2hA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4032&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The ipaddress module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. Due to this issue, it is possible that values will not be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4032 https://bugzilla.redhat.com/show_bug.cgi?id=2292921 https://www.cve.org/CVERecord?id=CVE-2024-4032 https://nvd.nist.gov/vuln/detail/CVE-2024-4032 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4032.json https://access.redhat.com/errata/RHSA-2024:4779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JMm3XklIA2t/hFi6HmAXVg==&#34;: {&#xA;      &#34;id&#34;: &#34;JMm3XklIA2t/hFi6HmAXVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2581&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Undici. When the `interceptors.deduplicate()` feature is enabled, response data for deduplicated requests can accumulate in memory. A remote attacker, by sending large or chunked responses and concurrent identical requests from an untrusted endpoint, can exploit this uncontrolled resource consumption. This leads to high memory usage and potential Out-Of-Memory (OOM) process termination, resulting in a Denial of Service (DoS) for the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:13:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2581 https://bugzilla.redhat.com/show_bug.cgi?id=2447140 https://www.cve.org/CVERecord?id=CVE-2026-2581 https://nvd.nist.gov/vuln/detail/CVE-2026-2581 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h https://hackerone.com/reports/3513473 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2581.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JMtxzN1jgVs2Gwo2QsOKnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JMtxzN1jgVs2Gwo2QsOKnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:5738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.13-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JMuZ2WXBBx9rW6/jTPLu0A==&#34;: {&#xA;      &#34;id&#34;: &#34;JMuZ2WXBBx9rW6/jTPLu0A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-22490&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. Using a specially-crafted repository, Git can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source $GIT_DIR/objects directory contains symbolic links (CVE-2022-39253), the objects directory may still be a symbolic link.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-22490 https://bugzilla.redhat.com/show_bug.cgi?id=2168160 https://www.cve.org/CVERecord?id=CVE-2023-22490 https://nvd.nist.gov/vuln/detail/CVE-2023-22490 https://github.blog/2023-02-14-git-security-vulnerabilities-announced-3/ https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-22490.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JQe3P/odATa/OKbzn309dw==&#34;: {&#xA;      &#34;id&#34;: &#34;JQe3P/odATa/OKbzn309dw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8088&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s zipfile module. When iterating over the entries of a zip archive, the process can enter into an infinite loop state and become unresponsive. This flaw allows an attacker to craft a malicious ZIP archive, leading to a denial of service from the application consuming the zipfile module. Only applications that handle user-controlled zip archives are affected by this vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-22T19:15:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-8088 https://bugzilla.redhat.com/show_bug.cgi?id=2307370 https://www.cve.org/CVERecord?id=CVE-2024-8088 https://nvd.nist.gov/vuln/detail/CVE-2024-8088 https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64 https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea https://github.com/python/cpython/issues/122905 https://github.com/python/cpython/pull/122906 https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8088.json https://access.redhat.com/errata/RHSA-2024:9371&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.19-8.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JS6LnmY1PZfE5YxJsCWPPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JS6LnmY1PZfE5YxJsCWPPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32067&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32067 https://bugzilla.redhat.com/show_bug.cgi?id=2209502 https://www.cve.org/CVERecord?id=CVE-2023-32067 https://nvd.nist.gov/vuln/detail/CVE-2023-32067 https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32067.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JS9NNql9cJTDkzzfXyJzDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JS9NNql9cJTDkzzfXyJzDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1255&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security flaw occurs because the AES-XTS cipher decryption implementation for the 64-bit ARM platform contains an issue that could cause it to read past the input buffer, leading to a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1255 https://bugzilla.redhat.com/show_bug.cgi?id=2188461 https://www.cve.org/CVERecord?id=CVE-2023-1255 https://nvd.nist.gov/vuln/detail/CVE-2023-1255 https://www.openssl.org/news/secadv/20230420.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1255.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JSxIEGIOCwboUDoJZgS9fA==&#34;: {&#xA;      &#34;id&#34;: &#34;JSxIEGIOCwboUDoJZgS9fA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-37920&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-37920 https://bugzilla.redhat.com/show_bug.cgi?id=2226586 https://www.cve.org/CVERecord?id=CVE-2023-37920 https://nvd.nist.gov/vuln/detail/CVE-2023-37920 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-37920.json https://access.redhat.com/errata/RHBA-2024:5691&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch|src&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2024.2.69_v8.0.303-91.4.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JTwzSHX5xKxgTtyprecVew==&#34;: {&#xA;      &#34;id&#34;: &#34;JTwzSHX5xKxgTtyprecVew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32002&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This vulnerability allows the malicious manipulation of repositories containing submodules, exploiting a bug that enables the writing of files into the .git/ directory instead of the submodule&#39;s intended worktree. This manipulation facilitates the execution of arbitrary code during the cloning process, bypassing user inspection and control.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32002 https://bugzilla.redhat.com/show_bug.cgi?id=2280421 https://www.cve.org/CVERecord?id=CVE-2024-32002 https://nvd.nist.gov/vuln/detail/CVE-2024-32002 https://github.com/git/git/security/advisories/GHSA-8h77-4q3w-gfgv https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32002.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JVp8gcuEEeRLeKprUvrBUg==&#34;: {&#xA;      &#34;id&#34;: &#34;JVp8gcuEEeRLeKprUvrBUg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0466&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The X509_VERIFY_PARAM_add0_policy() function is documented to enable the certificate policy check when doing certificate verification implicitly. However, implementing the function does not enable the check, allowing certificates with invalid or incorrect policies to pass the certificate verification. Suddenly enabling the policy check could break existing deployments, so it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. The applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0466 https://bugzilla.redhat.com/show_bug.cgi?id=2182565 https://www.cve.org/CVERecord?id=CVE-2023-0466 https://nvd.nist.gov/vuln/detail/CVE-2023-0466 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0466.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JVuTqfPwohmj6ucokgM2sQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JVuTqfPwohmj6ucokgM2sQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-27290&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in ssri package. A malicious string provided by an attacker may lead to Regular Expression Denial of Service (ReDoS). This issue only affects consumers\r\nusing the strict option. The highest threat from this vulnerability is to availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-03-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-27290 https://bugzilla.redhat.com/show_bug.cgi?id=1941471 https://www.cve.org/CVERecord?id=CVE-2021-27290 https://nvd.nist.gov/vuln/detail/CVE-2021-27290 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-27290.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JWrwO52d5SNbcmJ2KpFaJQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JWrwO52d5SNbcmJ2KpFaJQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JXQAkdur2asBQ4qeq789Ew==&#34;: {&#xA;      &#34;id&#34;: &#34;JXQAkdur2asBQ4qeq789Ew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27982&#34;,&#xA;      &#34;description&#34;: &#34;An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27982 https://bugzilla.redhat.com/show_bug.cgi?id=2275392 https://www.cve.org/CVERecord?id=CVE-2024-27982 https://nvd.nist.gov/vuln/detail/CVE-2024-27982 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27982.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JZIEpU7UdEXuAMj6emkt5A==&#34;: {&#xA;      &#34;id&#34;: &#34;JZIEpU7UdEXuAMj6emkt5A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24807&#34;,&#xA;      &#34;description&#34;: &#34;Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24807 https://bugzilla.redhat.com/show_bug.cgi?id=2172204 https://www.cve.org/CVERecord?id=CVE-2023-24807 https://nvd.nist.gov/vuln/detail/CVE-2023-24807 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24807.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JZVeRC2oy93Tv6vLZpVqJQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JZVeRC2oy93Tv6vLZpVqJQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27613&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the gitk application that could lead to unauthorized file modification or data loss.\n\nThis flaw manifests in two primary scenarios:\n- Untrusted Repository Cloning: When a user is tricked into cloning an untrusted Git repository and then uses gitk to visualize it without any additional parameters, any writable file on the user&#39;s system can be arbitrarily created or truncated. Exploitation via this method also requires the Support per-file encoding option to be explicitly enabled in Gitk&#39;s preferences, which is not the default setting.\n- &#39;Show origin of this line&#39; Command: The vulnerability can also be triggered if a user employs the Show origin of this line command within gitk&#39;s main window while viewing a malicious repository. This method does not depend on the Support per-file encoding option being enabled.\n\nThe primary risk is unauthorized file system modification, which could lead to data integrity issues, data loss, or potentially open avenues for further system compromise.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T13:01:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27613 https://bugzilla.redhat.com/show_bug.cgi?id=2379124 https://www.cve.org/CVERecord?id=CVE-2025-27613 https://nvd.nist.gov/vuln/detail/CVE-2025-27613 https://github.com/j6t/gitk/security/advisories/GHSA-f3cw-xrj3-wr2v https://lore.kernel.org/git/xmqq5xg2wrd1.fsf@gitster.g/ https://www.openwall.com/lists/oss-security/2025/07/08/4 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27613.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JZouihQMnG3T6XSUXqYbkA==&#34;: {&#xA;      &#34;id&#34;: &#34;JZouihQMnG3T6XSUXqYbkA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38552&#34;,&#xA;      &#34;description&#34;: &#34;When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to node&#39;s policy implementation, thus effectively disabling the integrity check.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38552 https://bugzilla.redhat.com/show_bug.cgi?id=2244415 https://www.cve.org/CVERecord?id=CVE-2023-38552 https://nvd.nist.gov/vuln/detail/CVE-2023-38552 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38552.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Je7Pxg/aoxf95KynM7XUig==&#34;: {&#xA;      &#34;id&#34;: &#34;Je7Pxg/aoxf95KynM7XUig==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55130&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55130 https://bugzilla.redhat.com/show_bug.cgi?id=2431352 https://www.cve.org/CVERecord?id=CVE-2025-55130 https://nvd.nist.gov/vuln/detail/CVE-2025-55130 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55130.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JeQmbhDl7hbl+0rcJiCpWw==&#34;: {&#xA;      &#34;id&#34;: &#34;JeQmbhDl7hbl+0rcJiCpWw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23085&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23085 https://bugzilla.redhat.com/show_bug.cgi?id=2342618 https://www.cve.org/CVERecord?id=CVE-2025-23085 https://nvd.nist.gov/vuln/detail/CVE-2025-23085 https://nodejs.org/pt/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23085.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.13.1-1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JegoLVJD+r1CNqau++1Vlw==&#34;: {&#xA;      &#34;id&#34;: &#34;JegoLVJD+r1CNqau++1Vlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35937&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35937 https://bugzilla.redhat.com/show_bug.cgi?id=1964125 https://www.cve.org/CVERecord?id=CVE-2021-35937 https://nvd.nist.gov/vuln/detail/CVE-2021-35937 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35937.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-build-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Jek37tQeVdKEwtu+6a9/CA==&#34;: {&#xA;      &#34;id&#34;: &#34;Jek37tQeVdKEwtu+6a9/CA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-53920&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Emacs. Viewing or editing an untrusted Emacs Lisp source code file can cause arbitrary code execution due to unsafe macro expansion when a user has configured elisp-completion-at-point for code completion or has enabled automatic error checking, such as Flymake or Flycheck.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-53920 https://bugzilla.redhat.com/show_bug.cgi?id=2329161 https://www.cve.org/CVERecord?id=CVE-2024-53920 https://nvd.nist.gov/vuln/detail/CVE-2024-53920 https://eshelyaron.com/posts/2024-11-27-emacs-aritrary-code-execution-and-how-to-avoid-it.html https://yhetil.org/emacs/CAFXAjY5f4YfHAtZur1RAqH34UbYU56_t6t2Er0YEh1Sb7-W=hg%40mail.gmail.com/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-53920.json https://access.redhat.com/errata/RHSA-2025:4787&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:27.2-11.el9_5.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JeqcZQqZ6re77qRb9vpAHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JeqcZQqZ6re77qRb9vpAHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39326&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Golang net/http/internal package. This issue may allow a malicious user to send an HTTP request and cause the receiver to read more bytes from network than are in the body (up to 1GiB), causing the receiver to fail reading the response, possibly leading to a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39326 https://bugzilla.redhat.com/show_bug.cgi?id=2253330 https://www.cve.org/CVERecord?id=CVE-2023-39326 https://nvd.nist.gov/vuln/detail/CVE-2023-39326 https://pkg.go.dev/vuln/GO-2023-2382 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39326.json https://access.redhat.com/errata/RHSA-2024:1131&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JfmoxvDj+qKmecssvuGVyA==&#34;: {&#xA;      &#34;id&#34;: &#34;JfmoxvDj+qKmecssvuGVyA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ji6OY1u39nJByKzCNwfpIw==&#34;: {&#xA;      &#34;id&#34;: &#34;Ji6OY1u39nJByKzCNwfpIw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39333&#34;,&#xA;      &#34;description&#34;: &#34;Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39333 https://bugzilla.redhat.com/show_bug.cgi?id=2244418 https://www.cve.org/CVERecord?id=CVE-2023-39333 https://nvd.nist.gov/vuln/detail/CVE-2023-39333 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39333.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JiPLnE3IM4/yPxZ8earXLg==&#34;: {&#xA;      &#34;id&#34;: &#34;JiPLnE3IM4/yPxZ8earXLg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6232&#34;,&#xA;      &#34;description&#34;: &#34;A regular expression denial of service (ReDos) vulnerability was found in Python&#39;s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-03T13:15:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6232 https://bugzilla.redhat.com/show_bug.cgi?id=2309426 https://www.cve.org/CVERecord?id=CVE-2024-6232 https://nvd.nist.gov/vuln/detail/CVE-2024-6232 https://github.com/python/cpython/issues/121285 https://github.com/python/cpython/pull/121286 https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6232.json https://access.redhat.com/errata/RHSA-2024:8446&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JmAt+4wqaQRWn+7jyy1oCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JmAt+4wqaQRWn+7jyy1oCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27363&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in FreeType. In affected versions, an out-of-bounds write condition may be triggered when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value, causing it to wrap around and allocate a heap buffer that is too small. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This issue could result in arbitrary code execution or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-11T13:28:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27363 https://bugzilla.redhat.com/show_bug.cgi?id=2351357 https://www.cve.org/CVERecord?id=CVE-2025-27363 https://nvd.nist.gov/vuln/detail/CVE-2025-27363 https://www.facebook.com/security/advisories/cve-2025-27363 https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27363.json https://access.redhat.com/errata/RHSA-2025:3407&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;freetype&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.10.4-10.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JmKf//IQj2eMVJFTB1Feyw==&#34;: {&#xA;      &#34;id&#34;: &#34;JmKf//IQj2eMVJFTB1Feyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-48234&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, an open source command line text editor. When getting the count for a normal mode z command, it may overflow if large counts are given. The impact is low because user interaction is required and a crash may not happen in all situations.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-48234 https://bugzilla.redhat.com/show_bug.cgi?id=2250271 https://www.cve.org/CVERecord?id=CVE-2023-48234 https://nvd.nist.gov/vuln/detail/CVE-2023-48234 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/58f9befca1fa172068effad7f2ea5a9d6a7b0cca https://github.com/vim/vim/security/advisories/GHSA-59gw-c949-6phq https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48234.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Jo0GiPh7MZcVuLsVDbp7qg==&#34;: {&#xA;      &#34;id&#34;: &#34;Jo0GiPh7MZcVuLsVDbp7qg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-12900&#34;,&#xA;      &#34;description&#34;: &#34;A data integrity error was found in the bzip2 (User-space package) functionality when decompressing. This issue occurs when a user decompresses a particular kind of .bz2 files. A local user could get unexpected results (or corrupted data) as result of decompressing these files.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-15T10:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-12900 https://bugzilla.redhat.com/show_bug.cgi?id=2332075 https://www.cve.org/CVERecord?id=CVE-2019-12900 https://nvd.nist.gov/vuln/detail/CVE-2019-12900 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-12900.json https://access.redhat.com/errata/RHSA-2025:0925&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.0.8-10.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Jq9s0m8iiaLnslijc1N/kw==&#34;: {&#xA;      &#34;id&#34;: &#34;Jq9s0m8iiaLnslijc1N/kw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27533&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27533 https://bugzilla.redhat.com/show_bug.cgi?id=2179062 https://www.cve.org/CVERecord?id=CVE-2023-27533 https://nvd.nist.gov/vuln/detail/CVE-2023-27533 https://curl.se/docs/CVE-2023-27533.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27533.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JqWXvYyB4T300h7KRcWtFA==&#34;: {&#xA;      &#34;id&#34;: &#34;JqWXvYyB4T300h7KRcWtFA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JrT9jqBaZlLgPCS0RLnpPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JrT9jqBaZlLgPCS0RLnpPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47907&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in database/sql. Concurrent queries can produce unexpected results when a query is cancelled during a Scan method call on returned Rows, creating a race condition. This vulnerability allows an attacker who can initiate and cancel queries to trigger this condition, possibly leading to inconsistent data being returned to the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-07T15:25:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47907 https://bugzilla.redhat.com/show_bug.cgi?id=2387083 https://www.cve.org/CVERecord?id=CVE-2025-47907 https://nvd.nist.gov/vuln/detail/CVE-2025-47907 https://go.dev/cl/693735 https://go.dev/issue/74831 https://groups.google.com/g/golang-announce/c/x5MKroML2yM https://pkg.go.dev/vuln/GO-2025-3849 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47907.json https://access.redhat.com/errata/RHSA-2025:13935&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.6-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;: {&#xA;      &#34;id&#34;: &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JsF5ac8+OAOWxsV80iUiIw==&#34;: {&#xA;      &#34;id&#34;: &#34;JsF5ac8+OAOWxsV80iUiIw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-AutoLoader&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:5.74-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JtCpNcg8egZjbdozD9CAJQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JtCpNcg8egZjbdozD9CAJQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JtGggrfMckWn0xvfWBMJJQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JtGggrfMckWn0xvfWBMJJQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2210&#34;,&#xA;      &#34;description&#34;: &#34;Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2210 https://bugzilla.redhat.com/show_bug.cgi?id=2102177 https://www.cve.org/CVERecord?id=CVE-2022-2210 https://nvd.nist.gov/vuln/detail/CVE-2022-2210 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2210.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JvC/rVWSiuNeMXzeTDRZHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JvC/rVWSiuNeMXzeTDRZHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-29087&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in SQLite. This vulnerability allows an attacker to cause an integer overflow via the concat_ws function.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-29087 https://bugzilla.redhat.com/show_bug.cgi?id=2358028 https://www.cve.org/CVERecord?id=CVE-2025-29087 https://nvd.nist.gov/vuln/detail/CVE-2025-29087 https://gist.github.com/ylwango613/a44a29f1ef074fa783e29f04a0afd62a https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-29087.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Jvht/v3kohSHL0Dt4OmS+g==&#34;: {&#xA;      &#34;id&#34;: &#34;Jvht/v3kohSHL0Dt4OmS+g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JwRn6LaXs4DLH+aotGHcIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JwRn6LaXs4DLH+aotGHcIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0522&#34;,&#xA;      &#34;description&#34;: &#34;Stack exhaustion on crafted paths in path/filepath&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-20T17:02:29Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/417066 https://go.googlesource.com/go/+/ac68c6c683409f98250d34ad282b9e1b0c9095ef https://go.dev/issue/53416 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.4&#34;&#xA;    },&#xA;    &#34;Jx8Savf4pVqPTLt8HsgoXA==&#34;: {&#xA;      &#34;id&#34;: &#34;Jx8Savf4pVqPTLt8HsgoXA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-mro&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;K/Jzpgc6xwHh47HFu+S8BQ==&#34;: {&#xA;      &#34;id&#34;: &#34;K/Jzpgc6xwHh47HFu+S8BQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2511&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A malicious client can trigger an uncontrolled memory consumption, resulting in a Denial of Service. This issue occurs due to OpenSSL&#39;s TLSv1.3 session cache going into an incorrect state, leading to it failing to flush properly as it fills. OpenSSL must be configured with the non-default SSL_OP_NO_TICKET option enabled to be vulnerable. This issue only affects TLSv1.3 servers, while TLS clients are not affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2511 https://bugzilla.redhat.com/show_bug.cgi?id=2274020 https://www.cve.org/CVERecord?id=CVE-2024-2511 https://nvd.nist.gov/vuln/detail/CVE-2024-2511 https://www.openssl.org/news/vulnerabilities.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2511.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;K0/KdAmlvzyf53kjXgfoRA==&#34;: {&#xA;      &#34;id&#34;: &#34;K0/KdAmlvzyf53kjXgfoRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3316&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in LibTiff. A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3316 https://bugzilla.redhat.com/show_bug.cgi?id=2216080 https://www.cve.org/CVERecord?id=CVE-2023-3316 https://nvd.nist.gov/vuln/detail/CVE-2023-3316 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3316.json https://access.redhat.com/errata/RHSA-2023:6575&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;K12v1aAHn6bz+NiEB1W7GA==&#34;: {&#xA;      &#34;id&#34;: &#34;K12v1aAHn6bz+NiEB1W7GA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5363&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL in how it processes key and initialization vector (IV) lengths. This issue can lead to potential truncation or overruns during the initialization of some symmetric ciphers. A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. Both truncations and overruns of the key and the IV will produce incorrect results and could, in some cases, trigger a memory exception.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-24T15:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5363 https://bugzilla.redhat.com/show_bug.cgi?id=2243839 https://www.cve.org/CVERecord?id=CVE-2023-5363 https://nvd.nist.gov/vuln/detail/CVE-2023-5363 https://www.openssl.org/news/secadv/20231024.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5363.json https://access.redhat.com/errata/RHSA-2024:0310&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-25.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;K5fLrkou5COixf2q2qhQ5Q==&#34;: {&#xA;      &#34;id&#34;: &#34;K5fLrkou5COixf2q2qhQ5Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4741&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in OpenSSL. Calling the OpenSSL API SSL_free_buffers function may cause memory to be accessed that was previously freed in some situations.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4741 https://bugzilla.redhat.com/show_bug.cgi?id=2283757 https://www.cve.org/CVERecord?id=CVE-2024-4741 https://nvd.nist.gov/vuln/detail/CVE-2024-4741 https://www.openssl.org/news/secadv/20240528.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4741.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;K9Y5KUp7F1q2lsyaUxy23A==&#34;: {&#xA;      &#34;id&#34;: &#34;K9Y5KUp7F1q2lsyaUxy23A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21710&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21710 https://bugzilla.redhat.com/show_bug.cgi?id=2453151 https://www.cve.org/CVERecord?id=CVE-2026-21710 https://nvd.nist.gov/vuln/detail/CVE-2026-21710 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21710.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.2-1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KB8w2g8b8sP5A8+iqhqw8A==&#34;: {&#xA;      &#34;id&#34;: &#34;KB8w2g8b8sP5A8+iqhqw8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. When processing a specially crafted Emacs-style tags file, a heap-based buffer overflow out-of-bounds read vulnerability allows an attacker to trick Vim into reading up to 7 bytes beyond its allocated memory boundary. This could lead to information disclosure or potentially affect the integrity of the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-27T21:58:37Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28418 https://bugzilla.redhat.com/show_bug.cgi?id=2443481 https://www.cve.org/CVERecord?id=CVE-2026-28418 https://nvd.nist.gov/vuln/detail/CVE-2026-28418 https://github.com/vim/vim/commit/f6a7f469a9c0d09e84cd6cb https://github.com/vim/vim/releases/tag/v9.2.0074 https://github.com/vim/vim/security/advisories/GHSA-h4mf-vg97-hj8j https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28418.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KBpYoBBh5AFRsvma/sImeA==&#34;: {&#xA;      &#34;id&#34;: &#34;KBpYoBBh5AFRsvma/sImeA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:5738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.13-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KC4H6WRPkYrWvXb9OC+odg==&#34;: {&#xA;      &#34;id&#34;: &#34;KC4H6WRPkYrWvXb9OC+odg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3164&#34;,&#xA;      &#34;description&#34;: &#34;A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3164 https://bugzilla.redhat.com/show_bug.cgi?id=2213531 https://www.cve.org/CVERecord?id=CVE-2023-3164 https://nvd.nist.gov/vuln/detail/CVE-2023-3164 https://gitlab.com/libtiff/libtiff/-/issues/542 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3164.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KCYwWkMQ7jeCsX2dnrw/9w==&#34;: {&#xA;      &#34;id&#34;: &#34;KCYwWkMQ7jeCsX2dnrw/9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55130&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55130 https://bugzilla.redhat.com/show_bug.cgi?id=2431352 https://www.cve.org/CVERecord?id=CVE-2025-55130 https://nvd.nist.gov/vuln/detail/CVE-2025-55130 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55130.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;: {&#xA;      &#34;id&#34;: &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KEWGfOVGYNjr6kNjpQx0qg==&#34;: {&#xA;      &#34;id&#34;: &#34;KEWGfOVGYNjr6kNjpQx0qg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-25724&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libarchive package. Affected versions of libarchive do not check a strftime return value, which can lead to a denial of service or unspecified other impacts via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-25724 https://bugzilla.redhat.com/show_bug.cgi?id=2349221 https://www.cve.org/CVERecord?id=CVE-2025-25724 https://nvd.nist.gov/vuln/detail/CVE-2025-25724 https://gist.github.com/Ekkosun/a83870ce7f3b7813b9b462a395e8ad92 https://github.com/Ekkosun/pocs/blob/main/bsdtarbug https://github.com/libarchive/libarchive/blob/b439d586f53911c84be5e380445a8a259e19114c/tar/util.c#L751-L752 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-25724.json https://access.redhat.com/errata/RHSA-2025:9431&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-5.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KFwkHKkJGVyJAn2RsW13sw==&#34;: {&#xA;      &#34;id&#34;: &#34;KFwkHKkJGVyJAn2RsW13sw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KHHIjt6Egtc7csaIbQ3mbw==&#34;: {&#xA;      &#34;id&#34;: &#34;KHHIjt6Egtc7csaIbQ3mbw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32778&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. This vulnerability allows an attacker to trigger a NULL pointer dereference in the `setContext` function. This occurs when the system attempts to retry an operation after an out-of-memory condition, which can lead to a Denial of Service (DoS) for the affected application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T07:02:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32778 https://bugzilla.redhat.com/show_bug.cgi?id=2447885 https://www.cve.org/CVERecord?id=CVE-2026-32778 https://nvd.nist.gov/vuln/detail/CVE-2026-32778 https://github.com/libexpat/libexpat/pull/1159 https://github.com/libexpat/libexpat/pull/1163 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32778.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KJGsgMArislsisVXSZHY4A==&#34;: {&#xA;      &#34;id&#34;: &#34;KJGsgMArislsisVXSZHY4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32021&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw allows an unauthenticated attacker to place a repository on their target&#39;s local system that contains symlinks. During the cloning process, Git could be tricked into creating hardlinked arbitrary files into their repository&#39;s objects/ directory, impacting availability and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32021 https://bugzilla.redhat.com/show_bug.cgi?id=2280484 https://www.cve.org/CVERecord?id=CVE-2024-32021 https://nvd.nist.gov/vuln/detail/CVE-2024-32021 https://github.com/git/git/security/advisories/GHSA-mvxm-9j2h-qjx7 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32021.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KM/iKSazFyPeIBezQXviSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;KM/iKSazFyPeIBezQXviSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3517&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the nodejs-minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-02-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3517 https://bugzilla.redhat.com/show_bug.cgi?id=2134609 https://www.cve.org/CVERecord?id=CVE-2022-3517 https://nvd.nist.gov/vuln/detail/CVE-2022-3517 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3517.json https://access.redhat.com/errata/RHSA-2022:8832&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.12.1-1.module+el9.1.0.z+17326+318294bb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KM3euWq+O2CS0VP936TjVg==&#34;: {&#xA;      &#34;id&#34;: &#34;KM3euWq+O2CS0VP936TjVg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-2382&#34;,&#xA;      &#34;description&#34;: &#34;Denial of service via chunk extensions in net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T16:22:36Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/64433 https://go.dev/cl/547335 https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.20.12&#34;&#xA;    },&#xA;    &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;: {&#xA;      &#34;id&#34;: &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KPOfrxBVcu8XVCAYPGVuZA==&#34;: {&#xA;      &#34;id&#34;: &#34;KPOfrxBVcu8XVCAYPGVuZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KQMykeLmRcNMu7v2ZhkQOg==&#34;: {&#xA;      &#34;id&#34;: &#34;KQMykeLmRcNMu7v2ZhkQOg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23085&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23085 https://bugzilla.redhat.com/show_bug.cgi?id=2342618 https://www.cve.org/CVERecord?id=CVE-2025-23085 https://nvd.nist.gov/vuln/detail/CVE-2025-23085 https://nodejs.org/pt/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23085.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.13.1-1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KQxTPw9E6zvhoYRhRJNsGA==&#34;: {&#xA;      &#34;id&#34;: &#34;KQxTPw9E6zvhoYRhRJNsGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35386&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability allows a remote attacker to achieve arbitrary command execution by injecting shell metacharacters into a username provided on the command line. Exploitation requires an untrusted username and a non-default configuration of the &#39;%&#39; character in `ssh_config`.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:44:27Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35386 https://bugzilla.redhat.com/show_bug.cgi?id=2454506 https://www.cve.org/CVERecord?id=CVE-2026-35386 https://nvd.nist.gov/vuln/detail/CVE-2026-35386 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35386.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KTLyj41W+cHfjH/HBrA7BQ==&#34;: {&#xA;      &#34;id&#34;: &#34;KTLyj41W+cHfjH/HBrA7BQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-46822&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow vulnerability was found in libjpeg-turbo in the get_word_rgb_row() function in rdppm.c. The flaw occurs when the PPM reader in libjpeg-turbo mishandles use of the tjLoadImage() function for loading a 16-bit binary PPM file into a grayscale uncompressed image buffer and then loading a 16-bit binary PGM file into an RGB uncompressed image buffer. This flaw allows a remote attacker to persuade a victim to open a specially-crafted file, causing the application to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-46822 https://bugzilla.redhat.com/show_bug.cgi?id=2100044 https://www.cve.org/CVERecord?id=CVE-2021-46822 https://nvd.nist.gov/vuln/detail/CVE-2021-46822 https://exchange.xforce.ibmcloud.com/vulnerabilities/221567 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-46822.json https://access.redhat.com/errata/RHSA-2023:1068&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libjpeg-turbo&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.0.90-6.el9_1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KWqotAAFzFGFp1GIUjXi0g==&#34;: {&#xA;      &#34;id&#34;: &#34;KWqotAAFzFGFp1GIUjXi0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27983&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27983 https://bugzilla.redhat.com/show_bug.cgi?id=2272764 https://www.cve.org/CVERecord?id=CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27983.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KXAIwMyIqS4MKyyyosxjhw==&#34;: {&#xA;      &#34;id&#34;: &#34;KXAIwMyIqS4MKyyyosxjhw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-48385&#34;,&#xA;      &#34;description&#34;: &#34;A bundled uri handling flaw was found in Git. When cloning a repository, Git knows to optionally fetch a bundle advertised by the remote server, which allows the server side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T18:23:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-48385 https://bugzilla.redhat.com/show_bug.cgi?id=2378808 https://www.cve.org/CVERecord?id=CVE-2025-48385 https://nvd.nist.gov/vuln/detail/CVE-2025-48385 https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-48385.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KXzUsn7IGL3ZRMjBL3QOng==&#34;: {&#xA;      &#34;id&#34;: &#34;KXzUsn7IGL3ZRMjBL3QOng==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27534&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27534 https://bugzilla.redhat.com/show_bug.cgi?id=2179069 https://www.cve.org/CVERecord?id=CVE-2023-27534 https://nvd.nist.gov/vuln/detail/CVE-2023-27534 https://curl.se/docs/CVE-2023-27534.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27534.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KYv6PwzjV6/5I33cZ9LUmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;KYv6PwzjV6/5I33cZ9LUmQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2817&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in Vim in the string_quote function in the strings.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2817 https://bugzilla.redhat.com/show_bug.cgi?id=2119043 https://www.cve.org/CVERecord?id=CVE-2022-2817 https://nvd.nist.gov/vuln/detail/CVE-2022-2817 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2817.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ka536JJULCqquJoBCXWh8w==&#34;: {&#xA;      &#34;id&#34;: &#34;Ka536JJULCqquJoBCXWh8w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1525&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \&#34;Content-Length\&#34; and \&#34;content-length\&#34;). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T19:56:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1525 https://bugzilla.redhat.com/show_bug.cgi?id=2447144 https://www.cve.org/CVERecord?id=CVE-2026-1525 https://nvd.nist.gov/vuln/detail/CVE-2026-1525 https://cna.openjsf.org/security-advisories.html https://cwe.mitre.org/data/definitions/444.html https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm https://hackerone.com/reports/3556037 https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1525.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Kcd+UQxBw37KfFkRbn1QXw==&#34;: {&#xA;      &#34;id&#34;: &#34;Kcd+UQxBw37KfFkRbn1QXw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21891&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwritten with user-defined implementations, leading to a filesystem permission model bypass through a path traversal attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21891 https://bugzilla.redhat.com/show_bug.cgi?id=2265720 https://www.cve.org/CVERecord?id=CVE-2024-21891 https://nvd.nist.gov/vuln/detail/CVE-2024-21891 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21891.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KhBWOViCuCZdWqrkDlYvOA==&#34;: {&#xA;      &#34;id&#34;: &#34;KhBWOViCuCZdWqrkDlYvOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KhtP1/ZJ9jcZ6Whijt7vkw==&#34;: {&#xA;      &#34;id&#34;: &#34;KhtP1/ZJ9jcZ6Whijt7vkw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1571&#34;,&#xA;      &#34;description&#34;: &#34;Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T22:31:36Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/57855 https://go.dev/cl/468135 https://go.dev/cl/468295 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.6&#34;&#xA;    },&#xA;    &#34;KlFwXzVoVlebAInsnw41Qw==&#34;: {&#xA;      &#34;id&#34;: &#34;KlFwXzVoVlebAInsnw41Qw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-4010&#34;,&#xA;      &#34;description&#34;: &#34;Insufficient validation of bracketed IPv6 hostnames in net/url&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T21:49:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/75678 https://go.dev/cl/709857 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.8&#34;&#xA;    },&#xA;    &#34;Km0Kj8/PT21DcOVckLYRyA==&#34;: {&#xA;      &#34;id&#34;: &#34;Km0Kj8/PT21DcOVckLYRyA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45290&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was discovered in Go&#39;s net/http standard library package. When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45290 https://bugzilla.redhat.com/show_bug.cgi?id=2268017 https://www.cve.org/CVERecord?id=CVE-2023-45290 https://nvd.nist.gov/vuln/detail/CVE-2023-45290 http://www.openwall.com/lists/oss-security/2024/03/08/4 https://go.dev/cl/569341 https://go.dev/issue/65383 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg https://pkg.go.dev/vuln/GO-2024-2599 https://security.netapp.com/advisory/ntap-20240329-0004 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45290.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ko362Be/IvWvKgd5medxJw==&#34;: {&#xA;      &#34;id&#34;: &#34;Ko362Be/IvWvKgd5medxJw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27142&#34;,&#xA;      &#34;description&#34;: &#34;An input escaping flaw has been discovered in the golang html/template module. Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value \&#34;refresh\&#34;. A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow \&#34;url=\&#34; by setting htmlmetacontenturlescape=0.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:28:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27142 https://bugzilla.redhat.com/show_bug.cgi?id=2445351 https://www.cve.org/CVERecord?id=CVE-2026-27142 https://nvd.nist.gov/vuln/detail/CVE-2026-27142 https://go.dev/cl/752081 https://go.dev/issue/77954 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://pkg.go.dev/vuln/GO-2026-4603 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27142.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Kp6vEAyTjVJyCperHJ2MsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Kp6vEAyTjVJyCperHJ2MsQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29406&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang, where it is vulnerable to HTTP header injection caused by improper content validation of the Host header by the HTTP/1 client. A remote attacker can inject arbitrary HTTP headers by persuading a victim to visit a specially crafted Web page. This flaw allows the attacker to conduct various attacks against the vulnerable system, including Cross-site scripting, cache poisoning, or session hijacking.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29406 https://bugzilla.redhat.com/show_bug.cgi?id=2222167 https://www.cve.org/CVERecord?id=CVE-2023-29406 https://nvd.nist.gov/vuln/detail/CVE-2023-29406 https://groups.google.com/g/golang-announce/c/2q13H6LEEx0 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29406.json https://access.redhat.com/errata/RHSA-2023:5738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.13-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Kqi7XT4SGpqJzglrXFbYsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Kqi7XT4SGpqJzglrXFbYsQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-c++&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;: {&#xA;      &#34;id&#34;: &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5918&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5918 https://bugzilla.redhat.com/show_bug.cgi?id=2370877 https://www.cve.org/CVERecord?id=CVE-2025-5918 https://nvd.nist.gov/vuln/detail/CVE-2025-5918 https://github.com/libarchive/libarchive/pull/2584 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5918.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Kr2KcyJfYQ8J1RDorzTofQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Kr2KcyJfYQ8J1RDorzTofQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69651&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. An attacker could exploit this vulnerability by providing a crafted Executable and Linkable Format (ELF) binary with malformed relocation or symbol data. Processing this malicious binary leads to an invalid pointer free, which triggers memory corruption checks and causes the program to terminate.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69651 https://bugzilla.redhat.com/show_bug.cgi?id=2445299 https://www.cve.org/CVERecord?id=CVE-2025-69651 https://nvd.nist.gov/vuln/detail/CVE-2025-69651 https://sourceware.org/bugzilla/show_bug.cgi?id=33700 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea4bc025abdba85a90e26e13f551c16a44bfa921 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69651.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KsboTEAsiwsdLEKIDivkyA==&#34;: {&#xA;      &#34;id&#34;: &#34;KsboTEAsiwsdLEKIDivkyA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2175&#34;,&#xA;      &#34;description&#34;: &#34;A heap buffer over-read vulnerability was found in Vim&#39;s put_on_cmdline() function of the src/ex_getln.c file. This issue occurs due to invalid memory access when using an expression on the command line. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap buffer overflow that causes an application to crash and corrupt memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2175 https://bugzilla.redhat.com/show_bug.cgi?id=2101293 https://www.cve.org/CVERecord?id=CVE-2022-2175 https://nvd.nist.gov/vuln/detail/CVE-2022-2175 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2175.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Kt6vMl5nXH7V+FrvbEPv5A==&#34;: {&#xA;      &#34;id&#34;: &#34;Kt6vMl5nXH7V+FrvbEPv5A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6020 https://bugzilla.redhat.com/show_bug.cgi?id=2372512 https://www.cve.org/CVERecord?id=CVE-2025-6020 https://nvd.nist.gov/vuln/detail/CVE-2025-6020 https://github.com/linux-pam/linux-pam/security/advisories/GHSA-f9p8-gjr4-j9gx https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6020.json https://access.redhat.com/errata/RHSA-2025:15099&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.5.1-26.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KtIlAO0V0/KiMbIbmHHMGw==&#34;: {&#xA;      &#34;id&#34;: &#34;KtIlAO0V0/KiMbIbmHHMGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31147&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs when /dev/urandom or RtlGenRandom() are unavailable, c-ares will use rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand(), so it will generate predictable output.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31147 https://bugzilla.redhat.com/show_bug.cgi?id=2209501 https://www.cve.org/CVERecord?id=CVE-2023-31147 https://nvd.nist.gov/vuln/detail/CVE-2023-31147 https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31147.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KwXuJ1mZuqgv14dKI+DdIw==&#34;: {&#xA;      &#34;id&#34;: &#34;KwXuJ1mZuqgv14dKI+DdIw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KxS2ZtWgZx0lQavGmel4Wg==&#34;: {&#xA;      &#34;id&#34;: &#34;KxS2ZtWgZx0lQavGmel4Wg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-4013&#34;,&#xA;      &#34;description&#34;: &#34;Panic when validating certificates with DSA public keys in crypto/x509&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T21:50:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/709853 https://go.dev/issue/75675 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.8&#34;&#xA;    },&#xA;    &#34;L+KHKrPvSxZVeDMiWq92vw==&#34;: {&#xA;      &#34;id&#34;: &#34;L+KHKrPvSxZVeDMiWq92vw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27983&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27983 https://bugzilla.redhat.com/show_bug.cgi?id=2272764 https://www.cve.org/CVERecord?id=CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27983.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;L/8naYULbNo7VCB5WzvpDw==&#34;: {&#xA;      &#34;id&#34;: &#34;L/8naYULbNo7VCB5WzvpDw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;L04cc8NCPjDZYnxYDnO5+A==&#34;: {&#xA;      &#34;id&#34;: &#34;L04cc8NCPjDZYnxYDnO5+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-40217&#34;,&#xA;      &#34;description&#34;: &#34;Python ssl.SSLSocket is vulnerable to a bypass of the TLS handshake in certain instances for HTTPS servers and other server-side protocols that use TLS client authentication such as mTLS. This issue may result in a breach of integrity as its possible to modify or delete resources that are authenticated only by a TLS certificate. No breach of confidentiality is possible.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-40217 https://bugzilla.redhat.com/show_bug.cgi?id=2235789 https://www.cve.org/CVERecord?id=CVE-2023-40217 https://nvd.nist.gov/vuln/detail/CVE-2023-40217 https://github.com/python/cpython/issues/108310 https://github.com/python/cpython/pull/108315 https://mail.python.org/archives/list/security-announce@python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-40217.json https://access.redhat.com/errata/RHSA-2023:5462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.16-1.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;L0CRHbX1682QNRh65eVCrA==&#34;: {&#xA;      &#34;id&#34;: &#34;L0CRHbX1682QNRh65eVCrA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27139&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal flaw has been discovered in the golang `os` module. On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:28:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27139 https://bugzilla.redhat.com/show_bug.cgi?id=2445335 https://www.cve.org/CVERecord?id=CVE-2026-27139 https://nvd.nist.gov/vuln/detail/CVE-2026-27139 https://go.dev/cl/749480 https://go.dev/issue/77827 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://pkg.go.dev/vuln/GO-2026-4602 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27139.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;L0O+Qmwnpkk+Rg/VqN7QWA==&#34;: {&#xA;      &#34;id&#34;: &#34;L0O+Qmwnpkk+Rg/VqN7QWA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;L1oZ+rWwTAdhKgF16l3EEA==&#34;: {&#xA;      &#34;id&#34;: &#34;L1oZ+rWwTAdhKgF16l3EEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. This vulnerability allows a remote attacker to inject malicious data into HTTP headers or prematurely end HTTP requests by sending specially crafted input to the `upgrade` option of `client.request()`. This is possible because undici does not properly validate input for invalid header characters, which could lead to unauthorized information disclosure or bypassing of security controls.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:17:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1527 https://bugzilla.redhat.com/show_bug.cgi?id=2447141 https://www.cve.org/CVERecord?id=CVE-2026-1527 https://nvd.nist.gov/vuln/detail/CVE-2026-1527 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq https://hackerone.com/reports/3487198 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1527.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;L2l/2cM7p8mbRx8/RerNPg==&#34;: {&#xA;      &#34;id&#34;: &#34;L2l/2cM7p8mbRx8/RerNPg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38545&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \&#34;let the host resolve the name\&#34; could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38545 https://bugzilla.redhat.com/show_bug.cgi?id=2241933 https://www.cve.org/CVERecord?id=CVE-2023-38545 https://nvd.nist.gov/vuln/detail/CVE-2023-38545 https://curl.se/docs/CVE-2023-38545.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38545.json https://access.redhat.com/errata/RHSA-2023:5763&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;L3Sq7FQbQmRq1R8Dn0eFww==&#34;: {&#xA;      &#34;id&#34;: &#34;L3Sq7FQbQmRq1R8Dn0eFww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35939&#34;,&#xA;      &#34;description&#34;: &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35939 https://bugzilla.redhat.com/show_bug.cgi?id=1964129 https://www.cve.org/CVERecord?id=CVE-2021-35939 https://nvd.nist.gov/vuln/detail/CVE-2021-35939 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35939.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-build-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;L5u3G3ilU8/0RtMpJ7kdKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;L5u3G3ilU8/0RtMpJ7kdKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31130&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs in the ares_inet_net_pton() function, which is vulnerable to a buffer underflow for certain ipv6 addresses. \&#34;0::00:00:00/2\&#34; in particular was found to cause an issue. C-ares only uses this function internally for configuration purposes, which would require an administrator to configure such an address via ares_set_sortlist().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31130 https://bugzilla.redhat.com/show_bug.cgi?id=2209497 https://www.cve.org/CVERecord?id=CVE-2023-31130 https://nvd.nist.gov/vuln/detail/CVE-2023-31130 https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31130.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;L7bRdQbudZhoHiefk8z45A==&#34;: {&#xA;      &#34;id&#34;: &#34;L7bRdQbudZhoHiefk8z45A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-17049&#34;,&#xA;      &#34;description&#34;: &#34;It was found that the Kerberos Key Distribution Center (KDC) delegation feature, Service for User (S4U), did not sufficiently protect the tickets it&#39;s providing from tempering. A malicious, authenticated service principal allowed to delegate could use this flaw to impersonate a non-forwardable user.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-11-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-17049 https://bugzilla.redhat.com/show_bug.cgi?id=2025721 https://www.cve.org/CVERecord?id=CVE-2020-17049 https://nvd.nist.gov/vuln/detail/CVE-2020-17049 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-17049.json https://access.redhat.com/errata/RHSA-2023:2570&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.1-8.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;L8FIUEPJFSQ6xN1TgXR/Yg==&#34;: {&#xA;      &#34;id&#34;: &#34;L8FIUEPJFSQ6xN1TgXR/Yg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35385&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. When the `scp` command is used by a root user to download a file with the legacy protocol option (`-O`) and without preserving original file permissions (`-p`), the downloaded file can be installed with elevated privileges (setuid or setgid). This unexpected behavior could allow a malicious file to execute with higher permissions than intended, posing a security risk through potential privilege escalation.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:30:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35385 https://bugzilla.redhat.com/show_bug.cgi?id=2454469 https://www.cve.org/CVERecord?id=CVE-2026-35385 https://nvd.nist.gov/vuln/detail/CVE-2026-35385 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35385.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;L9hbhq3wsZ5QkKEIo/fhYQ==&#34;: {&#xA;      &#34;id&#34;: &#34;L9hbhq3wsZ5QkKEIo/fhYQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23165&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ReadFileUtf8 internal binding of Node.js. This vulnerability can allow an attacker to cause an application denial of service via repeated file read operations that trigger an unrecoverable memory leak due to a corrupted pointer in the underlying file system binding.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23165 https://bugzilla.redhat.com/show_bug.cgi?id=2367162 https://www.cve.org/CVERecord?id=CVE-2025-23165 https://nvd.nist.gov/vuln/detail/CVE-2025-23165 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23165.json https://access.redhat.com/errata/RHSA-2025:8468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.19.2-1.module+el9.6.0+23146+be9976bd&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LAdEFhGjw+B+5uRqObeXiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;LAdEFhGjw+B+5uRqObeXiQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6129&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in in the POLY1305 MAC (message authentication code) implementation in OpenSSL, affecting applications running on PowerPC CPU-based platforms that utilize vector instructions, and has the potential to corrupt the internal state of these applications. If an attacker can manipulate the utilization of the POLY1305 MAC algorithm, it may lead to the corruption of the application state, resulting in various application-dependent consequences, often resulting in a crash and leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6129 https://bugzilla.redhat.com/show_bug.cgi?id=2257571 https://www.cve.org/CVERecord?id=CVE-2023-6129 https://nvd.nist.gov/vuln/detail/CVE-2023-6129 https://www.openssl.org/news/secadv/20240109.txt https://www.openwall.com/lists/oss-security/2024/01/09/1 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6129.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LBK9PqJKfCEUpttQCyryqw==&#34;: {&#xA;      &#34;id&#34;: &#34;LBK9PqJKfCEUpttQCyryqw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LBzBPjCNeeSOWXyc2o2hnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;LBzBPjCNeeSOWXyc2o2hnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici package for Node.js. Undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If an app has a mechanism that sends multipart requests to an attacker-controlled website, it can leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T17:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22150 https://bugzilla.redhat.com/show_bug.cgi?id=2339176 https://www.cve.org/CVERecord?id=CVE-2025-22150 https://nvd.nist.gov/vuln/detail/CVE-2025-22150 https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113 https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0 https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385 https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975 https://hackerone.com/reports/2913312 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22150.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.13.1-1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LDhDJjeJTHD14xx6vYgQUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;LDhDJjeJTHD14xx6vYgQUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29499&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29499 https://bugzilla.redhat.com/show_bug.cgi?id=2211828 https://www.cve.org/CVERecord?id=CVE-2023-29499 https://nvd.nist.gov/vuln/detail/CVE-2023-29499 https://gitlab.gnome.org/GNOME/glib/-/issues/2794 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29499.json https://access.redhat.com/errata/RHSA-2023:6631&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LElGnvRnV9StufJdr+3D9g==&#34;: {&#xA;      &#34;id&#34;: &#34;LElGnvRnV9StufJdr+3D9g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:11992&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-8.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LFiejdPb02ZvCk9/k6M2OA==&#34;: {&#xA;      &#34;id&#34;: &#34;LFiejdPb02ZvCk9/k6M2OA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31124&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This issue occurs when cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross-compiling aarch64 android. As a result, it will downgrade to rand(), which could allow an attacker to utilize the lack of entropy by not using a CSPRNG.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31124 https://bugzilla.redhat.com/show_bug.cgi?id=2209494 https://www.cve.org/CVERecord?id=CVE-2023-31124 https://nvd.nist.gov/vuln/detail/CVE-2023-31124 https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31124.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LJERbH00ig5nWiqOMKw/Xg==&#34;: {&#xA;      &#34;id&#34;: &#34;LJERbH00ig5nWiqOMKw/Xg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66863&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in BinUtils. Attackers can exploit this vulnerability by providing a specially crafted Portable Executable (PE) file. This can lead to a denial of service, making the affected application unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66863 https://bugzilla.redhat.com/show_bug.cgi?id=2425824 https://www.cve.org/CVERecord?id=CVE-2025-66863 https://nvd.nist.gov/vuln/detail/CVE-2025-66863 https://github.com/caozhzh/CRGF-Vul/blob/main/cxxfilt/crash2.md https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66863.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LKHvKuMU+ZaZN+c9jQoc8A==&#34;: {&#xA;      &#34;id&#34;: &#34;LKHvKuMU+ZaZN+c9jQoc8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-1394&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \&#34;return nil, nil, fail(...)\&#34; pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-1394 https://bugzilla.redhat.com/show_bug.cgi?id=2262921 https://www.cve.org/CVERecord?id=CVE-2024-1394 https://nvd.nist.gov/vuln/detail/CVE-2024-1394 https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136 https://github.com/golang-fips/openssl/security/advisories/GHSA-78hx-gp6g-7mj6 https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f https://pkg.go.dev/vuln/GO-2024-2660 https://vuln.go.dev/ID/GO-2024-2660.json https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-1394.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LKchwuMyQH4TU0LwtP5Jcg==&#34;: {&#xA;      &#34;id&#34;: &#34;LKchwuMyQH4TU0LwtP5Jcg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35385&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. When the `scp` command is used by a root user to download a file with the legacy protocol option (`-O`) and without preserving original file permissions (`-p`), the downloaded file can be installed with elevated privileges (setuid or setgid). This unexpected behavior could allow a malicious file to execute with higher permissions than intended, posing a security risk through potential privilege escalation.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:30:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35385 https://bugzilla.redhat.com/show_bug.cgi?id=2454469 https://www.cve.org/CVERecord?id=CVE-2026-35385 https://nvd.nist.gov/vuln/detail/CVE-2026-35385 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35385.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LLwLKTruTLedHaSTZAzh/g==&#34;: {&#xA;      &#34;id&#34;: &#34;LLwLKTruTLedHaSTZAzh/g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0865&#34;,&#xA;      &#34;description&#34;: &#34;Missing newline filtering has been discovered in Python. User-controlled header names and values containing newlines can allow injecting HTTP headers.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:26:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0865 https://bugzilla.redhat.com/show_bug.cgi?id=2431367 https://www.cve.org/CVERecord?id=CVE-2026-0865 https://nvd.nist.gov/vuln/detail/CVE-2026-0865 https://github.com/python/cpython/issues/143916 https://github.com/python/cpython/pull/143917 https://mail.python.org/archives/list/security-announce@python.org/thread/BJ6QPHNSHJTS3A7CFV6IBMCAP2DWRVNT/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0865.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LMcwA00QGnxriAXkZQIhHw==&#34;: {&#xA;      &#34;id&#34;: &#34;LMcwA00QGnxriAXkZQIhHw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27982&#34;,&#xA;      &#34;description&#34;: &#34;An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27982 https://bugzilla.redhat.com/show_bug.cgi?id=2275392 https://www.cve.org/CVERecord?id=CVE-2024-27982 https://nvd.nist.gov/vuln/detail/CVE-2024-27982 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27982.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LMrJ8zW3vxlqJrvFMbbCGA==&#34;: {&#xA;      &#34;id&#34;: &#34;LMrJ8zW3vxlqJrvFMbbCGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-File-Compare&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.100.600-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LTObsRKzbMcDf7ZCch9lsA==&#34;: {&#xA;      &#34;id&#34;: &#34;LTObsRKzbMcDf7ZCch9lsA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32282&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32282 https://bugzilla.redhat.com/show_bug.cgi?id=2456336 https://www.cve.org/CVERecord?id=CVE-2026-32282 https://nvd.nist.gov/vuln/detail/CVE-2026-32282 https://go.dev/cl/763761 https://go.dev/issue/78293 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4864 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32282.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LTbAvxPwXv/MF/Dqg/sWFw==&#34;: {&#xA;      &#34;id&#34;: &#34;LTbAvxPwXv/MF/Dqg/sWFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6021&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2&#39;s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6021 https://bugzilla.redhat.com/show_bug.cgi?id=2372406 https://www.cve.org/CVERecord?id=CVE-2025-6021 https://nvd.nist.gov/vuln/detail/CVE-2025-6021 https://gitlab.gnome.org/GNOME/libxml2/-/issues/926 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6021.json https://access.redhat.com/errata/RHSA-2025:10699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LULa++Og4kM4JJrQxnZj0w==&#34;: {&#xA;      &#34;id&#34;: &#34;LULa++Og4kM4JJrQxnZj0w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-subs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.03-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LUlesLbzv1yf48cLqYDxTg==&#34;: {&#xA;      &#34;id&#34;: &#34;LUlesLbzv1yf48cLqYDxTg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30581&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been discovered in Node.js,  where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30581 https://bugzilla.redhat.com/show_bug.cgi?id=2219824 https://www.cve.org/CVERecord?id=CVE-2023-30581 https://nvd.nist.gov/vuln/detail/CVE-2023-30581 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30581.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.1.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LVK2sPVncIeKs9ALN+mPDg==&#34;: {&#xA;      &#34;id&#34;: &#34;LVK2sPVncIeKs9ALN+mPDg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59465&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been discovered in NodeJS. A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59465 https://bugzilla.redhat.com/show_bug.cgi?id=2431349 https://www.cve.org/CVERecord?id=CVE-2025-59465 https://nvd.nist.gov/vuln/detail/CVE-2025-59465 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59465.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LVwzv4Idra62FxSa6vFC9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;LVwzv4Idra62FxSa6vFC9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability in Node.js HTTP/2 servers by sending specially crafted WINDOW_UPDATE frames on stream 0 (connection-level). These frames can cause the flow control window to exceed its maximum value, leading to a memory leak as Http2Session objects are not properly cleaned up. This can result in resource exhaustion and a Denial of Service (DoS) condition for the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21714 https://bugzilla.redhat.com/show_bug.cgi?id=2453161 https://www.cve.org/CVERecord?id=CVE-2026-21714 https://nvd.nist.gov/vuln/detail/CVE-2026-21714 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21714.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LXj+7NB7elh/3U/gcE77cw==&#34;: {&#xA;      &#34;id&#34;: &#34;LXj+7NB7elh/3U/gcE77cw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3570&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in Libtiff&#39;s tiffcrop utility. This issue occurs during the conversion of a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes an out-of-bound access resulting an application crash, eventually leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-02-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3570 https://bugzilla.redhat.com/show_bug.cgi?id=2142734 https://www.cve.org/CVERecord?id=CVE-2022-3570 https://nvd.nist.gov/vuln/detail/CVE-2022-3570 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3570.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Lc5MrJdT06D8uHMkpa1+Og==&#34;: {&#xA;      &#34;id&#34;: &#34;Lc5MrJdT06D8uHMkpa1+Og==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66861&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted PE file with cxxfilt can trigger an out-of-bounds read in the d_unqualified_name function in the cp-demangle.c file, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66861 https://bugzilla.redhat.com/show_bug.cgi?id=2425823 https://www.cve.org/CVERecord?id=CVE-2025-66861 https://nvd.nist.gov/vuln/detail/CVE-2025-66861 https://github.com/caozhzh/CRGF-Vul/blob/main/cxxfilt/crash1.md https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66861.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Lc7NiV76Y8Ubl6+6Vgd+sw==&#34;: {&#xA;      &#34;id&#34;: &#34;Lc7NiV76Y8Ubl6+6Vgd+sw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0464&#34;,&#xA;      &#34;description&#34;: &#34;A security vulnerability has been identified in all supported OpenSSL versions related to verifying X.509 certificate chains that include policy constraints. This flaw allows attackers to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial of service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the -policy&#39; argument to the command line utilities or calling the X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0464 https://bugzilla.redhat.com/show_bug.cgi?id=2181082 https://www.cve.org/CVERecord?id=CVE-2023-0464 https://nvd.nist.gov/vuln/detail/CVE-2023-0464 https://www.openssl.org/news/secadv/20230322.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0464.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LcEYljn+QTWUC36NwQCf7w==&#34;: {&#xA;      &#34;id&#34;: &#34;LcEYljn+QTWUC36NwQCf7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Lcg+9plLPEAo58BHKBlIGw==&#34;: {&#xA;      &#34;id&#34;: &#34;Lcg+9plLPEAo58BHKBlIGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43787&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43787 https://bugzilla.redhat.com/show_bug.cgi?id=2242254 https://www.cve.org/CVERecord?id=CVE-2023-43787 https://nvd.nist.gov/vuln/detail/CVE-2023-43787 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43787.json https://access.redhat.com/errata/RHSA-2024:2145&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LczpEojKeJQxs4tAiPNubw==&#34;: {&#xA;      &#34;id&#34;: &#34;LczpEojKeJQxs4tAiPNubw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29402&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program that uses cgo. This can occur when running an untrusted module that contains directories with newline characters in their names. Modules that are retrieved using the go command, for example, via \&#34;go get\&#34;, are not affected. Modules retrieved using GOPATH-mode, for example, GO111MODULE=off may be affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29402 https://bugzilla.redhat.com/show_bug.cgi?id=2217562 https://www.cve.org/CVERecord?id=CVE-2023-29402 https://nvd.nist.gov/vuln/detail/CVE-2023-29402 https://go.dev/cl/501226 https://go.dev/issue/60167 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1839 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29402.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LdefrT414pk0XLw3PJpgwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;LdefrT414pk0XLw3PJpgwQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21710&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21710 https://bugzilla.redhat.com/show_bug.cgi?id=2453151 https://www.cve.org/CVERecord?id=CVE-2026-21710 https://nvd.nist.gov/vuln/detail/CVE-2026-21710 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21710.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.2-1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ldf0SBs4F44XtkmDr6o4kQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Ldf0SBs4F44XtkmDr6o4kQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12243&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12243 https://bugzilla.redhat.com/show_bug.cgi?id=2344615 https://www.cve.org/CVERecord?id=CVE-2024-12243 https://nvd.nist.gov/vuln/detail/CVE-2024-12243 https://gitlab.com/gnutls/gnutls/-/issues/1553 https://gitlab.com/gnutls/libtasn1/-/issues/52 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12243.json https://access.redhat.com/errata/RHSA-2025:7076&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-6.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LeWRqc+lggRL8KnG53e6CA==&#34;: {&#xA;      &#34;id&#34;: &#34;LeWRqc+lggRL8KnG53e6CA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Lex02lwAwiaMkFn9DV9FuA==&#34;: {&#xA;      &#34;id&#34;: &#34;Lex02lwAwiaMkFn9DV9FuA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LiT2UIJJCX7RQxuKZd5BaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;LiT2UIJJCX7RQxuKZd5BaQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43804&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn&#39;t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn&#39;t disable redirects explicitly.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43804 https://bugzilla.redhat.com/show_bug.cgi?id=2242493 https://www.cve.org/CVERecord?id=CVE-2023-43804 https://nvd.nist.gov/vuln/detail/CVE-2023-43804 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43804.json https://access.redhat.com/errata/RHSA-2024:0464&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-urllib3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.26.5-3.el9_3.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LkG+n79mbPHrPl1sC2ee1w==&#34;: {&#xA;      &#34;id&#34;: &#34;LkG+n79mbPHrPl1sC2ee1w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28863&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in ISAACS&#39;s node-tar, where it is vulnerable to a denial of service, caused by the lack of folder count validation. The vulnerability exists due to the application not properly controlling the consumption of internal resources while parsing a tar file. By sending a specially crafted request, a remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28863 https://bugzilla.redhat.com/show_bug.cgi?id=2293200 https://www.cve.org/CVERecord?id=CVE-2024-28863 https://nvd.nist.gov/vuln/detail/CVE-2024-28863 https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36 https://security.netapp.com/advisory/ntap-20240524-0005/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28863.json https://access.redhat.com/errata/RHSA-2024:6147&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.4-1.module+el9.4.0+22195+c221878e&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LkJjju2s50oKpBRyBT8s0A==&#34;: {&#xA;      &#34;id&#34;: &#34;LkJjju2s50oKpBRyBT8s0A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-41965&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Vim versions before 9.1.0648 that can cause the program to crash. This issue happens when a user abandons a modified file, and Vim tries to save it as an Untitled file. Due to a mistake in handling this process, Vim accidentally tries to free up memory twice, which can lead to problems, causing the program to crash. This issue can be exploited by someone with local access to the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-01T22:21:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-41965 https://bugzilla.redhat.com/show_bug.cgi?id=2302419 https://www.cve.org/CVERecord?id=CVE-2024-41965 https://nvd.nist.gov/vuln/detail/CVE-2024-41965 https://github.com/vim/vim/commit/b29f4abcd4b3382fa746edd1d0562b7b48c https://github.com/vim/vim/security/advisories/GHSA-46pw-v7qw-xc2f https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41965.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LlIx9R1y9EWEYmMjr1l1rw==&#34;: {&#xA;      &#34;id&#34;: &#34;LlIx9R1y9EWEYmMjr1l1rw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25193&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found HarfBuzz. This flaw allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25193 https://bugzilla.redhat.com/show_bug.cgi?id=2167254 https://www.cve.org/CVERecord?id=CVE-2023-25193 https://nvd.nist.gov/vuln/detail/CVE-2023-25193 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25193.json https://access.redhat.com/errata/RHSA-2024:2410&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;harfbuzz&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.7.4-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LmpJ6GJi47QcNT9dtXcmiA==&#34;: {&#xA;      &#34;id&#34;: &#34;LmpJ6GJi47QcNT9dtXcmiA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47906&#34;,&#xA;      &#34;description&#34;: &#34;A path handling flaw has been discovered in the os/exec go package. If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\&#34;\&#34;, \&#34;.\&#34;, and \&#34;..\&#34;), can result in the binaries listed in the PATH being unexpectedly returned.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-18T18:41:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47906 https://bugzilla.redhat.com/show_bug.cgi?id=2396546 https://www.cve.org/CVERecord?id=CVE-2025-47906 https://nvd.nist.gov/vuln/detail/CVE-2025-47906 https://go.dev/cl/691775 https://go.dev/issue/74466 https://groups.google.com/g/golang-announce/c/x5MKroML2yM https://pkg.go.dev/vuln/GO-2025-3956 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47906.json https://access.redhat.com/errata/RHSA-2025:13935&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.6-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Lr5d+BjmGHyC+AWnFQJRTA==&#34;: {&#xA;      &#34;id&#34;: &#34;Lr5d+BjmGHyC+AWnFQJRTA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8291&#34;,&#xA;      &#34;description&#34;: &#34;A zip file handling flaw has been discovered in the python standard library `zipfile` module. The &#39;zipfile&#39; module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the &#39;zipfile&#39; module compared to other ZIP implementations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-07T18:10:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8291 https://bugzilla.redhat.com/show_bug.cgi?id=2402342 https://www.cve.org/CVERecord?id=CVE-2025-8291 https://nvd.nist.gov/vuln/detail/CVE-2025-8291 https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267 https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6 https://github.com/python/cpython/issues/139700 https://github.com/python/cpython/pull/139702 https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8291.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Lsd0oY+cRz3Y5y3+G6CYMA==&#34;: {&#xA;      &#34;id&#34;: &#34;Lsd0oY+cRz3Y5y3+G6CYMA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24789&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. The ZIP implementation of the Go language archive/zip library behaves differently than the rest of the ZIP file format implementations. When handling ZIP files with a corrupted central directory record, the library skips over the invalid record and processes the next valid one. This flaw allows a malicious user to access hidden information or files inside maliciously crafted ZIP files.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24789 https://bugzilla.redhat.com/show_bug.cgi?id=2292668 https://www.cve.org/CVERecord?id=CVE-2024-24789 https://nvd.nist.gov/vuln/detail/CVE-2024-24789 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24789.json https://access.redhat.com/errata/RHSA-2024:4212&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.11-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13151&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtasn1. A remote attacker could exploit a stack-based buffer overflow vulnerability in the `asn1_expend_octet_string` function. This occurs due to a failure in validating the size of input data. Successful exploitation can lead to a Denial of Service (DoS) condition, making the affected system or application unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T21:14:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13151 https://bugzilla.redhat.com/show_bug.cgi?id=2427698 https://www.cve.org/CVERecord?id=CVE-2025-13151 https://nvd.nist.gov/vuln/detail/CVE-2025-13151 https://gitlab.com/gnutls/libtasn1 https://gitlab.com/gnutls/libtasn1/-/merge_requests/121 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13151.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Lv181AfOrKwIP+rlrdVs2A==&#34;: {&#xA;      &#34;id&#34;: &#34;Lv181AfOrKwIP+rlrdVs2A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21716&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. An incomplete security fix allows code operating under restricted file system write permissions to bypass these limitations. This vulnerability enables the modification of file permissions and ownership on already-open files, even when explicit write access is denied. Such a bypass could lead to unauthorized changes to system files.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21716 https://bugzilla.redhat.com/show_bug.cgi?id=2453157 https://www.cve.org/CVERecord?id=CVE-2026-21716 https://nvd.nist.gov/vuln/detail/CVE-2026-21716 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21716.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LvLSBTmw++OZNe7y3SPjew==&#34;: {&#xA;      &#34;id&#34;: &#34;LvLSBTmw++OZNe7y3SPjew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22695&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a reference library for processing PNG (Portable Network Graphics) image files. A local attacker could exploit a heap buffer over-read vulnerability in the `png_image_finish_read` function by tricking a user into processing a specially crafted interlaced 16-bit PNG file with an 8-bit output format and non-minimal row stride. This could lead to a denial of service (DoS) and potentially information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T22:55:40Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22695 https://bugzilla.redhat.com/show_bug.cgi?id=2428825 https://www.cve.org/CVERecord?id=CVE-2026-22695 https://nvd.nist.gov/vuln/detail/CVE-2026-22695 https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea https://github.com/pnggroup/libpng/commit/e4f7ad4ea2 https://github.com/pnggroup/libpng/issues/778 https://github.com/pnggroup/libpng/security/advisories/GHSA-mmq5-27w3-rxpp https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22695.json https://access.redhat.com/errata/RHSA-2026:3405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Lw4KgrwWujzRmDjtibR3+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Lw4KgrwWujzRmDjtibR3+Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-40217&#34;,&#xA;      &#34;description&#34;: &#34;Python ssl.SSLSocket is vulnerable to a bypass of the TLS handshake in certain instances for HTTPS servers and other server-side protocols that use TLS client authentication such as mTLS. This issue may result in a breach of integrity as its possible to modify or delete resources that are authenticated only by a TLS certificate. No breach of confidentiality is possible.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-40217 https://bugzilla.redhat.com/show_bug.cgi?id=2235789 https://www.cve.org/CVERecord?id=CVE-2023-40217 https://nvd.nist.gov/vuln/detail/CVE-2023-40217 https://github.com/python/cpython/issues/108310 https://github.com/python/cpython/pull/108315 https://mail.python.org/archives/list/security-announce@python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-40217.json https://access.redhat.com/errata/RHSA-2023:5462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.16-1.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;: {&#xA;      &#34;id&#34;: &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LyEH4RIrJnMwmS9bxL322w==&#34;: {&#xA;      &#34;id&#34;: &#34;LyEH4RIrJnMwmS9bxL322w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4673&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in net/http. Handling Proxy-Authorization and Proxy-Authenticate headers during cross-origin redirects allows these headers to be inadvertently forwarded, potentially exposing sensitive authentication credentials. This flaw allows a network-based attacker to manipulate redirect responses, unintentionally exposing authentication details to unauthorized parties.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T16:42:53Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4673 https://bugzilla.redhat.com/show_bug.cgi?id=2373305 https://www.cve.org/CVERecord?id=CVE-2025-4673 https://nvd.nist.gov/vuln/detail/CVE-2025-4673 https://go.dev/cl/679257 https://go.dev/issue/73816 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A https://pkg.go.dev/vuln/GO-2025-3751 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4673.json https://access.redhat.com/errata/RHSA-2025:10676&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.4-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LyQcB6aDtcDf3FmzBVHSKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;LyQcB6aDtcDf3FmzBVHSKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ld linker utility of GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-10T16:31:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1150 https://bugzilla.redhat.com/show_bug.cgi?id=2344681 https://www.cve.org/CVERecord?id=CVE-2025-1150 https://nvd.nist.gov/vuln/detail/CVE-2025-1150 https://sourceware.org/bugzilla/attachment.cgi?id=15887 https://sourceware.org/bugzilla/show_bug.cgi?id=32576 https://vuldb.com/?ctiid.295054 https://vuldb.com/?id.295054 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1150.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;M0WxNlBrWr1WR0ACcsFS3w==&#34;: {&#xA;      &#34;id&#34;: &#34;M0WxNlBrWr1WR0ACcsFS3w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32681&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python-requests package, where it is vulnerable to potentially leaking Proxy-Authorization headers to destination servers, specifically during redirects to an HTTPS origin. This is a product of how rebuild_proxies is used to recompute and reattach the Proxy-Authorization header to requests when redirected. This behavior only affects proxied requests when credentials are supplied in the URL user information component (for example, https://username:password@proxy:8080).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32681 https://bugzilla.redhat.com/show_bug.cgi?id=2209469 https://www.cve.org/CVERecord?id=CVE-2023-32681 https://nvd.nist.gov/vuln/detail/CVE-2023-32681 https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32681.json https://access.redhat.com/errata/RHSA-2023:4350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-requests&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.25.1-7.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;M1Z06nydk707qbRpFiKmaA==&#34;: {&#xA;      &#34;id&#34;: &#34;M1Z06nydk707qbRpFiKmaA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27535&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. Libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, several FTP settings were left out from the configuration match checks, making them match too easily. The problematic settings are `CURLOPT_FTP_ACCOUNT`, `CURLOPT_FTP_ALTERNATIVE_TO_USER`, `CURLOPT_FTP_SSL_CCC` and `CURLOPT_USE_SSL` level.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27535 https://bugzilla.redhat.com/show_bug.cgi?id=2179073 https://www.cve.org/CVERecord?id=CVE-2023-27535 https://nvd.nist.gov/vuln/detail/CVE-2023-27535 https://curl.se/docs/CVE-2023-27535.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27535.json https://access.redhat.com/errata/RHSA-2023:2650&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28388&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a malformed delta Certificate Revocation List (CRL) that lacks a required CRL Number extension, a NULL pointer dereference can occur. This vulnerability can be exploited by a remote attacker who provides a specially crafted delta CRL to an application that has delta CRL processing enabled, leading to a Denial of Service (DoS) for the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28388 https://bugzilla.redhat.com/show_bug.cgi?id=2451097 https://www.cve.org/CVERecord?id=CVE-2026-28388 https://nvd.nist.gov/vuln/detail/CVE-2026-28388 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28388.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;M3xoPIiF+fvDRyYkizrMWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;M3xoPIiF+fvDRyYkizrMWQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1255&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security flaw occurs because the AES-XTS cipher decryption implementation for the 64-bit ARM platform contains an issue that could cause it to read past the input buffer, leading to a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1255 https://bugzilla.redhat.com/show_bug.cgi?id=2188461 https://www.cve.org/CVERecord?id=CVE-2023-1255 https://nvd.nist.gov/vuln/detail/CVE-2023-1255 https://www.openssl.org/news/secadv/20230420.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1255.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;M4/opsM/3qe/3m0zjGkItQ==&#34;: {&#xA;      &#34;id&#34;: &#34;M4/opsM/3qe/3m0zjGkItQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31124&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This issue occurs when cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross-compiling aarch64 android. As a result, it will downgrade to rand(), which could allow an attacker to utilize the lack of entropy by not using a CSPRNG.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31124 https://bugzilla.redhat.com/show_bug.cgi?id=2209494 https://www.cve.org/CVERecord?id=CVE-2023-31124 https://nvd.nist.gov/vuln/detail/CVE-2023-31124 https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31124.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.3-1.16.19.1.2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;M5aJiMv2/MaWINKfor0BrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;M5aJiMv2/MaWINKfor0BrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27535&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. Libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, several FTP settings were left out from the configuration match checks, making them match too easily. The problematic settings are `CURLOPT_FTP_ACCOUNT`, `CURLOPT_FTP_ALTERNATIVE_TO_USER`, `CURLOPT_FTP_SSL_CCC` and `CURLOPT_USE_SSL` level.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27535 https://bugzilla.redhat.com/show_bug.cgi?id=2179073 https://www.cve.org/CVERecord?id=CVE-2023-27535 https://nvd.nist.gov/vuln/detail/CVE-2023-27535 https://curl.se/docs/CVE-2023-27535.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27535.json https://access.redhat.com/errata/RHSA-2023:2650&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;M9nh4Ryt6GwPUlLoItHqnA==&#34;: {&#xA;      &#34;id&#34;: &#34;M9nh4Ryt6GwPUlLoItHqnA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7592&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `http.cookies` module in the Python package. When parsing cookies that contain backslashes, under certain circumstances, the module uses an algorithm with quadratic complexity, leading to excessive CPU consumption.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7592 https://bugzilla.redhat.com/show_bug.cgi?id=2305879 https://www.cve.org/CVERecord?id=CVE-2024-7592 https://nvd.nist.gov/vuln/detail/CVE-2024-7592 https://github.com/python/cpython/issues/123067 https://github.com/python/cpython/pull/123075 https://mail.python.org/archives/list/security-announce@python.org/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7592.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MEP8FBVAfPt6fwJRFfcI5w==&#34;: {&#xA;      &#34;id&#34;: &#34;MEP8FBVAfPt6fwJRFfcI5w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21717&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in V8&#39;s string hashing mechanism within Node.js. A remote attacker can exploit this vulnerability by crafting requests containing integer-like strings. These specially crafted strings cause predictable hash collisions in V8&#39;s internal string table, particularly when processed by functions like JSON.parse() on attacker-controlled input. This can significantly degrade the performance of the Node.js process, leading to a Denial of Service (DoS) condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21717 https://bugzilla.redhat.com/show_bug.cgi?id=2453162 https://www.cve.org/CVERecord?id=CVE-2026-21717 https://nvd.nist.gov/vuln/detail/CVE-2026-21717 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21717.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MGoFQMcsriBEPanvv9LYcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;MGoFQMcsriBEPanvv9LYcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27613&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the gitk application that could lead to unauthorized file modification or data loss.\n\nThis flaw manifests in two primary scenarios:\n- Untrusted Repository Cloning: When a user is tricked into cloning an untrusted Git repository and then uses gitk to visualize it without any additional parameters, any writable file on the user&#39;s system can be arbitrarily created or truncated. Exploitation via this method also requires the Support per-file encoding option to be explicitly enabled in Gitk&#39;s preferences, which is not the default setting.\n- &#39;Show origin of this line&#39; Command: The vulnerability can also be triggered if a user employs the Show origin of this line command within gitk&#39;s main window while viewing a malicious repository. This method does not depend on the Support per-file encoding option being enabled.\n\nThe primary risk is unauthorized file system modification, which could lead to data integrity issues, data loss, or potentially open avenues for further system compromise.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T13:01:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27613 https://bugzilla.redhat.com/show_bug.cgi?id=2379124 https://www.cve.org/CVERecord?id=CVE-2025-27613 https://nvd.nist.gov/vuln/detail/CVE-2025-27613 https://github.com/j6t/gitk/security/advisories/GHSA-f3cw-xrj3-wr2v https://lore.kernel.org/git/xmqq5xg2wrd1.fsf@gitster.g/ https://www.openwall.com/lists/oss-security/2025/07/08/4 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27613.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MIaYLvbJRWXm7UR3+CJ1PA==&#34;: {&#xA;      &#34;id&#34;: &#34;MIaYLvbJRWXm7UR3+CJ1PA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66864&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted PE file with cxxfilt can trigger a NULL pointer dereference in the d_print_comp_inner function in the cp-demangle.c file, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66864 https://bugzilla.redhat.com/show_bug.cgi?id=2425827 https://www.cve.org/CVERecord?id=CVE-2025-66864 https://nvd.nist.gov/vuln/detail/CVE-2025-66864 https://github.com/caozhzh/CRGF-Vul/blob/main/cxxfilt/crash5.md https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66864.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MIr3rO85X7uqJgFm0U3O8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;MIr3rO85X7uqJgFm0U3O8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MJtIM09Jw6pIepBEcf4LwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;MJtIM09Jw6pIepBEcf4LwQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25881&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25881 https://bugzilla.redhat.com/show_bug.cgi?id=2165824 https://www.cve.org/CVERecord?id=CVE-2022-25881 https://nvd.nist.gov/vuln/detail/CVE-2022-25881 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25881.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MLyBE3p9/9+LMOMl2JBi6w==&#34;: {&#xA;      &#34;id&#34;: &#34;MLyBE3p9/9+LMOMl2JBi6w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2343&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow was found in Vim in the ins_compl_add function in the insexpand.c file. This issue occurs due to a read past the end of a buffer when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2343 https://bugzilla.redhat.com/show_bug.cgi?id=2106779 https://www.cve.org/CVERecord?id=CVE-2022-2343 https://nvd.nist.gov/vuln/detail/CVE-2022-2343 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2343.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MMLwOzBcCET4jaa3dPuTwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;MMLwOzBcCET4jaa3dPuTwQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-38533&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the strip utility of binutils. An attacker able to convince a victim to process a specially crafted COFF file by the strip utility can lead to a heap-based buffer overflow, causing the utility to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-38533 https://bugzilla.redhat.com/show_bug.cgi?id=2124569 https://www.cve.org/CVERecord?id=CVE-2022-38533 https://nvd.nist.gov/vuln/detail/CVE-2022-38533 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-38533.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MOUExK9O9qzIs9ukHaS2ew==&#34;: {&#xA;      &#34;id&#34;: &#34;MOUExK9O9qzIs9ukHaS2ew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-48795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the SSH channel integrity. By manipulating sequence numbers during the handshake, an attacker can remove the initial messages on the secure channel without causing a MAC failure. For example, an attacker could disable the ping extension and thus disable the new countermeasure in OpenSSH 9.5 against keystroke timing attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-48795 https://bugzilla.redhat.com/show_bug.cgi?id=2254210 https://www.cve.org/CVERecord?id=CVE-2023-48795 https://nvd.nist.gov/vuln/detail/CVE-2023-48795 https://access.redhat.com/solutions/7071748 https://terrapin-attack.com/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48795.json https://access.redhat.com/errata/RHSA-2024:1130&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-34.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MS7UYZB0gpv9XnBQo9QJdA==&#34;: {&#xA;      &#34;id&#34;: &#34;MS7UYZB0gpv9XnBQo9QJdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4647&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU Binutils BFD library, a widely used component for handling binary files such as object files and executables. The issue occurs when processing specially crafted XCOFF object files, where a relocation type value is not properly validated before being used. This can cause the program to read memory outside of intended bounds. As a result, affected tools may crash or expose unintended memory contents, leading to denial-of-service or limited information disclosure risks.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4647 https://bugzilla.redhat.com/show_bug.cgi?id=2450302 https://www.cve.org/CVERecord?id=CVE-2026-4647 https://nvd.nist.gov/vuln/detail/CVE-2026-4647 https://sourceware.org/bugzilla/show_bug.cgi?id=33919 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4647.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4046&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. A remote attacker could exploit this vulnerability by providing specially crafted inputs using the IBM1390 or IBM1399 character sets to the `iconv()` function. This could lead to an assertion failure, causing the application to crash and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T17:16:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4046 https://bugzilla.redhat.com/show_bug.cgi?id=2453117 https://www.cve.org/CVERecord?id=CVE-2026-4046 https://nvd.nist.gov/vuln/detail/CVE-2026-4046 https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/ https://sourceware.org/bugzilla/show_bug.cgi?id=33980 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4046.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MVGmB/UrNlB0PqdbI1X5iA==&#34;: {&#xA;      &#34;id&#34;: &#34;MVGmB/UrNlB0PqdbI1X5iA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js due to a lack of safeguards on chunk extension bytes. The server may read an unbounded number of bytes from a single connection, which can allow an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22019 https://bugzilla.redhat.com/show_bug.cgi?id=2264574 https://www.cve.org/CVERecord?id=CVE-2024-22019 https://nvd.nist.gov/vuln/detail/CVE-2024-22019 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22019.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MYhgpNDg22nk0/HCSwm/gw==&#34;: {&#xA;      &#34;id&#34;: &#34;MYhgpNDg22nk0/HCSwm/gw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22025&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22025 https://bugzilla.redhat.com/show_bug.cgi?id=2270559 https://www.cve.org/CVERecord?id=CVE-2024-22025 https://nvd.nist.gov/vuln/detail/CVE-2024-22025 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22025.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;McBbvTJIAPyP1aOW8M+hzw==&#34;: {&#xA;      &#34;id&#34;: &#34;McBbvTJIAPyP1aOW8M+hzw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32006&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32006 https://bugzilla.redhat.com/show_bug.cgi?id=2230955 https://www.cve.org/CVERecord?id=CVE-2023-32006 https://nvd.nist.gov/vuln/detail/CVE-2023-32006 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32006.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.2.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;McWWD4LMk3xYwv1KCFcOEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;McWWD4LMk3xYwv1KCFcOEQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MdEybCUhVKCoyI/dXRvNlA==&#34;: {&#xA;      &#34;id&#34;: &#34;MdEybCUhVKCoyI/dXRvNlA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libfdisk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Mds6YkAImABVZfFVPdan5w==&#34;: {&#xA;      &#34;id&#34;: &#34;Mds6YkAImABVZfFVPdan5w==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0493&#34;,&#xA;      &#34;description&#34;: &#34;Incorrect privilege reporting in syscall and golang.org/x/sys/unix&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-15T23:30:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/399539 https://go.dev/issue/52313 https://go.dev/cl/400074 https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.2&#34;&#xA;    },&#xA;    &#34;Mgu68G03r/7Tj/zMomkJZw==&#34;: {&#xA;      &#34;id&#34;: &#34;Mgu68G03r/7Tj/zMomkJZw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7104&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in SQLite3. This issue affects the sessionReadRecord function of the ext/session/sqlite3session.c function in the make alltest Handler component. Manipulation may cause a heap-based buffer overflow to occur.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7104 https://bugzilla.redhat.com/show_bug.cgi?id=2256194 https://www.cve.org/CVERecord?id=CVE-2023-7104 https://nvd.nist.gov/vuln/detail/CVE-2023-7104 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7104.json https://access.redhat.com/errata/RHSA-2024:0465&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-7.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Mhh/p16eoRFTSGC5EJRZEw==&#34;: {&#xA;      &#34;id&#34;: &#34;Mhh/p16eoRFTSGC5EJRZEw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45288&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45288 https://bugzilla.redhat.com/show_bug.cgi?id=2268273 https://www.cve.org/CVERecord?id=CVE-2023-45288 https://nvd.nist.gov/vuln/detail/CVE-2023-45288 https://nowotarski.info/http2-continuation-flood/ https://pkg.go.dev/vuln/GO-2024-2687 https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45288.json https://access.redhat.com/errata/RHSA-2024:1963&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-4.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MjFiN4irFT7ilUN8ogYBww==&#34;: {&#xA;      &#34;id&#34;: &#34;MjFiN4irFT7ilUN8ogYBww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-65018&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow flaw has been discovered in libpng. There is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:50:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-65018 https://bugzilla.redhat.com/show_bug.cgi?id=2416907 https://www.cve.org/CVERecord?id=CVE-2025-65018 https://nvd.nist.gov/vuln/detail/CVE-2025-65018 https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea https://github.com/pnggroup/libpng/issues/755 https://github.com/pnggroup/libpng/pull/757 https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-65018.json https://access.redhat.com/errata/RHSA-2026:0238&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MmfAubFbaM6MUJCO86BuPA==&#34;: {&#xA;      &#34;id&#34;: &#34;MmfAubFbaM6MUJCO86BuPA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Mo4ARlLui4P8nHgMUyYhSw==&#34;: {&#xA;      &#34;id&#34;: &#34;Mo4ARlLui4P8nHgMUyYhSw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MqCQLlgAJiW3Q42ssHKybw==&#34;: {&#xA;      &#34;id&#34;: &#34;MqCQLlgAJiW3Q42ssHKybw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8291&#34;,&#xA;      &#34;description&#34;: &#34;A zip file handling flaw has been discovered in the python standard library `zipfile` module. The &#39;zipfile&#39; module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the &#39;zipfile&#39; module compared to other ZIP implementations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-07T18:10:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8291 https://bugzilla.redhat.com/show_bug.cgi?id=2402342 https://www.cve.org/CVERecord?id=CVE-2025-8291 https://nvd.nist.gov/vuln/detail/CVE-2025-8291 https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267 https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6 https://github.com/python/cpython/issues/139700 https://github.com/python/cpython/pull/139702 https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8291.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MrRavbeiISRcJtBRJ3ZRsA==&#34;: {&#xA;      &#34;id&#34;: &#34;MrRavbeiISRcJtBRJ3ZRsA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35065&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35065 https://bugzilla.redhat.com/show_bug.cgi?id=2156324 https://www.cve.org/CVERecord?id=CVE-2021-35065 https://nvd.nist.gov/vuln/detail/CVE-2021-35065 https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35065.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MrpKafmPiKoIdSrqC/r3Sg==&#34;: {&#xA;      &#34;id&#34;: &#34;MrpKafmPiKoIdSrqC/r3Sg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0397&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Python. A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “get_ca_certs()”. The race condition can be triggered if the methods are called at the same time that certificates are loaded into the SSLContext, such as during the TLS handshake with a  configured certificate directory.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0397 https://bugzilla.redhat.com/show_bug.cgi?id=2301891 https://www.cve.org/CVERecord?id=CVE-2024-0397 https://nvd.nist.gov/vuln/detail/CVE-2024-0397 https://mail.python.org/archives/list/security-announce@python.org/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0397.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Mrux1XY1LZVvkWuUp2MCHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Mrux1XY1LZVvkWuUp2MCHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12087&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client&#39;s intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T15:06:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12087 https://bugzilla.redhat.com/show_bug.cgi?id=2330672 https://www.cve.org/CVERecord?id=CVE-2024-12087 https://nvd.nist.gov/vuln/detail/CVE-2024-12087 https://kb.cert.org/vuls/id/952657 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12087.json https://access.redhat.com/errata/RHSA-2025:7050&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.2.5-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MtExg9vrmkuo/+/XELnvpA==&#34;: {&#xA;      &#34;id&#34;: &#34;MtExg9vrmkuo/+/XELnvpA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MtOwgWyogkVoNGuQavHN8g==&#34;: {&#xA;      &#34;id&#34;: &#34;MtOwgWyogkVoNGuQavHN8g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22801&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a reference library for PNG (Portable Network Graphics) raster image files. An integer truncation vulnerability exists in the png_write_image_16bit and png_write_image_8bit simplified write API functions. A local attacker could exploit this flaw by providing a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes, leading to a heap buffer over-read. This can result in information disclosure or a denial of service (DoS) to the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T22:57:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22801 https://bugzilla.redhat.com/show_bug.cgi?id=2428824 https://www.cve.org/CVERecord?id=CVE-2026-22801 https://nvd.nist.gov/vuln/detail/CVE-2026-22801 https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22801.json https://access.redhat.com/errata/RHSA-2026:3405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Mukn5ixgUb/zb+mcMFd16Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Mukn5ixgUb/zb+mcMFd16Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3899&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-22T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3899 https://bugzilla.redhat.com/show_bug.cgi?id=2225407 https://www.cve.org/CVERecord?id=CVE-2023-3899 https://nvd.nist.gov/vuln/detail/CVE-2023-3899 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3899.json https://access.redhat.com/errata/RHSA-2023:4708&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libdnf-plugin-subscription-manager&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.29.33.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Mv4iyriHqxAR4oNVnJlPbw==&#34;: {&#xA;      &#34;id&#34;: &#34;Mv4iyriHqxAR4oNVnJlPbw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1526&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \&#34;decompression bomb,\&#34; during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:08:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1526 https://bugzilla.redhat.com/show_bug.cgi?id=2447142 https://www.cve.org/CVERecord?id=CVE-2026-1526 https://nvd.nist.gov/vuln/detail/CVE-2026-1526 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q https://hackerone.com/reports/3481206 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1526.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Mv7iQu0SgLhcoLH3nS/HZw==&#34;: {&#xA;      &#34;id&#34;: &#34;Mv7iQu0SgLhcoLH3nS/HZw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-39253&#34;,&#xA;      &#34;description&#34;: &#34;Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source&#39;s `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim&#39;s machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-39253 https://bugzilla.redhat.com/show_bug.cgi?id=2137422 https://www.cve.org/CVERecord?id=CVE-2022-39253 https://nvd.nist.gov/vuln/detail/CVE-2022-39253 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-39253.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MvPzfqdptyOBxzxR1iCL3g==&#34;: {&#xA;      &#34;id&#34;: &#34;MvPzfqdptyOBxzxR1iCL3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7592&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `http.cookies` module in the Python package. When parsing cookies that contain backslashes, under certain circumstances, the module uses an algorithm with quadratic complexity, leading to excessive CPU consumption.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7592 https://bugzilla.redhat.com/show_bug.cgi?id=2305879 https://www.cve.org/CVERecord?id=CVE-2024-7592 https://nvd.nist.gov/vuln/detail/CVE-2024-7592 https://github.com/python/cpython/issues/123067 https://github.com/python/cpython/pull/123075 https://mail.python.org/archives/list/security-announce@python.org/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7592.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;MwRbFLckfwf7ZXLrr6KBUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;MwRbFLckfwf7ZXLrr6KBUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26458&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in krb5 in /krb5/src/lib/rpc/pmap_rmt.c. This issue can lead to a denial of service through memory exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-26458 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://www.cve.org/CVERecord?id=CVE-2024-26458 https://nvd.nist.gov/vuln/detail/CVE-2024-26458 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-26458.json https://access.redhat.com/errata/RHSA-2024:9331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Mx7K+5VJ9q5MSCq5wzzrvA==&#34;: {&#xA;      &#34;id&#34;: &#34;Mx7K+5VJ9q5MSCq5wzzrvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30581&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been discovered in Node.js,  where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30581 https://bugzilla.redhat.com/show_bug.cgi?id=2219824 https://www.cve.org/CVERecord?id=CVE-2023-30581 https://nvd.nist.gov/vuln/detail/CVE-2023-30581 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30581.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;N0YFziBj+5bn5JQnjfumWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;N0YFziBj+5bn5JQnjfumWQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2229&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client&#39;s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:27:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2229 https://bugzilla.redhat.com/show_bug.cgi?id=2447143 https://www.cve.org/CVERecord?id=CVE-2026-2229 https://nvd.nist.gov/vuln/detail/CVE-2026-2229 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8 https://hackerone.com/reports/3487486 https://nodejs.org/api/zlib.html#class-zlibinflateraw https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2229.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;N4tVXpSdUCCcisq1+6WN4w==&#34;: {&#xA;      &#34;id&#34;: &#34;N4tVXpSdUCCcisq1+6WN4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8176&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-13T13:51:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-8176 https://bugzilla.redhat.com/show_bug.cgi?id=2310137 https://www.cve.org/CVERecord?id=CVE-2024-8176 https://nvd.nist.gov/vuln/detail/CVE-2024-8176 https://github.com/libexpat/libexpat/issues/893 https://github.com/libexpat/libexpat/pull/973 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8176.json https://access.redhat.com/errata/RHSA-2025:3531&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-3.el9_5.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;N6/VXIOitxRZPgnZMgm+4A==&#34;: {&#xA;      &#34;id&#34;: &#34;N6/VXIOitxRZPgnZMgm+4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9287&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been found in the Python `venv` module and CLI. Path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \&#34;activation\&#34; scripts, for example, \&#34;source venv/bin/activate\&#34;. This flaw allows attacker-controlled virtual environments to run commands when the virtual environment is activated.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-10-22T16:34:39Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9287 https://bugzilla.redhat.com/show_bug.cgi?id=2321440 https://www.cve.org/CVERecord?id=CVE-2024-9287 https://nvd.nist.gov/vuln/detail/CVE-2024-9287 https://github.com/python/cpython/issues/124651 https://github.com/python/cpython/pull/124712 https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9287.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;N6xCmSIsupN7OsJaYpsl6Q==&#34;: {&#xA;      &#34;id&#34;: &#34;N6xCmSIsupN7OsJaYpsl6Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-40745&#34;,&#xA;      &#34;description&#34;: &#34;LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-40745 https://bugzilla.redhat.com/show_bug.cgi?id=2235265 https://www.cve.org/CVERecord?id=CVE-2023-40745 https://nvd.nist.gov/vuln/detail/CVE-2023-40745 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-40745.json https://access.redhat.com/errata/RHSA-2024:2289&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-12.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;N6yyVyHeduwThpSSvA2dVQ==&#34;: {&#xA;      &#34;id&#34;: &#34;N6yyVyHeduwThpSSvA2dVQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24785&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s html/template standard library package. If errors returned from MarshalJSON methods contain user-controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing subsequent actions to inject unexpected content into templates.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24785 https://bugzilla.redhat.com/show_bug.cgi?id=2268022 https://www.cve.org/CVERecord?id=CVE-2024-24785 https://nvd.nist.gov/vuln/detail/CVE-2024-24785 https://go.dev/cl/564196 https://go.dev/issue/65697 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg https://vuln.go.dev/ID/GO-2024-2610.json https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24785.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;N7PASlSPc3vUrDZEkY1NrA==&#34;: {&#xA;      &#34;id&#34;: &#34;N7PASlSPc3vUrDZEkY1NrA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61985&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH where the SSH client accepted \\0 (null) characters in ssh:// URIs. When a ProxyCommand is configured, these characters could alter how the command is parsed, potentially leading to code execution depending on how the proxy is set up.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61985 https://bugzilla.redhat.com/show_bug.cgi?id=2401962 https://www.cve.org/CVERecord?id=CVE-2025-61985 https://nvd.nist.gov/vuln/detail/CVE-2025-61985 https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2 https://www.openssh.com/releasenotes.html#10.1p1 https://www.openwall.com/lists/oss-security/2025/10/06/1 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61985.json https://access.redhat.com/errata/RHSA-2025:23480&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-47.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;N7aJA9Ztt3v7MF1iEQ71dg==&#34;: {&#xA;      &#34;id&#34;: &#34;N7aJA9Ztt3v7MF1iEQ71dg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33810&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33810 https://bugzilla.redhat.com/show_bug.cgi?id=2456335 https://www.cve.org/CVERecord?id=CVE-2026-33810 https://nvd.nist.gov/vuln/detail/CVE-2026-33810 https://go.dev/cl/763763 https://go.dev/issue/78332 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4866 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33810.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;: {&#xA;      &#34;id&#34;: &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;N8aXqWnqmq7yO6fhu3+9cg==&#34;: {&#xA;      &#34;id&#34;: &#34;N8aXqWnqmq7yO6fhu3+9cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NAN7p79skZ+eBA0xQMnnqw==&#34;: {&#xA;      &#34;id&#34;: &#34;NAN7p79skZ+eBA0xQMnnqw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0804&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds write in the extractContigSamplesShifted24bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited data modification.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0804 https://bugzilla.redhat.com/show_bug.cgi?id=2170192 https://www.cve.org/CVERecord?id=CVE-2023-0804 https://nvd.nist.gov/vuln/detail/CVE-2023-0804 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0804.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NCiKXZEXo4Jw5tEf8LgPhA==&#34;: {&#xA;      &#34;id&#34;: &#34;NCiKXZEXo4Jw5tEf8LgPhA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66865&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted PE file with cxxfilt can trigger a stack overflow in the d_print_comp_inner function in the cp-demangle.c file, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66865 https://bugzilla.redhat.com/show_bug.cgi?id=2425822 https://www.cve.org/CVERecord?id=CVE-2025-66865 https://nvd.nist.gov/vuln/detail/CVE-2025-66865 https://github.com/caozhzh/CRGF-Vul/blob/main/cxxfilt/crash4.md https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66865.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ND8tA1FahvMc/ZIGpyoj3g==&#34;: {&#xA;      &#34;id&#34;: &#34;ND8tA1FahvMc/ZIGpyoj3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27983&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27983 https://bugzilla.redhat.com/show_bug.cgi?id=2272764 https://www.cve.org/CVERecord?id=CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27983.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NDTeUbmjAj/XEHx68pTD9A==&#34;: {&#xA;      &#34;id&#34;: &#34;NDTeUbmjAj/XEHx68pTD9A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractContigSamplesShifted16bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0795 https://bugzilla.redhat.com/show_bug.cgi?id=2170119 https://www.cve.org/CVERecord?id=CVE-2023-0795 https://nvd.nist.gov/vuln/detail/CVE-2023-0795 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0795.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NDhUfh7yf3tRc0CV3znIIg==&#34;: {&#xA;      &#34;id&#34;: &#34;NDhUfh7yf3tRc0CV3znIIg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4519&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The `webbrowser.open()` API, used to launch web browsers, does not properly sanitize input. This allows a remote attacker to craft a malicious URL containing leading dashes. When such a URL is opened, certain web browsers may interpret these dashes as command-line options, which could lead to unexpected behavior, information disclosure, or potentially arbitrary code execution, impacting the integrity of the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T15:08:32Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4519 https://bugzilla.redhat.com/show_bug.cgi?id=2449649 https://www.cve.org/CVERecord?id=CVE-2026-4519 https://nvd.nist.gov/vuln/detail/CVE-2026-4519 https://github.com/python/cpython/issues/143930 https://github.com/python/cpython/pull/143931 https://mail.python.org/archives/list/security-announce@python.org/thread/AY5NDSS433JK56Q7Q5IS7B37QFZVVOUS/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4519.json https://access.redhat.com/errata/RHSA-2026:6766&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NFJR7P8KL9HNF/dsA5opTw==&#34;: {&#xA;      &#34;id&#34;: &#34;NFJR7P8KL9HNF/dsA5opTw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NGHtfO55iqBhbAmqujAqHA==&#34;: {&#xA;      &#34;id&#34;: &#34;NGHtfO55iqBhbAmqujAqHA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23918&#34;,&#xA;      &#34;description&#34;: &#34;A privilege escalation vulnerability exists in Node.js \u003c19.6.1, \u003c18.14.1, \u003c16.19.1 and \u003c14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23918 https://bugzilla.redhat.com/show_bug.cgi?id=2171935 https://www.cve.org/CVERecord?id=CVE-2023-23918 https://nvd.nist.gov/vuln/detail/CVE-2023-23918 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23918.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NHJdq5G883S5W8foR85U2A==&#34;: {&#xA;      &#34;id&#34;: &#34;NHJdq5G883S5W8foR85U2A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61726&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61726 https://bugzilla.redhat.com/show_bug.cgi?id=2434432 https://www.cve.org/CVERecord?id=CVE-2025-61726 https://nvd.nist.gov/vuln/detail/CVE-2025-61726 https://go.dev/cl/736712 https://go.dev/issue/77101 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4341 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61726.json https://access.redhat.com/errata/RHSA-2026:3668&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-srpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.6.0-13.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NJQIxCJu/MH10b3rWNiBVw==&#34;: {&#xA;      &#34;id&#34;: &#34;NJQIxCJu/MH10b3rWNiBVw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27614&#34;,&#xA;      &#34;description&#34;: &#34;There&#39;s a vulnerability in gitk where an user can be tricked to run malicious scripts supplied by the attacker when running gitk filename command. When successfully exploited this vulnerability may result in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T13:01:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27614 https://bugzilla.redhat.com/show_bug.cgi?id=2379125 https://www.cve.org/CVERecord?id=CVE-2025-27614 https://nvd.nist.gov/vuln/detail/CVE-2025-27614 https://lore.kernel.org/git/xmqq5xg2wrd1.fsf@gitster.g/ https://www.openwall.com/lists/oss-security/2025/07/08/4 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27614.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NJhwMDbt0IMvlSLLB4cUVA==&#34;: {&#xA;      &#34;id&#34;: &#34;NJhwMDbt0IMvlSLLB4cUVA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27535&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. Libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, several FTP settings were left out from the configuration match checks, making them match too easily. The problematic settings are `CURLOPT_FTP_ACCOUNT`, `CURLOPT_FTP_ALTERNATIVE_TO_USER`, `CURLOPT_FTP_SSL_CCC` and `CURLOPT_USE_SSL` level.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27535 https://bugzilla.redhat.com/show_bug.cgi?id=2179073 https://www.cve.org/CVERecord?id=CVE-2023-27535 https://nvd.nist.gov/vuln/detail/CVE-2023-27535 https://curl.se/docs/CVE-2023-27535.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27535.json https://access.redhat.com/errata/RHSA-2023:2650&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NMbdymzW3TQXZ7vpBZQsTA==&#34;: {&#xA;      &#34;id&#34;: &#34;NMbdymzW3TQXZ7vpBZQsTA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59466&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in Node.js error handling where \&#34;Maximum call stack size exceeded\&#34; errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(&#39;uncaughtException&#39;)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59466 https://bugzilla.redhat.com/show_bug.cgi?id=2431343 https://www.cve.org/CVERecord?id=CVE-2025-59466 https://nvd.nist.gov/vuln/detail/CVE-2025-59466 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59466.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NNyvMdW5UTPp1jGH161XDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;NNyvMdW5UTPp1jGH161XDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-43552&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in curl. In this issue, curl can be asked to tunnel all protocols virtually it supports through an HTTP proxy. HTTP proxies can deny these tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific SMB or TELNET protocols, curl can use a heap-allocated struct after it has been freed and shut down the code path in its transfer.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-43552 https://bugzilla.redhat.com/show_bug.cgi?id=2152652 https://www.cve.org/CVERecord?id=CVE-2022-43552 https://nvd.nist.gov/vuln/detail/CVE-2022-43552 https://curl.se/docs/CVE-2022-43552.html https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-43552.json https://access.redhat.com/errata/RHSA-2023:2478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NObEgWpn6tAdrn33X3GoKw==&#34;: {&#xA;      &#34;id&#34;: &#34;NObEgWpn6tAdrn33X3GoKw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-32148&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-32148 https://bugzilla.redhat.com/show_bug.cgi?id=2107383 https://www.cve.org/CVERecord?id=CVE-2022-32148 https://nvd.nist.gov/vuln/detail/CVE-2022-32148 https://go.dev/issue/53423 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-32148.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NPJh6PwkJYtfpkFMxFCfIA==&#34;: {&#xA;      &#34;id&#34;: &#34;NPJh6PwkJYtfpkFMxFCfIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31124&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This issue occurs when cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross-compiling aarch64 android. As a result, it will downgrade to rand(), which could allow an attacker to utilize the lack of entropy by not using a CSPRNG.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31124 https://bugzilla.redhat.com/show_bug.cgi?id=2209494 https://www.cve.org/CVERecord?id=CVE-2023-31124 https://nvd.nist.gov/vuln/detail/CVE-2023-31124 https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31124.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NQ+dtAZLrUPoMA29mi1Odg==&#34;: {&#xA;      &#34;id&#34;: &#34;NQ+dtAZLrUPoMA29mi1Odg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6119&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6119 https://bugzilla.redhat.com/show_bug.cgi?id=2306158 https://www.cve.org/CVERecord?id=CVE-2024-6119 https://nvd.nist.gov/vuln/detail/CVE-2024-6119 https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6119.json https://access.redhat.com/errata/RHSA-2024:6783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-28.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NUj8ykIgUTA27ShVMCBysA==&#34;: {&#xA;      &#34;id&#34;: &#34;NUj8ykIgUTA27ShVMCBysA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-37370&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-37370 https://bugzilla.redhat.com/show_bug.cgi?id=2294677 https://www.cve.org/CVERecord?id=CVE-2024-37370 https://nvd.nist.gov/vuln/detail/CVE-2024-37370 https://web.mit.edu/kerberos/www/krb5-1.21/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-37370.json https://access.redhat.com/errata/RHSA-2024:6166&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NVw9L7wf5CkACfCMTn/ArA==&#34;: {&#xA;      &#34;id&#34;: &#34;NVw9L7wf5CkACfCMTn/ArA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-34969&#34;,&#xA;      &#34;description&#34;: &#34;An assertion failure vulnerability was found in D-Bus. This issue occurs when a privileged monitoring connection (dbus-monitor, busctl monitor, gdbus monitor, or similar) is active, and a message from the bus driver cannot be delivered to a client connection due to \u003cdeny\u003e rules or outgoing message quota. If a privileged user with control over the dbus-daemon is monitoring the message bus traffic using the Monitoring clients like the dbus-monitor or busctl monitor interfaces, then an unprivileged local user with the ability to connect to the same dbus-daemon could send specially crafted request, causing a dbus-daemon to crash, resulting in a denial of service under some circumstances.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-34969 https://bugzilla.redhat.com/show_bug.cgi?id=2213166 https://www.cve.org/CVERecord?id=CVE-2023-34969 https://nvd.nist.gov/vuln/detail/CVE-2023-34969 https://gitlab.freedesktop.org/dbus/dbus/-/issues/457 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-34969.json https://access.redhat.com/errata/RHSA-2023:4569&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:1.12.20-7.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NW78+g0sKpejEre7I2lCOA==&#34;: {&#xA;      &#34;id&#34;: &#34;NW78+g0sKpejEre7I2lCOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3817&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security issue occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3817 https://bugzilla.redhat.com/show_bug.cgi?id=2227852 https://www.cve.org/CVERecord?id=CVE-2023-3817 https://nvd.nist.gov/vuln/detail/CVE-2023-3817 https://www.openssl.org/news/secadv/20230731.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3817.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NWqPMtB06drZmdGhOgqvEA==&#34;: {&#xA;      &#34;id&#34;: &#34;NWqPMtB06drZmdGhOgqvEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22870&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in proxy host matching. This vulnerability allows improper bypassing of proxy settings via manipulating an IPv6 zone ID, causing unintended matches against the NO_PROXY environment variable.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-12T18:27:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22870 https://bugzilla.redhat.com/show_bug.cgi?id=2351766 https://www.cve.org/CVERecord?id=CVE-2025-22870 https://nvd.nist.gov/vuln/detail/CVE-2025-22870 https://go.dev/cl/654697 https://go.dev/issue/71984 https://pkg.go.dev/vuln/GO-2025-3503 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22870.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NWzlm1dQzX7pu+Y8xKgSEw==&#34;: {&#xA;      &#34;id&#34;: &#34;NWzlm1dQzX7pu+Y8xKgSEw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66864&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted PE file with cxxfilt can trigger a NULL pointer dereference in the d_print_comp_inner function in the cp-demangle.c file, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66864 https://bugzilla.redhat.com/show_bug.cgi?id=2425827 https://www.cve.org/CVERecord?id=CVE-2025-66864 https://nvd.nist.gov/vuln/detail/CVE-2025-66864 https://github.com/caozhzh/CRGF-Vul/blob/main/cxxfilt/crash5.md https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66864.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NXkuwjwxMseOUUaLQCgnuQ==&#34;: {&#xA;      &#34;id&#34;: &#34;NXkuwjwxMseOUUaLQCgnuQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21892&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. On Linux, Node.js ignores certain environment variables if an unprivileged user has set them while the process is running with elevated privileges, except for CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when other capabilities have been set. This flaw allows unprivileged users to inject code that inherits the process&#39;s elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21892 https://bugzilla.redhat.com/show_bug.cgi?id=2264582 https://www.cve.org/CVERecord?id=CVE-2024-21892 https://nvd.nist.gov/vuln/detail/CVE-2024-21892 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21892.json https://access.redhat.com/errata/RHSA-2024:1503&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.2.4-1.18.19.1.1.module+el9.3.0+21388+22892fb9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NdlKBrj70+HY4gSgv+wTmA==&#34;: {&#xA;      &#34;id&#34;: &#34;NdlKBrj70+HY4gSgv+wTmA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2398&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an application configures libcurl to use HTTP/2 server push and the amount of received headers for the push surpasses the maximum allowed limit, libcurl aborts the server push. When aborting, libcurl does not free all the previously allocated headers, resulting in a memory leak.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2398 https://bugzilla.redhat.com/show_bug.cgi?id=2270498 https://www.cve.org/CVERecord?id=CVE-2024-2398 https://nvd.nist.gov/vuln/detail/CVE-2024-2398 https://curl.se/docs/CVE-2024-2398.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2398.json https://access.redhat.com/errata/RHSA-2024:5529&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-29.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NdytkbUiOF+2t+S7vqzKaA==&#34;: {&#xA;      &#34;id&#34;: &#34;NdytkbUiOF+2t+S7vqzKaA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2229&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client&#39;s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:27:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2229 https://bugzilla.redhat.com/show_bug.cgi?id=2447143 https://www.cve.org/CVERecord?id=CVE-2026-2229 https://nvd.nist.gov/vuln/detail/CVE-2026-2229 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8 https://hackerone.com/reports/3487486 https://nodejs.org/api/zlib.html#class-zlibinflateraw https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2229.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NeZAaBfGrzLvaMKrJL7WlA==&#34;: {&#xA;      &#34;id&#34;: &#34;NeZAaBfGrzLvaMKrJL7WlA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45306&#34;,&#xA;      &#34;description&#34;: &#34;A heap-buffer overflow was found in Vim. Patch v9.1.0038 optimized how the cursor position is calculated and removed a loop, that verified that the cursor position always points inside a line and does not become invalid by pointing beyond the end of a line. It was assumed that this loop was unnecessary. However, this change made it possible for the cursor position to stay invalid and point beyond the end of a line, which would eventually cause a heap-buffer-overflow when trying to access the line pointer at the specified cursor position.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-02T18:15:36Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45306 https://bugzilla.redhat.com/show_bug.cgi?id=2309275 https://www.cve.org/CVERecord?id=CVE-2024-45306 https://nvd.nist.gov/vuln/detail/CVE-2024-45306 https://github.com/vim/vim/commit/396fd1ec2956307755392a1 https://github.com/vim/vim/releases/tag/v9.1.0038 https://github.com/vim/vim/security/advisories/GHSA-wxf9-c5gx-qrwr https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45306.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NeoXfJYSR9hqSpA4BJOyWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;NeoXfJYSR9hqSpA4BJOyWQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24540&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set \&#34;\\t\\n\\f\\r\\u0020\\u2028\\u2029\&#34; in JavaScript contexts that also contain actions may not be properly sanitized during execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24540 https://bugzilla.redhat.com/show_bug.cgi?id=2196027 https://www.cve.org/CVERecord?id=CVE-2023-24540 https://nvd.nist.gov/vuln/detail/CVE-2023-24540 https://go.dev/issue/59721 https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24540.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NfM08djkMgc3ukqHI37OMg==&#34;: {&#xA;      &#34;id&#34;: &#34;NfM08djkMgc3ukqHI37OMg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24536&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an issue during multipart form parsing. By sending a specially crafted input, a remote attacker can consume large amounts of CPU and memory, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24536 https://bugzilla.redhat.com/show_bug.cgi?id=2184482 https://www.cve.org/CVERecord?id=CVE-2023-24536 https://nvd.nist.gov/vuln/detail/CVE-2023-24536 https://go.dev/issue/59153 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24536.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NfOajNNzWnotxhFpYD5Nfg==&#34;: {&#xA;      &#34;id&#34;: &#34;NfOajNNzWnotxhFpYD5Nfg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45143&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Undici node package due to the occurrence of Cross-origin requests, possibly leading to a cookie header leakage. By default, cookie headers are forbidden request headers, and they must be enabled. This flaw allows a malicious user to access this leaked cookie if they have control of the redirection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45143 https://bugzilla.redhat.com/show_bug.cgi?id=2244104 https://www.cve.org/CVERecord?id=CVE-2023-45143 https://nvd.nist.gov/vuln/detail/CVE-2023-45143 https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45143.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NkAsviHzXhNrys9cILlYeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;NkAsviHzXhNrys9cILlYeQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-2185&#34;,&#xA;      &#34;description&#34;: &#34;Insecure parsing of Windows paths with a \\??\\ prefix in path/filepath&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-08T22:42:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/63713 https://go.dev/cl/540277 https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY https://go.dev/issue/64028 https://go.dev/cl/541175 https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.20.11&#34;&#xA;    },&#xA;    &#34;Nl5OfrnQ/SPbLIWCvdxEHw==&#34;: {&#xA;      &#34;id&#34;: &#34;Nl5OfrnQ/SPbLIWCvdxEHw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NoEVAwQMgkCr1UvAm6iQBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;NoEVAwQMgkCr1UvAm6iQBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25062&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free flaw was found in libxml2. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25062 https://bugzilla.redhat.com/show_bug.cgi?id=2262726 https://www.cve.org/CVERecord?id=CVE-2024-25062 https://nvd.nist.gov/vuln/detail/CVE-2024-25062 https://gitlab.gnome.org/GNOME/libxml2/-/issues/604 https://gitlab.gnome.org/GNOME/libxml2/-/tags https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25062.json https://access.redhat.com/errata/RHSA-2024:2679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NpKL2jmktUTvYJUFA1mjww==&#34;: {&#xA;      &#34;id&#34;: &#34;NpKL2jmktUTvYJUFA1mjww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39321&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39321 https://bugzilla.redhat.com/show_bug.cgi?id=2237777 https://www.cve.org/CVERecord?id=CVE-2023-39321 https://nvd.nist.gov/vuln/detail/CVE-2023-39321 https://go.dev/cl/523039 https://go.dev/issue/62266 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2044.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39321.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Npa1TFSpFpskBtk163Khxw==&#34;: {&#xA;      &#34;id&#34;: &#34;Npa1TFSpFpskBtk163Khxw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:11992&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-8.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NplyvjxiuekBB/5QKoOJbw==&#34;: {&#xA;      &#34;id&#34;: &#34;NplyvjxiuekBB/5QKoOJbw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23920&#34;,&#xA;      &#34;description&#34;: &#34;An untrusted search path vulnerability exists in Node.js. \u003c19.6.1, \u003c18.14.1, \u003c16.19.1, and \u003c14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23920 https://bugzilla.redhat.com/show_bug.cgi?id=2172217 https://www.cve.org/CVERecord?id=CVE-2023-23920 https://nvd.nist.gov/vuln/detail/CVE-2023-23920 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23920.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NrNei+pIM0R36v4Js8XxAg==&#34;: {&#xA;      &#34;id&#34;: &#34;NrNei+pIM0R36v4Js8XxAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35387&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability allows the system to use unintended Elliptic Curve Digital Signature Algorithm (ECDSA) algorithms. This occurs because the configuration for accepted public key algorithms is misinterpreted, leading to the use of weaker cryptographic methods than intended. This could potentially allow an attacker to compromise the confidentiality of data.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:52:53Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35387 https://bugzilla.redhat.com/show_bug.cgi?id=2454494 https://www.cve.org/CVERecord?id=CVE-2026-35387 https://nvd.nist.gov/vuln/detail/CVE-2026-35387 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35387.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;: {&#xA;      &#34;id&#34;: &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0988&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0988 https://bugzilla.redhat.com/show_bug.cgi?id=2429886 https://www.cve.org/CVERecord?id=CVE-2026-0988 https://nvd.nist.gov/vuln/detail/CVE-2026-0988 https://gitlab.gnome.org/GNOME/glib/-/issues/3851 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0988.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Nsd5wG+dBhUvVktxuz/adg==&#34;: {&#xA;      &#34;id&#34;: &#34;Nsd5wG+dBhUvVktxuz/adg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31130&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs in the ares_inet_net_pton() function, which is vulnerable to a buffer underflow for certain ipv6 addresses. \&#34;0::00:00:00/2\&#34; in particular was found to cause an issue. C-ares only uses this function internally for configuration purposes, which would require an administrator to configure such an address via ares_set_sortlist().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31130 https://bugzilla.redhat.com/show_bug.cgi?id=2209497 https://www.cve.org/CVERecord?id=CVE-2023-31130 https://nvd.nist.gov/vuln/detail/CVE-2023-31130 https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31130.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NtbylJEfQzKWA6OUFA9HFg==&#34;: {&#xA;      &#34;id&#34;: &#34;NtbylJEfQzKWA6OUFA9HFg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21710&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21710 https://bugzilla.redhat.com/show_bug.cgi?id=2453151 https://www.cve.org/CVERecord?id=CVE-2026-21710 https://nvd.nist.gov/vuln/detail/CVE-2026-21710 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21710.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NuCOPhrrauNCWs3jqnDA1A==&#34;: {&#xA;      &#34;id&#34;: &#34;NuCOPhrrauNCWs3jqnDA1A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NuT3W1dL/YKETJsMHw1WfA==&#34;: {&#xA;      &#34;id&#34;: &#34;NuT3W1dL/YKETJsMHw1WfA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.2-1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;O+EMSAzsAMtyqCd2+UnsmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;O+EMSAzsAMtyqCd2+UnsmQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55132&#34;,&#xA;      &#34;description&#34;: &#34;A file access flaw has been discovered in NodeJS. A file&#39;s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55132 https://bugzilla.redhat.com/show_bug.cgi?id=2431338 https://www.cve.org/CVERecord?id=CVE-2025-55132 https://nvd.nist.gov/vuln/detail/CVE-2025-55132 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55132.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;O+NG96g+kK1DtaJEFTfwuA==&#34;: {&#xA;      &#34;id&#34;: &#34;O+NG96g+kK1DtaJEFTfwuA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7592&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `http.cookies` module in the Python package. When parsing cookies that contain backslashes, under certain circumstances, the module uses an algorithm with quadratic complexity, leading to excessive CPU consumption.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7592 https://bugzilla.redhat.com/show_bug.cgi?id=2305879 https://www.cve.org/CVERecord?id=CVE-2024-7592 https://nvd.nist.gov/vuln/detail/CVE-2024-7592 https://github.com/python/cpython/issues/123067 https://github.com/python/cpython/pull/123075 https://mail.python.org/archives/list/security-announce@python.org/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7592.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;O+a4984RTSUBIVVJsZTw1A==&#34;: {&#xA;      &#34;id&#34;: &#34;O+a4984RTSUBIVVJsZTw1A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52006&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems, most notably .NET and node.js, interpret single Carriage Return characters as newlines, which render the protections against CVE-2020-5260 incomplete for credential helpers, which has the potential to expose stored credentials to malicious URLs.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T18:39:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52006 https://bugzilla.redhat.com/show_bug.cgi?id=2337956 https://www.cve.org/CVERecord?id=CVE-2024-52006 https://nvd.nist.gov/vuln/detail/CVE-2024-52006 https://github.com/git-ecosystem/git-credential-manager/security/advisories/GHSA-86c2-4x57-wc8g https://github.com/git/git/commit/b01b9b81d36759cdcd07305e78765199e1bc2060 https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q https://github.com/git/git/security/advisories/GHSA-r5ph-xg7q-xfrp https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52006.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;O0QnjS+0zUH+vff5xaIpCw==&#34;: {&#xA;      &#34;id&#34;: &#34;O0QnjS+0zUH+vff5xaIpCw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;O0ZHj1wCkn8EgvHd15dYqA==&#34;: {&#xA;      &#34;id&#34;: &#34;O0ZHj1wCkn8EgvHd15dYqA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0361&#34;,&#xA;      &#34;description&#34;: &#34;A timing side-channel vulnerability was found in RSA ClientKeyExchange messages in GnuTLS. This side-channel may be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0361 https://bugzilla.redhat.com/show_bug.cgi?id=2162596 https://www.cve.org/CVERecord?id=CVE-2023-0361 https://nvd.nist.gov/vuln/detail/CVE-2023-0361 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0361.json https://access.redhat.com/errata/RHSA-2023:1141&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.7.6-18.el9_1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;O41Bejc6em2i0QjOrjliKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;O41Bejc6em2i0QjOrjliKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0803&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds write in the extractContigSamplesShifted16bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited data modification.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0803 https://bugzilla.redhat.com/show_bug.cgi?id=2170187 https://www.cve.org/CVERecord?id=CVE-2023-0803 https://nvd.nist.gov/vuln/detail/CVE-2023-0803 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0803.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;O4VudlVyChnCKHP9qhS59g==&#34;: {&#xA;      &#34;id&#34;: &#34;O4VudlVyChnCKHP9qhS59g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30588&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30588 https://bugzilla.redhat.com/show_bug.cgi?id=2219838 https://www.cve.org/CVERecord?id=CVE-2023-30588 https://nvd.nist.gov/vuln/detail/CVE-2023-30588 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30588.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.16.1-1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;O7l2OQQ3NRM4VNrd4YvEaA==&#34;: {&#xA;      &#34;id&#34;: &#34;O7l2OQQ3NRM4VNrd4YvEaA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24539&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang where angle brackets (\u003c\u003e) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a &#39;/&#39; character could result in the CSS context unexpectedly closing, allowing for the injection of unexpected HMTL if executed with untrusted input.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24539 https://bugzilla.redhat.com/show_bug.cgi?id=2196026 https://www.cve.org/CVERecord?id=CVE-2023-24539 https://nvd.nist.gov/vuln/detail/CVE-2023-24539 https://github.com/golang/go/issues/59720 https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24539.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;: {&#xA;      &#34;id&#34;: &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OIcx4C9IsgtrAE0nDs9GdA==&#34;: {&#xA;      &#34;id&#34;: &#34;OIcx4C9IsgtrAE0nDs9GdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32021&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw allows an unauthenticated attacker to place a repository on their target&#39;s local system that contains symlinks. During the cloning process, Git could be tricked into creating hardlinked arbitrary files into their repository&#39;s objects/ directory, impacting availability and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32021 https://bugzilla.redhat.com/show_bug.cgi?id=2280484 https://www.cve.org/CVERecord?id=CVE-2024-32021 https://nvd.nist.gov/vuln/detail/CVE-2024-32021 https://github.com/git/git/security/advisories/GHSA-mvxm-9j2h-qjx7 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32021.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OIti7hlc3vRNRODodvPE4A==&#34;: {&#xA;      &#34;id&#34;: &#34;OIti7hlc3vRNRODodvPE4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26996&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-20T03:05:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26996 https://bugzilla.redhat.com/show_bug.cgi?id=2441268 https://www.cve.org/CVERecord?id=CVE-2026-26996 https://nvd.nist.gov/vuln/detail/CVE-2026-26996 https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26996.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OJ5Ok6CMeJ8/3txCizz4cg==&#34;: {&#xA;      &#34;id&#34;: &#34;OJ5Ok6CMeJ8/3txCizz4cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43787&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43787 https://bugzilla.redhat.com/show_bug.cgi?id=2242254 https://www.cve.org/CVERecord?id=CVE-2023-43787 https://nvd.nist.gov/vuln/detail/CVE-2023-43787 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43787.json https://access.redhat.com/errata/RHSA-2024:2145&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11-xcb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OLjLMRdWldBjSuTKpYjduw==&#34;: {&#xA;      &#34;id&#34;: &#34;OLjLMRdWldBjSuTKpYjduw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66866&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in BinUtils. An attacker can exploit a vulnerability in the `d_abi_tags` function within the `cp-demangle.c` file by providing a specially crafted Portable Executable (PE) file. This can lead to a Denial of Service (DoS), making the affected application unavailable to legitimate users.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66866 https://bugzilla.redhat.com/show_bug.cgi?id=2425830 https://www.cve.org/CVERecord?id=CVE-2025-66866 https://nvd.nist.gov/vuln/detail/CVE-2025-66866 https://github.com/caozhzh/CRGF-Vul/blob/main/cxxfilt/crash6.md https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66866.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OOCO13z2+atrfqEfCsJ3/w==&#34;: {&#xA;      &#34;id&#34;: &#34;OOCO13z2+atrfqEfCsJ3/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30590&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30590 https://bugzilla.redhat.com/show_bug.cgi?id=2219842 https://www.cve.org/CVERecord?id=CVE-2023-30590 https://nvd.nist.gov/vuln/detail/CVE-2023-30590 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30590.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.16.1-1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OSUAY4vX1mm91uqYY2QyKA==&#34;: {&#xA;      &#34;id&#34;: &#34;OSUAY4vX1mm91uqYY2QyKA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32289&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `html/template` package. This vulnerability arises from improper tracking of context and brace depth within JavaScript (JS) template literals. A remote attacker could exploit these issues to cause content to be incorrectly or improperly escaped, leading to Cross-Site Scripting (XSS) vulnerabilities. This could allow an attacker to inject malicious scripts into web pages viewed by other users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32289 https://bugzilla.redhat.com/show_bug.cgi?id=2456334 https://www.cve.org/CVERecord?id=CVE-2026-32289 https://nvd.nist.gov/vuln/detail/CVE-2026-32289 https://go.dev/cl/763762 https://go.dev/issue/78331 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4865 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32289.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OUOPFj6v5qm/F5KSXf7dVw==&#34;: {&#xA;      &#34;id&#34;: &#34;OUOPFj6v5qm/F5KSXf7dVw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OVekopeo2m1+vPR8dGU9Qw==&#34;: {&#xA;      &#34;id&#34;: &#34;OVekopeo2m1+vPR8dGU9Qw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:11802&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.16.0-2.module+el9.6.0+23339+d3c8acfa&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OXr+UvfSDAQbLGP4xOBSMw==&#34;: {&#xA;      &#34;id&#34;: &#34;OXr+UvfSDAQbLGP4xOBSMw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1127&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. A division by zero in the scrolldown function may lead to a denial of service, modified memory, and possibly remote execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1127 https://bugzilla.redhat.com/show_bug.cgi?id=2174662 https://www.cve.org/CVERecord?id=CVE-2023-1127 https://nvd.nist.gov/vuln/detail/CVE-2023-1127 https://huntr.dev/bounties/2d4d309e-4c96-415f-9070-36d0815f1beb https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1127.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OaLF1hM9BwMPMfYWn9kNEA==&#34;: {&#xA;      &#34;id&#34;: &#34;OaLF1hM9BwMPMfYWn9kNEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3479&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s `pkgutil.get_data()` function, which is used to retrieve data from packages. This function did not properly validate the `resource` argument, allowing a local attacker to perform path traversal attacks. Path traversal enables an attacker to access files and directories stored outside the intended root directory, potentially leading to information disclosure or unintended file access.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T18:13:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3479 https://bugzilla.redhat.com/show_bug.cgi?id=2448746 https://www.cve.org/CVERecord?id=CVE-2026-3479 https://nvd.nist.gov/vuln/detail/CVE-2026-3479 https://github.com/python/cpython/issues/146121 https://github.com/python/cpython/pull/146122 https://mail.python.org/archives/list/security-announce@python.org/thread/WYLLVQOOCKGK73JM7Z7ZSNOJC4N7BAWY/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3479.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Oaw7/z6QEDwwzKvMQmdriQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Oaw7/z6QEDwwzKvMQmdriQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48281&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libtiff. This vulnerability occurs due to an issue in processCropSelections in the tools/tiffcrop.c function in LibTIFF that has a heap-based buffer overflow (for example, \&#34;WRITE of size 307203\&#34;) via a crafted TIFF image.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-48281 https://bugzilla.redhat.com/show_bug.cgi?id=2163606 https://www.cve.org/CVERecord?id=CVE-2022-48281 https://nvd.nist.gov/vuln/detail/CVE-2022-48281 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-48281.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ob+LJ5zYHnbjt14Yf8W7UA==&#34;: {&#xA;      &#34;id&#34;: &#34;Ob+LJ5zYHnbjt14Yf8W7UA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3016&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free vulnerability was found in vim&#39;s get_next_valid_entry() function of the src/quickfix.c file. The issue occurs because vim is using freed memory when the location list is changed in autocmd. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3016 https://bugzilla.redhat.com/show_bug.cgi?id=2124208 https://www.cve.org/CVERecord?id=CVE-2022-3016 https://nvd.nist.gov/vuln/detail/CVE-2022-3016 https://huntr.dev/bounties/260516c2-5c4a-4b7f-a01c-04b1aeeea371 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3016.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ogq02fai+FFfBUlCUVZlhw==&#34;: {&#xA;      &#34;id&#34;: &#34;Ogq02fai+FFfBUlCUVZlhw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-10963&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-10963 https://bugzilla.redhat.com/show_bug.cgi?id=2324291 https://www.cve.org/CVERecord?id=CVE-2024-10963 https://nvd.nist.gov/vuln/detail/CVE-2024-10963 https://github.com/linux-pam/linux-pam/issues/834 https://github.com/linux-pam/linux-pam/pull/835 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-10963.json https://access.redhat.com/errata/RHSA-2024:10244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.5.1-22.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OhQ6agVzWuY02NakmnlJmw==&#34;: {&#xA;      &#34;id&#34;: &#34;OhQ6agVzWuY02NakmnlJmw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-39253&#34;,&#xA;      &#34;description&#34;: &#34;Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source&#39;s `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim&#39;s machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-39253 https://bugzilla.redhat.com/show_bug.cgi?id=2137422 https://www.cve.org/CVERecord?id=CVE-2022-39253 https://nvd.nist.gov/vuln/detail/CVE-2022-39253 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-39253.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Oi+2EF5+FNNGg+4WyowonQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Oi+2EF5+FNNGg+4WyowonQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23165&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ReadFileUtf8 internal binding of Node.js. This vulnerability can allow an attacker to cause an application denial of service via repeated file read operations that trigger an unrecoverable memory leak due to a corrupted pointer in the underlying file system binding.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23165 https://bugzilla.redhat.com/show_bug.cgi?id=2367162 https://www.cve.org/CVERecord?id=CVE-2025-23165 https://nvd.nist.gov/vuln/detail/CVE-2025-23165 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23165.json https://access.redhat.com/errata/RHSA-2025:8468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.19.2-1.module+el9.6.0+23146+be9976bd&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ojd6gfhf5HOGBRFGRWmKOg==&#34;: {&#xA;      &#34;id&#34;: &#34;Ojd6gfhf5HOGBRFGRWmKOg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-50349&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git. This vulnerability occurs when Git requests credentials via a terminal prompt, for example, without the use of a credential helper. During this process, Git displays the host name for which the credentials are needed, but any URL-encoded parts are decoded and displayed directly. This can allow an attacker to manipulate URLs by including ANSI escape sequences, which can be interpreted by the terminal to mislead users by tricking them into entering passwords that are redirected to malicious attacker-controlled sites.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T18:43:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-50349 https://bugzilla.redhat.com/show_bug.cgi?id=2337824 https://www.cve.org/CVERecord?id=CVE-2024-50349 https://nvd.nist.gov/vuln/detail/CVE-2024-50349 https://github.com/git/git/commit/7725b8100ffbbff2750ee4d61a0fcc1f53a086e8 https://github.com/git/git/commit/c903985bf7e772e2d08275c1a95c8a55ab011577 https://github.com/git/git/security/advisories/GHSA-hmg8-h7qf-7cxr https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-50349.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OlhZuHzjnGJlFRoEEZLvZw==&#34;: {&#xA;      &#34;id&#34;: &#34;OlhZuHzjnGJlFRoEEZLvZw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-1705&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \&#34;chunked\&#34; encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-1705 https://bugzilla.redhat.com/show_bug.cgi?id=2107374 https://www.cve.org/CVERecord?id=CVE-2022-1705 https://nvd.nist.gov/vuln/detail/CVE-2022-1705 https://go.dev/issue/53188 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1705.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OlzUZywb212kcLte3jiS3g==&#34;: {&#xA;      &#34;id&#34;: &#34;OlzUZywb212kcLte3jiS3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2236&#34;,&#xA;      &#34;description&#34;: &#34;A timing-based side-channel flaw was found in libgcrypt&#39;s RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2236 https://bugzilla.redhat.com/show_bug.cgi?id=2245218 https://www.cve.org/CVERecord?id=CVE-2024-2236 https://nvd.nist.gov/vuln/detail/CVE-2024-2236 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2236.json https://access.redhat.com/errata/RHSA-2024:9404&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.10.0-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OoUkTYhn9kcAyWK8OpWEvg==&#34;: {&#xA;      &#34;id&#34;: &#34;OoUkTYhn9kcAyWK8OpWEvg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6232&#34;,&#xA;      &#34;description&#34;: &#34;A regular expression denial of service (ReDos) vulnerability was found in Python&#39;s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-03T13:15:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6232 https://bugzilla.redhat.com/show_bug.cgi?id=2309426 https://www.cve.org/CVERecord?id=CVE-2024-6232 https://nvd.nist.gov/vuln/detail/CVE-2024-6232 https://github.com/python/cpython/issues/121285 https://github.com/python/cpython/pull/121286 https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6232.json https://access.redhat.com/errata/RHSA-2024:8446&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OqWPbZZgGqlPCMzbmClfHA==&#34;: {&#xA;      &#34;id&#34;: &#34;OqWPbZZgGqlPCMzbmClfHA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25629&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25629 https://bugzilla.redhat.com/show_bug.cgi?id=2265713 https://www.cve.org/CVERecord?id=CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629 https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25629.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.2.8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Oqoxq5RsXkX9ZEI9ETDo/w==&#34;: {&#xA;      &#34;id&#34;: &#34;Oqoxq5RsXkX9ZEI9ETDo/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OtUtUn02ewCzaijseyEVUA==&#34;: {&#xA;      &#34;id&#34;: &#34;OtUtUn02ewCzaijseyEVUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-28805&#34;,&#xA;      &#34;description&#34;: &#34;A heap buffer-overflow vulnerability was found in Lua. The flaw occurs due to vulnerable code present in the lparser.c function of Lua that allows the execution of untrusted Lua code into a system, resulting in malicious activity.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-28805 https://bugzilla.redhat.com/show_bug.cgi?id=2073884 https://www.cve.org/CVERecord?id=CVE-2022-28805 https://nvd.nist.gov/vuln/detail/CVE-2022-28805 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-28805.json https://access.redhat.com/errata/RHSA-2023:2582&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lua-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:5.4.4-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OuZBWnWNFHYdTgntdOB15Q==&#34;: {&#xA;      &#34;id&#34;: &#34;OuZBWnWNFHYdTgntdOB15Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29406&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang, where it is vulnerable to HTTP header injection caused by improper content validation of the Host header by the HTTP/1 client. A remote attacker can inject arbitrary HTTP headers by persuading a victim to visit a specially crafted Web page. This flaw allows the attacker to conduct various attacks against the vulnerable system, including Cross-site scripting, cache poisoning, or session hijacking.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29406 https://bugzilla.redhat.com/show_bug.cgi?id=2222167 https://www.cve.org/CVERecord?id=CVE-2023-29406 https://nvd.nist.gov/vuln/detail/CVE-2023-29406 https://groups.google.com/g/golang-announce/c/2q13H6LEEx0 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29406.json https://access.redhat.com/errata/RHSA-2023:5738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.13-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OvvtykNCZtfooZWGyghXfg==&#34;: {&#xA;      &#34;id&#34;: &#34;OvvtykNCZtfooZWGyghXfg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ovx/FK8kd+H6TytgRdsBFA==&#34;: {&#xA;      &#34;id&#34;: &#34;Ovx/FK8kd+H6TytgRdsBFA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8176&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-13T13:51:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-8176 https://bugzilla.redhat.com/show_bug.cgi?id=2310137 https://www.cve.org/CVERecord?id=CVE-2024-8176 https://nvd.nist.gov/vuln/detail/CVE-2024-8176 https://github.com/libexpat/libexpat/issues/893 https://github.com/libexpat/libexpat/pull/973 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8176.json https://access.redhat.com/errata/RHSA-2025:7444&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-5.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ox1tNe9huq3q2onFJsX0QA==&#34;: {&#xA;      &#34;id&#34;: &#34;Ox1tNe9huq3q2onFJsX0QA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;OxOc7/P4x7mjEZNhGnABDA==&#34;: {&#xA;      &#34;id&#34;: &#34;OxOc7/P4x7mjEZNhGnABDA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28835&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \&#34;certtool --verify-chain\&#34; command.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28835 https://bugzilla.redhat.com/show_bug.cgi?id=2269084 https://www.cve.org/CVERecord?id=CVE-2024-28835 https://nvd.nist.gov/vuln/detail/CVE-2024-28835 https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28835.json https://access.redhat.com/errata/RHSA-2024:2570&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-4.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Oz/6eC07LwyvcoelwlI47w==&#34;: {&#xA;      &#34;id&#34;: &#34;Oz/6eC07LwyvcoelwlI47w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32002&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This vulnerability allows the malicious manipulation of repositories containing submodules, exploiting a bug that enables the writing of files into the .git/ directory instead of the submodule&#39;s intended worktree. This manipulation facilitates the execution of arbitrary code during the cloning process, bypassing user inspection and control.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32002 https://bugzilla.redhat.com/show_bug.cgi?id=2280421 https://www.cve.org/CVERecord?id=CVE-2024-32002 https://nvd.nist.gov/vuln/detail/CVE-2024-32002 https://github.com/git/git/security/advisories/GHSA-8h77-4q3w-gfgv https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32002.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;P1K1eUbqwgam0P6f7iB/IA==&#34;: {&#xA;      &#34;id&#34;: &#34;P1K1eUbqwgam0P6f7iB/IA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38545&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \&#34;let the host resolve the name\&#34; could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38545 https://bugzilla.redhat.com/show_bug.cgi?id=2241933 https://www.cve.org/CVERecord?id=CVE-2023-38545 https://nvd.nist.gov/vuln/detail/CVE-2023-38545 https://curl.se/docs/CVE-2023-38545.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38545.json https://access.redhat.com/errata/RHSA-2023:5763&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;P2LAyAbSFxWVwlNB9c/A2g==&#34;: {&#xA;      &#34;id&#34;: &#34;P2LAyAbSFxWVwlNB9c/A2g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7008&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222672 https://www.cve.org/CVERecord?id=CVE-2023-7008 https://nvd.nist.gov/vuln/detail/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222261 https://github.com/systemd/systemd/issues/25676 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7008.json https://access.redhat.com/errata/RHSA-2024:2463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-32.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;P8ATyyToJgziJaUXIjyPvA==&#34;: {&#xA;      &#34;id&#34;: &#34;P8ATyyToJgziJaUXIjyPvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;P8DPJn528tUhUQhsixUumA==&#34;: {&#xA;      &#34;id&#34;: &#34;P8DPJn528tUhUQhsixUumA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PAVfrfQyg9ezKUDPbI/Nmw==&#34;: {&#xA;      &#34;id&#34;: &#34;PAVfrfQyg9ezKUDPbI/Nmw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4674&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-29T21:19:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4674 https://bugzilla.redhat.com/show_bug.cgi?id=2384329 https://www.cve.org/CVERecord?id=CVE-2025-4674 https://nvd.nist.gov/vuln/detail/CVE-2025-4674 https://go.dev/cl/686515 https://go.dev/issue/74380 https://groups.google.com/g/golang-announce/c/gTNJnDXmn34 https://pkg.go.dev/vuln/GO-2025-3828 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4674.json https://access.redhat.com/errata/RHSA-2025:13935&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.6-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PB44uTo7NGwmA/fjSEQPBA==&#34;: {&#xA;      &#34;id&#34;: &#34;PB44uTo7NGwmA/fjSEQPBA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-31498&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This vulnerability allows a remote or local attacker to cause a use-after-free, potentially leading to application-level denial of service or other unexpected behavior via manipulation of DNS responses or network conditions during query processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T13:53:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-31498 https://bugzilla.redhat.com/show_bug.cgi?id=2358271 https://www.cve.org/CVERecord?id=CVE-2025-31498 https://nvd.nist.gov/vuln/detail/CVE-2025-31498 https://github.com/c-ares/c-ares/commit/29d38719112639d8c0ba910254a3dd4f482ea2d1 https://github.com/c-ares/c-ares/pull/821 https://github.com/c-ares/c-ares/security/advisories/GHSA-6hxc-62jh-p29v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-31498.json https://access.redhat.com/errata/RHSA-2025:7426&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.19.1-1.module+el9.6.0+23053+4195b0b2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PDZIjg6u6C4zc5d09d4Brw==&#34;: {&#xA;      &#34;id&#34;: &#34;PDZIjg6u6C4zc5d09d4Brw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2229&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client&#39;s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:27:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2229 https://bugzilla.redhat.com/show_bug.cgi?id=2447143 https://www.cve.org/CVERecord?id=CVE-2026-2229 https://nvd.nist.gov/vuln/detail/CVE-2026-2229 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8 https://hackerone.com/reports/3487486 https://nodejs.org/api/zlib.html#class-zlibinflateraw https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2229.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PDkkYuYRnbObAyDWKDapig==&#34;: {&#xA;      &#34;id&#34;: &#34;PDkkYuYRnbObAyDWKDapig==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28757&#34;,&#xA;      &#34;description&#34;: &#34;An XML Entity Expansion flaw was found in libexpat. This flaw allows an attacker to cause a denial of service when there is an isolated use of external parsers.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28757 https://bugzilla.redhat.com/show_bug.cgi?id=2268766 https://www.cve.org/CVERecord?id=CVE-2024-28757 https://nvd.nist.gov/vuln/detail/CVE-2024-28757 https://github.com/libexpat/libexpat/issues/839 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28757.json https://access.redhat.com/errata/RHBA-2024:2518&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PEaU9hApxjdZ1D4R2OUZpw==&#34;: {&#xA;      &#34;id&#34;: &#34;PEaU9hApxjdZ1D4R2OUZpw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21890&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js Permission Model, where it is not clarified in the documentation that wildcards should only be used as the last character of a file path. For example: --allow-fs-read=/home/node/.ssh/*.pub will ignore pub and give access to everything after .ssh/.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21890 https://bugzilla.redhat.com/show_bug.cgi?id=2265722 https://www.cve.org/CVERecord?id=CVE-2024-21890 https://nvd.nist.gov/vuln/detail/CVE-2024-21890 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21890.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PHRlWl/iCYco+xAVn6SmKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;PHRlWl/iCYco+xAVn6SmKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8088&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s zipfile module. When iterating over the entries of a zip archive, the process can enter into an infinite loop state and become unresponsive. This flaw allows an attacker to craft a malicious ZIP archive, leading to a denial of service from the application consuming the zipfile module. Only applications that handle user-controlled zip archives are affected by this vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-22T19:15:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-8088 https://bugzilla.redhat.com/show_bug.cgi?id=2307370 https://www.cve.org/CVERecord?id=CVE-2024-8088 https://nvd.nist.gov/vuln/detail/CVE-2024-8088 https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64 https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea https://github.com/python/cpython/issues/122905 https://github.com/python/cpython/pull/122906 https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8088.json https://access.redhat.com/errata/RHSA-2024:6163&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PJ/Blkuxb9rGhjSw0f3NrA==&#34;: {&#xA;      &#34;id&#34;: &#34;PJ/Blkuxb9rGhjSw0f3NrA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39615&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Libxml2, where it contains a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a denial of service (DoS) by supplying a crafted XML file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39615 https://bugzilla.redhat.com/show_bug.cgi?id=2235864 https://www.cve.org/CVERecord?id=CVE-2023-39615 https://nvd.nist.gov/vuln/detail/CVE-2023-39615 https://gitlab.gnome.org/GNOME/libxml2/-/issues/535 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39615.json https://access.redhat.com/errata/RHSA-2023:7747&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-5.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PLT6ItGnGibNqyU7ikhmRA==&#34;: {&#xA;      &#34;id&#34;: &#34;PLT6ItGnGibNqyU7ikhmRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PMaPI3hRDt0vFaerryvY/g==&#34;: {&#xA;      &#34;id&#34;: &#34;PMaPI3hRDt0vFaerryvY/g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0361&#34;,&#xA;      &#34;description&#34;: &#34;A timing side-channel vulnerability was found in RSA ClientKeyExchange messages in GnuTLS. This side-channel may be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0361 https://bugzilla.redhat.com/show_bug.cgi?id=2162596 https://www.cve.org/CVERecord?id=CVE-2023-0361 https://nvd.nist.gov/vuln/detail/CVE-2023-0361 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0361.json https://access.redhat.com/errata/RHSA-2023:1141&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.7.6-18.el9_1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PNe7L04JfETT1S4nMUYcGA==&#34;: {&#xA;      &#34;id&#34;: &#34;PNe7L04JfETT1S4nMUYcGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;POO0JR6PIxa5cAikhYHhiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;POO0JR6PIxa5cAikhYHhiQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23936&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the fetch API in Node.js that did not prevent CRLF injection in the &#39;host&#39; header. This issue could allow HTTP response splitting and HTTP header injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23936 https://bugzilla.redhat.com/show_bug.cgi?id=2172190 https://www.cve.org/CVERecord?id=CVE-2023-23936 https://nvd.nist.gov/vuln/detail/CVE-2023-23936 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23936.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;POSFLQ5mtdC9jMcn5UF8FA==&#34;: {&#xA;      &#34;id&#34;: &#34;POSFLQ5mtdC9jMcn5UF8FA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici package for Node.js. Undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If an app has a mechanism that sends multipart requests to an attacker-controlled website, it can leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T17:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22150 https://bugzilla.redhat.com/show_bug.cgi?id=2339176 https://www.cve.org/CVERecord?id=CVE-2025-22150 https://nvd.nist.gov/vuln/detail/CVE-2025-22150 https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113 https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0 https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385 https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975 https://hackerone.com/reports/2913312 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22150.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.13.1-1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;POcCjok8El2qPlKNKRD9WQ==&#34;: {&#xA;      &#34;id&#34;: &#34;POcCjok8El2qPlKNKRD9WQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12243&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12243 https://bugzilla.redhat.com/show_bug.cgi?id=2344615 https://www.cve.org/CVERecord?id=CVE-2024-12243 https://nvd.nist.gov/vuln/detail/CVE-2024-12243 https://gitlab.com/gnutls/gnutls/-/issues/1553 https://gitlab.com/gnutls/libtasn1/-/issues/52 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12243.json https://access.redhat.com/errata/RHSA-2025:7076&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-6.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PPWqABLxfDDxZRPH4wfL9g==&#34;: {&#xA;      &#34;id&#34;: &#34;PPWqABLxfDDxZRPH4wfL9g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27614&#34;,&#xA;      &#34;description&#34;: &#34;There&#39;s a vulnerability in gitk where an user can be tricked to run malicious scripts supplied by the attacker when running gitk filename command. When successfully exploited this vulnerability may result in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T13:01:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27614 https://bugzilla.redhat.com/show_bug.cgi?id=2379125 https://www.cve.org/CVERecord?id=CVE-2025-27614 https://nvd.nist.gov/vuln/detail/CVE-2025-27614 https://lore.kernel.org/git/xmqq5xg2wrd1.fsf@gitster.g/ https://www.openwall.com/lists/oss-security/2025/07/08/4 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27614.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PRErogcN/aXkh7DLlBPLlw==&#34;: {&#xA;      &#34;id&#34;: &#34;PRErogcN/aXkh7DLlBPLlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25881&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25881 https://bugzilla.redhat.com/show_bug.cgi?id=2165824 https://www.cve.org/CVERecord?id=CVE-2022-25881 https://nvd.nist.gov/vuln/detail/CVE-2022-25881 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25881.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PT2kHv2z8lzB78apv1Gy+A==&#34;: {&#xA;      &#34;id&#34;: &#34;PT2kHv2z8lzB78apv1Gy+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;: {&#xA;      &#34;id&#34;: &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-28T16:19:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68973 https://bugzilla.redhat.com/show_bug.cgi?id=2425966 https://www.cve.org/CVERecord?id=CVE-2025-68973 https://nvd.nist.gov/vuln/detail/CVE-2025-68973 https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306 https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9 https://gpg.fail/memcpy https://news.ycombinator.com/item?id=46403200 https://www.openwall.com/lists/oss-security/2025/12/28/5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68973.json https://access.redhat.com/errata/RHSA-2026:0719&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.3.3-5.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PWWEgCX9dooaG7K56MMKDg==&#34;: {&#xA;      &#34;id&#34;: &#34;PWWEgCX9dooaG7K56MMKDg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55131&#34;,&#xA;      &#34;description&#34;: &#34;A memory exposure flaw has been discovered in Node.js. A flaw in Node.js&#39;s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55131 https://bugzilla.redhat.com/show_bug.cgi?id=2431350 https://www.cve.org/CVERecord?id=CVE-2025-55131 https://nvd.nist.gov/vuln/detail/CVE-2025-55131 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55131.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PYQ8GtvInfQ411U5gwbErQ==&#34;: {&#xA;      &#34;id&#34;: &#34;PYQ8GtvInfQ411U5gwbErQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38545&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \&#34;let the host resolve the name\&#34; could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38545 https://bugzilla.redhat.com/show_bug.cgi?id=2241933 https://www.cve.org/CVERecord?id=CVE-2023-38545 https://nvd.nist.gov/vuln/detail/CVE-2023-38545 https://curl.se/docs/CVE-2023-38545.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38545.json https://access.redhat.com/errata/RHSA-2023:5763&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Pd5fn59ga3nlH8XsDKvDWA==&#34;: {&#xA;      &#34;id&#34;: &#34;Pd5fn59ga3nlH8XsDKvDWA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-36137&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. The Node.js Permission Model does not operate on file descriptors. However, operations such as fs.fchown or fs.fchmod can use a \&#34;read-only\&#34; file descriptor to change the owner and permissions of a file.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-36137 https://bugzilla.redhat.com/show_bug.cgi?id=2299281 https://www.cve.org/CVERecord?id=CVE-2024-36137 https://nvd.nist.gov/vuln/detail/CVE-2024-36137 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-36137.json https://access.redhat.com/errata/RHSA-2024:5815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.16.0-1.module+el9.4.0+22197+9e60f127&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PdGhfwK5tePs8ngzFuopoA==&#34;: {&#xA;      &#34;id&#34;: &#34;PdGhfwK5tePs8ngzFuopoA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46218&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl that verifies a given cookie domain against the Public Suffix List. This issue could allow a malicious HTTP server to set \&#34;super cookies\&#34; in curl that are passed back to more origins than what is otherwise allowed or possible.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T07:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46218 https://bugzilla.redhat.com/show_bug.cgi?id=2252030 https://www.cve.org/CVERecord?id=CVE-2023-46218 https://nvd.nist.gov/vuln/detail/CVE-2023-46218 https://curl.se/docs/CVE-2023-46218.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46218.json https://access.redhat.com/errata/RHSA-2024:1129&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PdNX5RN9keIsqOloxy7mkg==&#34;: {&#xA;      &#34;id&#34;: &#34;PdNX5RN9keIsqOloxy7mkg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2650&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL resulting in a possible denial of service while translating ASN.1 object identifiers. Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience long delays when processing messages, which may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2650 https://bugzilla.redhat.com/show_bug.cgi?id=2207947 https://www.cve.org/CVERecord?id=CVE-2023-2650 https://nvd.nist.gov/vuln/detail/CVE-2023-2650 https://www.openssl.org/news/secadv/20230530.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2650.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PdWXJaz3tjlEOUmbSqfsDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;PdWXJaz3tjlEOUmbSqfsDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12797&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL&#39;s RFC7250 Raw Public Key (RPK) authentication. This vulnerability allows man-in-the-middle (MITM) attacks via failure to abort TLS/DTLS handshakes when the server&#39;s RPK does not match the expected key despite the SSL_VERIFY_PEER verification mode being set.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-11T15:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12797 https://bugzilla.redhat.com/show_bug.cgi?id=2342757 https://www.cve.org/CVERecord?id=CVE-2024-12797 https://nvd.nist.gov/vuln/detail/CVE-2024-12797 https://openssl-library.org/news/secadv/20250211.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12797.json https://access.redhat.com/errata/RHSA-2025:1330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Pdc4LabMMVIl3+kSdEepMw==&#34;: {&#xA;      &#34;id&#34;: &#34;Pdc4LabMMVIl3+kSdEepMw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PgPRtFXcN+6zuIY77w+muQ==&#34;: {&#xA;      &#34;id&#34;: &#34;PgPRtFXcN+6zuIY77w+muQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4741&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in OpenSSL. Calling the OpenSSL API SSL_free_buffers function may cause memory to be accessed that was previously freed in some situations.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4741 https://bugzilla.redhat.com/show_bug.cgi?id=2283757 https://www.cve.org/CVERecord?id=CVE-2024-4741 https://nvd.nist.gov/vuln/detail/CVE-2024-4741 https://www.openssl.org/news/secadv/20240528.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4741.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PhzQEpAkCFfaNfVzGQzMgg==&#34;: {&#xA;      &#34;id&#34;: &#34;PhzQEpAkCFfaNfVzGQzMgg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-10041&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-10-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-10041 https://bugzilla.redhat.com/show_bug.cgi?id=2319212 https://www.cve.org/CVERecord?id=CVE-2024-10041 https://nvd.nist.gov/vuln/detail/CVE-2024-10041 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-10041.json https://access.redhat.com/errata/RHSA-2024:11250&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.5.1-21.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Po+GLdyrucAyVatfOmZxGg==&#34;: {&#xA;      &#34;id&#34;: &#34;Po+GLdyrucAyVatfOmZxGg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Pp6wwZ+94c04WPY1/Wy+4A==&#34;: {&#xA;      &#34;id&#34;: &#34;Pp6wwZ+94c04WPY1/Wy+4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61729&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-02T18:54:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61729 https://bugzilla.redhat.com/show_bug.cgi?id=2418462 https://www.cve.org/CVERecord?id=CVE-2025-61729 https://nvd.nist.gov/vuln/detail/CVE-2025-61729 https://go.dev/cl/725920 https://go.dev/issue/76445 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 https://pkg.go.dev/vuln/GO-2025-4155 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61729.json https://access.redhat.com/errata/RHSA-2026:0923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.5-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PqOWZHQu7W9hh0UlnMkHAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;PqOWZHQu7W9hh0UlnMkHAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69646&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. A local attacker can exploit this vulnerability by supplying a malicious input file containing malformed DWARF debug_rnglists data. This can cause the objdump tool to enter an unbounded logging loop, leading to excessive CPU and I/O usage and preventing analysis completion. This issue results in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69646 https://bugzilla.redhat.com/show_bug.cgi?id=2445264 https://www.cve.org/CVERecord?id=CVE-2025-69646 https://nvd.nist.gov/vuln/detail/CVE-2025-69646 https://sourceware.org/bugzilla/show_bug.cgi?id=33638 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=598704a00cbac5e85c2bedd363357b5bf6fcee33 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69646.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PrCrIesi0sSvMQjPpvxecw==&#34;: {&#xA;      &#34;id&#34;: &#34;PrCrIesi0sSvMQjPpvxecw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14512&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib&#39;s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14512 https://bugzilla.redhat.com/show_bug.cgi?id=2421339 https://www.cve.org/CVERecord?id=CVE-2025-14512 https://nvd.nist.gov/vuln/detail/CVE-2025-14512 https://gitlab.gnome.org/GNOME/glib/-/issues/3845 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14512.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PvgbBaq86gnOp8hffKEHhQ==&#34;: {&#xA;      &#34;id&#34;: &#34;PvgbBaq86gnOp8hffKEHhQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35385&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. When the `scp` command is used by a root user to download a file with the legacy protocol option (`-O`) and without preserving original file permissions (`-p`), the downloaded file can be installed with elevated privileges (setuid or setgid). This unexpected behavior could allow a malicious file to execute with higher permissions than intended, posing a security risk through potential privilege escalation.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:30:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35385 https://bugzilla.redhat.com/show_bug.cgi?id=2454469 https://www.cve.org/CVERecord?id=CVE-2026-35385 https://nvd.nist.gov/vuln/detail/CVE-2026-35385 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35385.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PwX0RLPO5W1w6VDjSgcV8A==&#34;: {&#xA;      &#34;id&#34;: &#34;PwX0RLPO5W1w6VDjSgcV8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3626&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the _TIFFmemset function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3626 https://bugzilla.redhat.com/show_bug.cgi?id=2142741 https://www.cve.org/CVERecord?id=CVE-2022-3626 https://nvd.nist.gov/vuln/detail/CVE-2022-3626 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3626.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Py++HyN8+aNZZa9dPe2rDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Py++HyN8+aNZZa9dPe2rDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;: {&#xA;      &#34;id&#34;: &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7264&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl, where libcurl&#39;s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7264 https://bugzilla.redhat.com/show_bug.cgi?id=2301888 https://www.cve.org/CVERecord?id=CVE-2024-7264 https://nvd.nist.gov/vuln/detail/CVE-2024-7264 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7264.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Q/06Mcx6TVo+ZKk4ymf7TA==&#34;: {&#xA;      &#34;id&#34;: &#34;Q/06Mcx6TVo+ZKk4ymf7TA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61732&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s &#39;cgo tool&#39;. This vulnerability arises from a discrepancy in how Go and C/C++ comments are parsed, which allows for malicious code to be hidden within comments and then \&#34;smuggled\&#34; into the compiled `cgo` binary. An attacker could exploit this to embed and execute arbitrary code, potentially leading to significant system compromise.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T03:42:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61732 https://bugzilla.redhat.com/show_bug.cgi?id=2437016 https://www.cve.org/CVERecord?id=CVE-2025-61732 https://nvd.nist.gov/vuln/detail/CVE-2025-61732 https://go.dev/cl/734220 https://go.dev/issue/76697 https://groups.google.com/g/golang-announce/c/K09ubi9FQFk https://pkg.go.dev/vuln/GO-2026-4433 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61732.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Q0D37bmhhLGtYILIAMgFXg==&#34;: {&#xA;      &#34;id&#34;: &#34;Q0D37bmhhLGtYILIAMgFXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2207&#34;,&#xA;      &#34;description&#34;: &#34;Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2207 https://bugzilla.redhat.com/show_bug.cgi?id=2102185 https://www.cve.org/CVERecord?id=CVE-2022-2207 https://nvd.nist.gov/vuln/detail/CVE-2022-2207 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2207.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Q1F3DVZZ3gpMNQT3yhbiSg==&#34;: {&#xA;      &#34;id&#34;: &#34;Q1F3DVZZ3gpMNQT3yhbiSg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-10911&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in libxslt while parsing xsl nodes that may lead to the dereference of expired pointers and application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-10911 https://bugzilla.redhat.com/show_bug.cgi?id=2397838 https://www.cve.org/CVERecord?id=CVE-2025-10911 https://nvd.nist.gov/vuln/detail/CVE-2025-10911 https://gitlab.gnome.org/GNOME/libxslt/-/issues/144 https://gitlab.gnome.org/GNOME/libxslt/-/merge_requests/77 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-10911.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxslt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Q2+f0ITzWPp+YCesnwp1Ng==&#34;: {&#xA;      &#34;id&#34;: &#34;Q2+f0ITzWPp+YCesnwp1Ng==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Q2EySKz2roj2mYOhGJQA3A==&#34;: {&#xA;      &#34;id&#34;: &#34;Q2EySKz2roj2mYOhGJQA3A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52005&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git. When cloning, fetching, or pushing from a server, informational or error messages are transported from the remote Git process to the client via a sideband channel. These messages are prefixed with \&#34;remote:\&#34; and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information or to mislead the user into executing untrusted scripts.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-15T17:35:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52005 https://bugzilla.redhat.com/show_bug.cgi?id=2338289 https://www.cve.org/CVERecord?id=CVE-2024-52005 https://nvd.nist.gov/vuln/detail/CVE-2024-52005 https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329 https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52005.json https://access.redhat.com/errata/RHSA-2025:7409&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.1-2.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;: {&#xA;      &#34;id&#34;: &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Q9syyD8a/4l/mc50UAvBnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Q9syyD8a/4l/mc50UAvBnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7592&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `http.cookies` module in the Python package. When parsing cookies that contain backslashes, under certain circumstances, the module uses an algorithm with quadratic complexity, leading to excessive CPU consumption.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7592 https://bugzilla.redhat.com/show_bug.cgi?id=2305879 https://www.cve.org/CVERecord?id=CVE-2024-7592 https://nvd.nist.gov/vuln/detail/CVE-2024-7592 https://github.com/python/cpython/issues/123067 https://github.com/python/cpython/pull/123075 https://mail.python.org/archives/list/security-announce@python.org/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7592.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QBD2bakyMRLlWNUWb7c8Ng==&#34;: {&#xA;      &#34;id&#34;: &#34;QBD2bakyMRLlWNUWb7c8Ng==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29402&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program that uses cgo. This can occur when running an untrusted module that contains directories with newline characters in their names. Modules that are retrieved using the go command, for example, via \&#34;go get\&#34;, are not affected. Modules retrieved using GOPATH-mode, for example, GO111MODULE=off may be affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29402 https://bugzilla.redhat.com/show_bug.cgi?id=2217562 https://www.cve.org/CVERecord?id=CVE-2023-29402 https://nvd.nist.gov/vuln/detail/CVE-2023-29402 https://go.dev/cl/501226 https://go.dev/issue/60167 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1839 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29402.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QBNxNqNCcUL/GHKqOh7Fyw==&#34;: {&#xA;      &#34;id&#34;: &#34;QBNxNqNCcUL/GHKqOh7Fyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27363&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in FreeType. In affected versions, an out-of-bounds write condition may be triggered when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value, causing it to wrap around and allocate a heap buffer that is too small. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This issue could result in arbitrary code execution or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-11T13:28:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27363 https://bugzilla.redhat.com/show_bug.cgi?id=2351357 https://www.cve.org/CVERecord?id=CVE-2025-27363 https://nvd.nist.gov/vuln/detail/CVE-2025-27363 https://www.facebook.com/security/advisories/cve-2025-27363 https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27363.json https://access.redhat.com/errata/RHSA-2025:3407&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;freetype&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.10.4-10.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QDYJ95dZNazClKtqoRJQeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;QDYJ95dZNazClKtqoRJQeQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22874&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s crypto/x509 package. This vulnerability allows improper certificate validation, bypassing policy constraints via using ExtKeyUsageAny in VerifyOptions.KeyUsages.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T16:42:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22874 https://bugzilla.redhat.com/show_bug.cgi?id=2372320 https://www.cve.org/CVERecord?id=CVE-2025-22874 https://nvd.nist.gov/vuln/detail/CVE-2025-22874 https://go.dev/cl/670375 https://go.dev/issue/73612 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A https://pkg.go.dev/vuln/GO-2025-3749 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22874.json https://access.redhat.com/errata/RHSA-2025:10676&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.4-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QHS4gwmQURKolJEnj/ZMHw==&#34;: {&#xA;      &#34;id&#34;: &#34;QHS4gwmQURKolJEnj/ZMHw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38546&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. This flaw allows an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38546 https://bugzilla.redhat.com/show_bug.cgi?id=2241938 https://access.redhat.com/errata/RHSA-2024:2101 https://www.cve.org/CVERecord?id=CVE-2023-38546 https://nvd.nist.gov/vuln/detail/CVE-2023-38546 https://curl.se/docs/CVE-2023-38546.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38546.json https://access.redhat.com/errata/RHSA-2023:5763&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QL7KLbo+Ri9Q4aoq0+/c2w==&#34;: {&#xA;      &#34;id&#34;: &#34;QL7KLbo+Ri9Q4aoq0+/c2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23920&#34;,&#xA;      &#34;description&#34;: &#34;An untrusted search path vulnerability exists in Node.js. \u003c19.6.1, \u003c18.14.1, \u003c16.19.1, and \u003c14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23920 https://bugzilla.redhat.com/show_bug.cgi?id=2172217 https://www.cve.org/CVERecord?id=CVE-2023-23920 https://nvd.nist.gov/vuln/detail/CVE-2023-23920 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23920.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QMVQFQxQO9E+szLpK5nZ9w==&#34;: {&#xA;      &#34;id&#34;: &#34;QMVQFQxQO9E+szLpK5nZ9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27143&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the cmd/compile package in the Go standard library. The compiler fails to correctly check for integer overflow or underflow in arithmetic operations involving loop induction variables. As a result, the compiler allows invalid memory indexing to occur at runtime, potentially leading to memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27143 https://bugzilla.redhat.com/show_bug.cgi?id=2456342 https://www.cve.org/CVERecord?id=CVE-2026-27143 https://nvd.nist.gov/vuln/detail/CVE-2026-27143 https://go.dev/cl/763765 https://go.dev/issue/78333 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4868 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27143.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QNVm3dpa9lFJUb6FBjjc1g==&#34;: {&#xA;      &#34;id&#34;: &#34;QNVm3dpa9lFJUb6FBjjc1g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-56171&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a use-after-free via a crafted XML document validated against an XML schema with certain identity constraints or a crafted XML schema.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-56171 https://bugzilla.redhat.com/show_bug.cgi?id=2346416 https://www.cve.org/CVERecord?id=CVE-2024-56171 https://nvd.nist.gov/vuln/detail/CVE-2024-56171 https://gitlab.gnome.org/GNOME/libxml2/-/issues/828 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-56171.json https://access.redhat.com/errata/RHSA-2025:2679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_5.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QNeXj0/uAU3vww6deBbkrw==&#34;: {&#xA;      &#34;id&#34;: &#34;QNeXj0/uAU3vww6deBbkrw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4641&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4641 https://bugzilla.redhat.com/show_bug.cgi?id=2215945 https://www.cve.org/CVERecord?id=CVE-2023-4641 https://nvd.nist.gov/vuln/detail/CVE-2023-4641 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4641.json https://access.redhat.com/errata/RHSA-2023:6632&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:4.9-8.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QNrS4atSfp1tFVuWE/Cnqg==&#34;: {&#xA;      &#34;id&#34;: &#34;QNrS4atSfp1tFVuWE/Cnqg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4775&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-24T14:33:35Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4775 https://bugzilla.redhat.com/show_bug.cgi?id=2450768 https://www.cve.org/CVERecord?id=CVE-2026-4775 https://nvd.nist.gov/vuln/detail/CVE-2026-4775 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4775.json https://access.redhat.com/errata/RHSA-2026:12271&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-15.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QPsg6Jr0bVMm0tr2j4YMwA==&#34;: {&#xA;      &#34;id&#34;: &#34;QPsg6Jr0bVMm0tr2j4YMwA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4602&#34;,&#xA;      &#34;description&#34;: &#34;FileInfo can escape from a Root in os&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:03:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://go.dev/issue/77827 https://go.dev/cl/749480&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.25.8&#34;&#xA;    },&#xA;    &#34;QQ1upjXEDW7OiB4aR8O/8A==&#34;: {&#xA;      &#34;id&#34;: &#34;QQ1upjXEDW7OiB4aR8O/8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-overload&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.31-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QSEpEyTM9A7rsX/qx644wQ==&#34;: {&#xA;      &#34;id&#34;: &#34;QSEpEyTM9A7rsX/qx644wQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5363&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL in how it processes key and initialization vector (IV) lengths. This issue can lead to potential truncation or overruns during the initialization of some symmetric ciphers. A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. Both truncations and overruns of the key and the IV will produce incorrect results and could, in some cases, trigger a memory exception.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-24T15:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5363 https://bugzilla.redhat.com/show_bug.cgi?id=2243839 https://www.cve.org/CVERecord?id=CVE-2023-5363 https://nvd.nist.gov/vuln/detail/CVE-2023-5363 https://www.openssl.org/news/secadv/20231024.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5363.json https://access.redhat.com/errata/RHSA-2024:0310&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-25.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QSP4YGVknCXnnhDrDAxftg==&#34;: {&#xA;      &#34;id&#34;: &#34;QSP4YGVknCXnnhDrDAxftg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QTcHwvmTXpVKkHS0xdfb9g==&#34;: {&#xA;      &#34;id&#34;: &#34;QTcHwvmTXpVKkHS0xdfb9g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32021&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw allows an unauthenticated attacker to place a repository on their target&#39;s local system that contains symlinks. During the cloning process, Git could be tricked into creating hardlinked arbitrary files into their repository&#39;s objects/ directory, impacting availability and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32021 https://bugzilla.redhat.com/show_bug.cgi?id=2280484 https://www.cve.org/CVERecord?id=CVE-2024-32021 https://nvd.nist.gov/vuln/detail/CVE-2024-32021 https://github.com/git/git/security/advisories/GHSA-mvxm-9j2h-qjx7 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32021.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QX/cK7dAcSVwXa3qFcSUeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;QX/cK7dAcSVwXa3qFcSUeQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T17:48:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68121 https://bugzilla.redhat.com/show_bug.cgi?id=2437111 https://www.cve.org/CVERecord?id=CVE-2025-68121 https://nvd.nist.gov/vuln/detail/CVE-2025-68121 https://go.dev/cl/737700 https://go.dev/issue/77217 https://groups.google.com/g/golang-announce/c/K09ubi9FQFk https://pkg.go.dev/vuln/GO-2026-4337 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68121.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QX1bQ/CZA5mRbcqjpTc9aA==&#34;: {&#xA;      &#34;id&#34;: &#34;QX1bQ/CZA5mRbcqjpTc9aA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35065&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35065 https://bugzilla.redhat.com/show_bug.cgi?id=2156324 https://www.cve.org/CVERecord?id=CVE-2021-35065 https://nvd.nist.gov/vuln/detail/CVE-2021-35065 https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35065.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.3-1.16.19.1.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QX9gQ7esz1e73iQHmwojXA==&#34;: {&#xA;      &#34;id&#34;: &#34;QX9gQ7esz1e73iQHmwojXA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3973&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-11-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3973 https://bugzilla.redhat.com/show_bug.cgi?id=2025059 https://www.cve.org/CVERecord?id=CVE-2021-3973 https://nvd.nist.gov/vuln/detail/CVE-2021-3973 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3973.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QXekSyzWiuaI8YTxDgngHw==&#34;: {&#xA;      &#34;id&#34;: &#34;QXekSyzWiuaI8YTxDgngHw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3903&#34;,&#xA;      &#34;description&#34;: &#34;vim is vulnerable to Heap-based Buffer Overflow&#34;,&#xA;      &#34;issued&#34;: &#34;2021-10-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3903 https://bugzilla.redhat.com/show_bug.cgi?id=2018558 https://www.cve.org/CVERecord?id=CVE-2021-3903 https://nvd.nist.gov/vuln/detail/CVE-2021-3903 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3903.json https://access.redhat.com/errata/RHSA-2024:9405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-21.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QY4aLgQQjP1oPPp38ArMrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;QY4aLgQQjP1oPPp38ArMrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QZ7uKIt3KkZJfzRLCLWsIg==&#34;: {&#xA;      &#34;id&#34;: &#34;QZ7uKIt3KkZJfzRLCLWsIg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25629&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25629 https://bugzilla.redhat.com/show_bug.cgi?id=2265713 https://www.cve.org/CVERecord?id=CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629 https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25629.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QZQvSq0tzcJY8GfiU/aXpg==&#34;: {&#xA;      &#34;id&#34;: &#34;QZQvSq0tzcJY8GfiU/aXpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8176&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtiff. The `get_histogram` function in `file/tiffmedian.c` exhibits a use-after-free condition when processing a specially crafted file, allowing a local attacker to trigger memory corruption. This manipulation results in a use-after-free vulnerability, and can lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-26T03:32:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8176 https://bugzilla.redhat.com/show_bug.cgi?id=2383598 https://www.cve.org/CVERecord?id=CVE-2025-8176 https://nvd.nist.gov/vuln/detail/CVE-2025-8176 http://www.libtiff.org/ https://gitlab.com/libtiff/libtiff/-/commit/fe10872e53efba9cc36c66ac4ab3b41a839d5172 https://gitlab.com/libtiff/libtiff/-/issues/707 https://gitlab.com/libtiff/libtiff/-/merge_requests/727 https://vuldb.com/?ctiid.317590 https://vuldb.com/?id.317590 https://vuldb.com/?submit.621796 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8176.json https://access.redhat.com/errata/RHSA-2025:20956&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-15.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QaKFgrY/cUPl6Ls/xAwlFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;QaKFgrY/cUPl6Ls/xAwlFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11495&#34;,&#xA;      &#34;description&#34;: &#34;A heap based buffer overflow flaw has been discovered in the GNU Binutils package. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-08T20:02:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11495 https://bugzilla.redhat.com/show_bug.cgi?id=2402584 https://www.cve.org/CVERecord?id=CVE-2025-11495 https://nvd.nist.gov/vuln/detail/CVE-2025-11495 https://sourceware.org/bugzilla/attachment.cgi?id=16393 https://sourceware.org/bugzilla/show_bug.cgi?id=33502 https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0 https://vuldb.com/?ctiid.327620 https://vuldb.com/?id.327620 https://vuldb.com/?submit.668290 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11495.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QbgvVzhz2dr5BDvAUM6wFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;QbgvVzhz2dr5BDvAUM6wFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2304&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow vulnerability was found in Vim&#39;s spell_dump_compl() function of the src/spell.c file. This issue occurs because the spell dump goes beyond the end of an array when crafted input is processed. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2304 https://bugzilla.redhat.com/show_bug.cgi?id=2104416 https://www.cve.org/CVERecord?id=CVE-2022-2304 https://nvd.nist.gov/vuln/detail/CVE-2022-2304 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2304.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;: {&#xA;      &#34;id&#34;: &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14087&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14087 https://bugzilla.redhat.com/show_bug.cgi?id=2419093 https://www.cve.org/CVERecord?id=CVE-2025-14087 https://nvd.nist.gov/vuln/detail/CVE-2025-14087 https://gitlab.gnome.org/GNOME/glib/-/issues/3834 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14087.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Qe1reyLPtQVZ5wKqKa9jQA==&#34;: {&#xA;      &#34;id&#34;: &#34;Qe1reyLPtQVZ5wKqKa9jQA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-0213&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim.  The vulnerability occurs due to not checking the length for the NameBuff function, which can lead to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-01-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-0213 https://bugzilla.redhat.com/show_bug.cgi?id=2043779 https://www.cve.org/CVERecord?id=CVE-2022-0213 https://nvd.nist.gov/vuln/detail/CVE-2022-0213 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-0213.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QgRg8usqYLpC2SzTmhUKsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;QgRg8usqYLpC2SzTmhUKsQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22134&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. Due to Vim not properly terminating visual mode, a heap buffer overflow condition may be triggered when a user switches buffers using the `:all` command. This issue may lead to unexpected behavior, such as an application crash or memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-13T20:41:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22134 https://bugzilla.redhat.com/show_bug.cgi?id=2337437 https://www.cve.org/CVERecord?id=CVE-2025-22134 https://nvd.nist.gov/vuln/detail/CVE-2025-22134 https://github.com/vim/vim/commit/c9a1e257f1630a0866447e53a564f7ff96a80ead https://github.com/vim/vim/security/advisories/GHSA-5rgf-26wj-48v8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22134.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QgyYiUqrv2nc1+RqO1bM4A==&#34;: {&#xA;      &#34;id&#34;: &#34;QgyYiUqrv2nc1+RqO1bM4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2602&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2602 https://bugzilla.redhat.com/show_bug.cgi?id=2209114 https://www.cve.org/CVERecord?id=CVE-2023-2602 https://nvd.nist.gov/vuln/detail/CVE-2023-2602 https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2602.json https://access.redhat.com/errata/RHSA-2023:5071&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.48-9.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QhESIu1eoXqoSNW7jNhlZg==&#34;: {&#xA;      &#34;id&#34;: &#34;QhESIu1eoXqoSNW7jNhlZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-overload&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.31-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Qimhraux3dZtFrPRbNJqyw==&#34;: {&#xA;      &#34;id&#34;: &#34;Qimhraux3dZtFrPRbNJqyw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-2043&#34;,&#xA;      &#34;description&#34;: &#34;Improper handling of special tags within script contexts in html/template&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-07T16:11:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/62197 https://go.dev/cl/526157 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.20.8&#34;&#xA;    },&#xA;    &#34;QireWdVPs8MzNOJ1scQvdA==&#34;: {&#xA;      &#34;id&#34;: &#34;QireWdVPs8MzNOJ1scQvdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QjS6b4li9vRMvS2l49iyfw==&#34;: {&#xA;      &#34;id&#34;: &#34;QjS6b4li9vRMvS2l49iyfw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27534&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27534 https://bugzilla.redhat.com/show_bug.cgi?id=2179069 https://www.cve.org/CVERecord?id=CVE-2023-27534 https://nvd.nist.gov/vuln/detail/CVE-2023-27534 https://curl.se/docs/CVE-2023-27534.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27534.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Qmv/HFfBCKuu6eMPjatnfw==&#34;: {&#xA;      &#34;id&#34;: &#34;Qmv/HFfBCKuu6eMPjatnfw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Qp7j7oFs4UbVUHVGblDM1w==&#34;: {&#xA;      &#34;id&#34;: &#34;Qp7j7oFs4UbVUHVGblDM1w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4032&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The ipaddress module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. Due to this issue, it is possible that values will not be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4032 https://bugzilla.redhat.com/show_bug.cgi?id=2292921 https://www.cve.org/CVERecord?id=CVE-2024-4032 https://nvd.nist.gov/vuln/detail/CVE-2024-4032 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4032.json https://access.redhat.com/errata/RHSA-2024:4779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QqK1O3FCNB9QbClJ7bZ6YA==&#34;: {&#xA;      &#34;id&#34;: &#34;QqK1O3FCNB9QbClJ7bZ6YA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6119&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6119 https://bugzilla.redhat.com/show_bug.cgi?id=2306158 https://www.cve.org/CVERecord?id=CVE-2024-6119 https://nvd.nist.gov/vuln/detail/CVE-2024-6119 https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6119.json https://access.redhat.com/errata/RHSA-2024:6783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-28.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QqNagWxBuciWgmqsaHDwZw==&#34;: {&#xA;      &#34;id&#34;: &#34;QqNagWxBuciWgmqsaHDwZw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23920&#34;,&#xA;      &#34;description&#34;: &#34;An untrusted search path vulnerability exists in Node.js. \u003c19.6.1, \u003c18.14.1, \u003c16.19.1, and \u003c14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23920 https://bugzilla.redhat.com/show_bug.cgi?id=2172217 https://www.cve.org/CVERecord?id=CVE-2023-23920 https://nvd.nist.gov/vuln/detail/CVE-2023-23920 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23920.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Qr2/3ufYTxjXiJuEKM7I7w==&#34;: {&#xA;      &#34;id&#34;: &#34;Qr2/3ufYTxjXiJuEKM7I7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3358&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL, where it incorrectly handles legacy custom ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other similarly named encryption and decryption initialization functions). Instead of using the custom cipher directly, it incorrectly tries to fetch an equivalent cipher from the available providers. An equivalent cipher is found based on the NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a given cipher. However, it is possible for an application to incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef is used this way, the OpenSSL encryption/decryption initialization function will match the NULL cipher as equivalent and fetch this from the available providers. This is successful if the default provider has been loaded (or if a third-party provider has been loaded that offers this cipher). Using the NULL cipher means that the plaintext is emitted as the ciphertext.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3358 https://bugzilla.redhat.com/show_bug.cgi?id=2134740 https://www.cve.org/CVERecord?id=CVE-2022-3358 https://nvd.nist.gov/vuln/detail/CVE-2022-3358 https://www.openssl.org/news/secadv/20221011.txt https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3358.json https://access.redhat.com/errata/RHSA-2023:2523&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-6.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QrDxAdiYzNE7ZZrkfYGiQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;QrDxAdiYzNE7ZZrkfYGiQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QsR+n6O0ULfYayvahAaltg==&#34;: {&#xA;      &#34;id&#34;: &#34;QsR+n6O0ULfYayvahAaltg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-34969&#34;,&#xA;      &#34;description&#34;: &#34;An assertion failure vulnerability was found in D-Bus. This issue occurs when a privileged monitoring connection (dbus-monitor, busctl monitor, gdbus monitor, or similar) is active, and a message from the bus driver cannot be delivered to a client connection due to \u003cdeny\u003e rules or outgoing message quota. If a privileged user with control over the dbus-daemon is monitoring the message bus traffic using the Monitoring clients like the dbus-monitor or busctl monitor interfaces, then an unprivileged local user with the ability to connect to the same dbus-daemon could send specially crafted request, causing a dbus-daemon to crash, resulting in a denial of service under some circumstances.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-34969 https://bugzilla.redhat.com/show_bug.cgi?id=2213166 https://www.cve.org/CVERecord?id=CVE-2023-34969 https://nvd.nist.gov/vuln/detail/CVE-2023-34969 https://gitlab.freedesktop.org/dbus/dbus/-/issues/457 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-34969.json https://access.redhat.com/errata/RHSA-2023:4569&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:1.12.20-7.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QsiHUYCa/QcMQzBitOtxXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;QsiHUYCa/QcMQzBitOtxXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23085&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23085 https://bugzilla.redhat.com/show_bug.cgi?id=2342618 https://www.cve.org/CVERecord?id=CVE-2025-23085 https://nvd.nist.gov/vuln/detail/CVE-2025-23085 https://nodejs.org/pt/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23085.json https://access.redhat.com/errata/RHSA-2025:1443&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.18.2-1.module+el9.5.0+22758+4ad2c198&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QskDoDnTSvrQeDXklM4YOw==&#34;: {&#xA;      &#34;id&#34;: &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4105&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4105 https://bugzilla.redhat.com/show_bug.cgi?id=2447262 https://www.cve.org/CVERecord?id=CVE-2026-4105 https://nvd.nist.gov/vuln/detail/CVE-2026-4105 https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4105.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QvPHR+YbqNjRrCZl0Ui1yQ==&#34;: {&#xA;      &#34;id&#34;: &#34;QvPHR+YbqNjRrCZl0Ui1yQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-17095&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in LibTIFF, where a heap-based buffer overflow in the pal2rgb function in tools/pal2rgb.c can lead to a denial of service, a remote attacker could exploit this flaw by persuading a victim to open a specially crafted file, causing the application to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2017-11-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2017-17095 https://bugzilla.redhat.com/show_bug.cgi?id=1524284 https://www.cve.org/CVERecord?id=CVE-2017-17095 https://nvd.nist.gov/vuln/detail/CVE-2017-17095 https://security.access.redhat.com/data/csaf/v2/vex/2017/cve-2017-17095.json https://access.redhat.com/errata/RHSA-2023:6575&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QwkBpizF3mo2JpevPMDeaw==&#34;: {&#xA;      &#34;id&#34;: &#34;QwkBpizF3mo2JpevPMDeaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23165&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ReadFileUtf8 internal binding of Node.js. This vulnerability can allow an attacker to cause an application denial of service via repeated file read operations that trigger an unrecoverable memory leak due to a corrupted pointer in the underlying file system binding.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23165 https://bugzilla.redhat.com/show_bug.cgi?id=2367162 https://www.cve.org/CVERecord?id=CVE-2025-23165 https://nvd.nist.gov/vuln/detail/CVE-2025-23165 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23165.json https://access.redhat.com/errata/RHSA-2025:8467&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.2-1.22.16.0.1.module+el9.6.0+23151+b1496e9d&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QxQ47SEMl+UFCOv8XVwx9A==&#34;: {&#xA;      &#34;id&#34;: &#34;QxQ47SEMl+UFCOv8XVwx9A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libstdc++-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Qzh+CSMQ9O8Q+LoKZ+3MuA==&#34;: {&#xA;      &#34;id&#34;: &#34;Qzh+CSMQ9O8Q+LoKZ+3MuA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29458&#34;,&#xA;      &#34;description&#34;: &#34;A segmentation fault vulnerability was found in ncurses&#39;s convert_strings() function of tinfo/read_entry.c file. This flaw occurs due to corrupted terminfo data, triggering an out-of-bounds read error.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-04-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-29458 https://bugzilla.redhat.com/show_bug.cgi?id=2076483 https://www.cve.org/CVERecord?id=CVE-2022-29458 https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-29458.json https://access.redhat.com/errata/RHSA-2025:12876&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:6.2-10.20210508.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QznSXY89jmEtP62PhxgH1g==&#34;: {&#xA;      &#34;id&#34;: &#34;QznSXY89jmEtP62PhxgH1g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43786&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43786 https://bugzilla.redhat.com/show_bug.cgi?id=2242253 https://www.cve.org/CVERecord?id=CVE-2023-43786 https://nvd.nist.gov/vuln/detail/CVE-2023-43786 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43786.json https://access.redhat.com/errata/RHSA-2024:2145&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;R+49XKdX2qOOaoykdLSbyw==&#34;: {&#xA;      &#34;id&#34;: &#34;R+49XKdX2qOOaoykdLSbyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;R/1pH8uHGa3Vo+JZ4isuOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;R/1pH8uHGa3Vo+JZ4isuOQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45341&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/x509 package of the Golang standard library. A certificate with a URI, which has a IPv6 address with a zone ID, may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI; this issue only affects users of private PKIs that make use of URIs.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45341 https://bugzilla.redhat.com/show_bug.cgi?id=2341750 https://www.cve.org/CVERecord?id=CVE-2024-45341 https://nvd.nist.gov/vuln/detail/CVE-2024-45341 https://github.com/golang/go/commit/2b2314e9f6103de322b2e247387c8b01fd0cd5a4 https://github.com/golang/go/issues/71156 https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45341.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;R1Akf7BYKFH+Usf+3IS0Cg==&#34;: {&#xA;      &#34;id&#34;: &#34;R1Akf7BYKFH+Usf+3IS0Cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32020&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw allows an unauthenticated attacker to place a specialized repository on their target&#39;s local system. For performance reasons, Git uses hardlinks when cloning a repository located on the same disk. However, if the repo being cloned is owned by a different user, this can introduce a security risk. At any time in the future, the original repo owner could rewrite the hardlinked files in the cloned user&#39;s repo.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32020 https://bugzilla.redhat.com/show_bug.cgi?id=2280466 https://www.cve.org/CVERecord?id=CVE-2024-32020 https://nvd.nist.gov/vuln/detail/CVE-2024-32020 https://github.com/git/git/security/advisories/GHSA-5rfh-556j-fhgj https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32020.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;R1x4adkbkgVhxc9hzgUZcA==&#34;: {&#xA;      &#34;id&#34;: &#34;R1x4adkbkgVhxc9hzgUZcA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25260&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference vulnerability in the elfutils library has been discovered. This vulnerability occurs within the handle_verdef() function in the readelf.c source file. A NULL pointer dereference typically happens when a program attempts to access memory using a pointer that is not pointing anywhere (i.e., it&#39;s NULL), leading to a crash or potentially exploitable behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25260 https://bugzilla.redhat.com/show_bug.cgi?id=2265194 https://www.cve.org/CVERecord?id=CVE-2024-25260 https://nvd.nist.gov/vuln/detail/CVE-2024-25260 https://github.com/schsiung/fuzzer_issues/issues/1 https://sourceware.org/bugzilla/show_bug.cgi?id=31058 https://sourceware.org/elfutils/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25260.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;elfutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;R6drGbgnzqKGDiX/RNUdqw==&#34;: {&#xA;      &#34;id&#34;: &#34;R6drGbgnzqKGDiX/RNUdqw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0553&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0553 https://bugzilla.redhat.com/show_bug.cgi?id=2258412 https://www.cve.org/CVERecord?id=CVE-2024-0553 https://nvd.nist.gov/vuln/detail/CVE-2024-0553 https://gitlab.com/gnutls/gnutls/-/issues/1522 https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0553.json https://access.redhat.com/errata/RHSA-2024:0533&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.7.6-23.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;R7IaseHP2Jo3rY8+KZLpFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;R7IaseHP2Jo3rY8+KZLpFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-26T01:07:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27904 https://bugzilla.redhat.com/show_bug.cgi?id=2442922 https://www.cve.org/CVERecord?id=CVE-2026-27904 https://nvd.nist.gov/vuln/detail/CVE-2026-27904 https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27904.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.2-1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;R7XEe59RfqPZwHJmDbOyww==&#34;: {&#xA;      &#34;id&#34;: &#34;R7XEe59RfqPZwHJmDbOyww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35939&#34;,&#xA;      &#34;description&#34;: &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35939 https://bugzilla.redhat.com/show_bug.cgi?id=1964129 https://www.cve.org/CVERecord?id=CVE-2021-35939 https://nvd.nist.gov/vuln/detail/CVE-2021-35939 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35939.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;R9lgi90skf6A+gEQ2Lu8dg==&#34;: {&#xA;      &#34;id&#34;: &#34;R9lgi90skf6A+gEQ2Lu8dg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-DynaLoader&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.47-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RA9ILX3H27ou2ro1GzHq8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;RA9ILX3H27ou2ro1GzHq8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-1394&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \&#34;return nil, nil, fail(...)\&#34; pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-1394 https://bugzilla.redhat.com/show_bug.cgi?id=2262921 https://www.cve.org/CVERecord?id=CVE-2024-1394 https://nvd.nist.gov/vuln/detail/CVE-2024-1394 https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136 https://github.com/golang-fips/openssl/security/advisories/GHSA-78hx-gp6g-7mj6 https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f https://pkg.go.dev/vuln/GO-2024-2660 https://vuln.go.dev/ID/GO-2024-2660.json https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-1394.json https://access.redhat.com/errata/RHSA-2024:1462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-2.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RATpPhLUqjEbe+XxyYxOOw==&#34;: {&#xA;      &#34;id&#34;: &#34;RATpPhLUqjEbe+XxyYxOOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2257&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim, which is vulnerable to an out-of-bounds read in the msg_outtrans_special function. This flaw allows a specially crafted file to crash software or execute code when opened in vim.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2257 https://bugzilla.redhat.com/show_bug.cgi?id=2103133 https://www.cve.org/CVERecord?id=CVE-2022-2257 https://nvd.nist.gov/vuln/detail/CVE-2022-2257 https://huntr.dev/bounties/ca581f80-03ba-472a-b820-78f7fd05fe89/ https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2257.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RCa1Bj2enE6hnHOgI0Hpsw==&#34;: {&#xA;      &#34;id&#34;: &#34;RCa1Bj2enE6hnHOgI0Hpsw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-26T01:07:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27904 https://bugzilla.redhat.com/show_bug.cgi?id=2442922 https://www.cve.org/CVERecord?id=CVE-2026-27904 https://nvd.nist.gov/vuln/detail/CVE-2026-27904 https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27904.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.2-1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RDdKN1sSPMFiFxzJJm3X1g==&#34;: {&#xA;      &#34;id&#34;: &#34;RDdKN1sSPMFiFxzJJm3X1g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26996&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-20T03:05:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26996 https://bugzilla.redhat.com/show_bug.cgi?id=2441268 https://www.cve.org/CVERecord?id=CVE-2026-26996 https://nvd.nist.gov/vuln/detail/CVE-2026-26996 https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26996.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.2-1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RDlpzaleAPnYWwZyjvoRug==&#34;: {&#xA;      &#34;id&#34;: &#34;RDlpzaleAPnYWwZyjvoRug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-3596&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-3596 https://bugzilla.redhat.com/show_bug.cgi?id=2263240 https://www.cve.org/CVERecord?id=CVE-2024-3596 https://nvd.nist.gov/vuln/detail/CVE-2024-3596 https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/ https://datatracker.ietf.org/doc/html/rfc2865 https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt https://www.blastradius.fail/ https://www.kb.cert.org/vuls/id/456537 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-3596.json https://access.redhat.com/errata/RHSA-2024:9474&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-4.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RFeq5rwe+sxgyWgUXeEitA==&#34;: {&#xA;      &#34;id&#34;: &#34;RFeq5rwe+sxgyWgUXeEitA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0523&#34;,&#xA;      &#34;description&#34;: &#34;Stack exhaustion when unmarshaling certain documents in encoding/xml&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-20T20:52:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/417061 https://go.googlesource.com/go/+/c4c1993fd2a5b26fe45c09592af6d3388a3b2e08 https://go.dev/issue/53611 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.4&#34;&#xA;    },&#xA;    &#34;RH0QKqHuyNcotxvkkCiTBA==&#34;: {&#xA;      &#34;id&#34;: &#34;RH0QKqHuyNcotxvkkCiTBA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45336&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45336 https://bugzilla.redhat.com/show_bug.cgi?id=2341751 https://www.cve.org/CVERecord?id=CVE-2024-45336 https://nvd.nist.gov/vuln/detail/CVE-2024-45336 https://github.com/golang/go/issues/70530 https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45336.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;: {&#xA;      &#34;id&#34;: &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6732&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability occurs when the library processes a specially crafted XML Schema Definition (XSD) validated document that includes an internal entity reference. An attacker could exploit this by providing a malicious document, leading to a type confusion error that causes the application to crash. This results in a denial of service (DoS), making the affected system or application unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6732 https://bugzilla.redhat.com/show_bug.cgi?id=2461300 https://www.cve.org/CVERecord?id=CVE-2026-6732 https://nvd.nist.gov/vuln/detail/CVE-2026-6732 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1097 https://gitlab.gnome.org/GNOME/libxml2/-/merge_requests/411 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6732.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RJa5WIC77pr9MGY1RZloTw==&#34;: {&#xA;      &#34;id&#34;: &#34;RJa5WIC77pr9MGY1RZloTw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21711&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The Node.js Permission Model, designed to restrict network access, incorrectly omits permission checks for Unix Domain Socket (UDS) server operations. This allows local code, even when explicitly denied network access, to create and expose inter-process communication (IPC) endpoints. As a result, unauthorized communication can occur between processes on the same host, bypassing the intended network security restrictions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21711 https://bugzilla.redhat.com/show_bug.cgi?id=2453158 https://www.cve.org/CVERecord?id=CVE-2026-21711 https://nvd.nist.gov/vuln/detail/CVE-2026-21711 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21711.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RJziShukaon2ShF1sKdneQ==&#34;: {&#xA;      &#34;id&#34;: &#34;RJziShukaon2ShF1sKdneQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28757&#34;,&#xA;      &#34;description&#34;: &#34;An XML Entity Expansion flaw was found in libexpat. This flaw allows an attacker to cause a denial of service when there is an isolated use of external parsers.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28757 https://bugzilla.redhat.com/show_bug.cgi?id=2268766 https://www.cve.org/CVERecord?id=CVE-2024-28757 https://nvd.nist.gov/vuln/detail/CVE-2024-28757 https://github.com/libexpat/libexpat/issues/839 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28757.json https://access.redhat.com/errata/RHSA-2024:1530&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-1.el9_3.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RLGDcCcECNxfaKqTkhDvew==&#34;: {&#xA;      &#34;id&#34;: &#34;RLGDcCcECNxfaKqTkhDvew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23920&#34;,&#xA;      &#34;description&#34;: &#34;An untrusted search path vulnerability exists in Node.js. \u003c19.6.1, \u003c18.14.1, \u003c16.19.1, and \u003c14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23920 https://bugzilla.redhat.com/show_bug.cgi?id=2172217 https://www.cve.org/CVERecord?id=CVE-2023-23920 https://nvd.nist.gov/vuln/detail/CVE-2023-23920 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23920.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RLfmH4oizoEHB59VpAV6Kg==&#34;: {&#xA;      &#34;id&#34;: &#34;RLfmH4oizoEHB59VpAV6Kg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-30203&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Emacs. When Emacs is used as an email client, inline MIME attachments are considered to be trusted by default, allowing a crafted LaTeX document to exhaust the disk space or the inodes allocated for the partition where the /tmp directory is located. This issue possibly results in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-30203 https://bugzilla.redhat.com/show_bug.cgi?id=2280296 https://www.cve.org/CVERecord?id=CVE-2024-30203 https://nvd.nist.gov/vuln/detail/CVE-2024-30203 https://www.openwall.com/lists/oss-security/2024/03/25/2 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-30203.json https://access.redhat.com/errata/RHSA-2024:9302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:27.2-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RPlldG/r8WWd2UCSZ1vzsg==&#34;: {&#xA;      &#34;id&#34;: &#34;RPlldG/r8WWd2UCSZ1vzsg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46218&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl that verifies a given cookie domain against the Public Suffix List. This issue could allow a malicious HTTP server to set \&#34;super cookies\&#34; in curl that are passed back to more origins than what is otherwise allowed or possible.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T07:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46218 https://bugzilla.redhat.com/show_bug.cgi?id=2252030 https://www.cve.org/CVERecord?id=CVE-2023-46218 https://nvd.nist.gov/vuln/detail/CVE-2023-46218 https://curl.se/docs/CVE-2023-46218.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46218.json https://access.redhat.com/errata/RHSA-2024:1129&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RReWBnQmCp2XJDUh6xioRQ==&#34;: {&#xA;      &#34;id&#34;: &#34;RReWBnQmCp2XJDUh6xioRQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0798&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractContigSamplesShifted8bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0798 https://bugzilla.redhat.com/show_bug.cgi?id=2170157 https://www.cve.org/CVERecord?id=CVE-2023-0798 https://nvd.nist.gov/vuln/detail/CVE-2023-0798 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0798.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RRtBD+EuTLmzasgAaBJyZw==&#34;: {&#xA;      &#34;id&#34;: &#34;RRtBD+EuTLmzasgAaBJyZw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11081&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in GNU bin utilities. This issue affects the function dump_dwarf_section of the file binutils/objdump.c. Performing manipulation results in out-of-bounds read. The attack is only possible with local access.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-27T22:02:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11081 https://bugzilla.redhat.com/show_bug.cgi?id=2399944 https://www.cve.org/CVERecord?id=CVE-2025-11081 https://nvd.nist.gov/vuln/detail/CVE-2025-11081 https://github.com/user-attachments/files/20623354/hdf5_crash_3.txt https://sourceware.org/bugzilla/show_bug.cgi?id=33406 https://sourceware.org/bugzilla/show_bug.cgi?id=33406#c2 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b https://vuldb.com/?ctiid.326122 https://vuldb.com/?id.326122 https://vuldb.com/?submit.661275 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11081.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RTmPkhx0MCxt8vC1skZm/A==&#34;: {&#xA;      &#34;id&#34;: &#34;RTmPkhx0MCxt8vC1skZm/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59466&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in Node.js error handling where \&#34;Maximum call stack size exceeded\&#34; errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(&#39;uncaughtException&#39;)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59466 https://bugzilla.redhat.com/show_bug.cgi?id=2431343 https://www.cve.org/CVERecord?id=CVE-2025-59466 https://nvd.nist.gov/vuln/detail/CVE-2025-59466 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59466.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RU6xHn/9SV8lotyX3JW1ZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;RU6xHn/9SV8lotyX3JW1ZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4904 https://bugzilla.redhat.com/show_bug.cgi?id=2168631 https://www.cve.org/CVERecord?id=CVE-2022-4904 https://nvd.nist.gov/vuln/detail/CVE-2022-4904 https://github.com/c-ares/c-ares/issues/496 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4904.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RUDcnDBVSmf+/LWMe4Tqgw==&#34;: {&#xA;      &#34;id&#34;: &#34;RUDcnDBVSmf+/LWMe4Tqgw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3826&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Libiberty. A heap and stack buffer overflow found in the dlang_lname function in d-demangle.c leads to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-09-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3826 https://bugzilla.redhat.com/show_bug.cgi?id=2122627 https://www.cve.org/CVERecord?id=CVE-2021-3826 https://nvd.nist.gov/vuln/detail/CVE-2021-3826 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3826.json https://access.redhat.com/errata/RHSA-2023:6372&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb-headless&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:10.2-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RXSYUreBGXQz5Vll3C130A==&#34;: {&#xA;      &#34;id&#34;: &#34;RXSYUreBGXQz5Vll3C130A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Rd2hVVbUws+mcvoC7DaoiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Rd2hVVbUws+mcvoC7DaoiQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4292&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free flaw was found in Vim&#39;s did_set_spelllang() function of the spell.c file. This issue occurs because vim uses freed memory after SpellFileMissing autocmd uses bwipe. This could allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free issue that causes an application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4292 https://bugzilla.redhat.com/show_bug.cgi?id=2151558 https://www.cve.org/CVERecord?id=CVE-2022-4292 https://nvd.nist.gov/vuln/detail/CVE-2022-4292 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4292.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Rf7m+dbWxZxBNm1A9nfdqg==&#34;: {&#xA;      &#34;id&#34;: &#34;Rf7m+dbWxZxBNm1A9nfdqg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RfXeDDRCykmZZMDXVfaGtg==&#34;: {&#xA;      &#34;id&#34;: &#34;RfXeDDRCykmZZMDXVfaGtg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32415&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libxml2 library. A heap-based underflow can be triggered when a crafted XML document is validated against an XML schema with certain identity constraints or when a crafted XML schema is used, causing a crash to the application linked to the library and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32415 https://bugzilla.redhat.com/show_bug.cgi?id=2360768 https://www.cve.org/CVERecord?id=CVE-2025-32415 https://nvd.nist.gov/vuln/detail/CVE-2025-32415 https://gitlab.gnome.org/GNOME/libxml2/-/issues/890 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32415.json https://access.redhat.com/errata/RHSA-2025:13428&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-12.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RgBI11FezD5/LF6u61IQtw==&#34;: {&#xA;      &#34;id&#34;: &#34;RgBI11FezD5/LF6u61IQtw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48554&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in file, a program used to identify a particular file according to the type of data contained by the file. This issue occurs when processing a specially crafted file, causing a stack-based buffer over-read, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-48554 https://bugzilla.redhat.com/show_bug.cgi?id=2235714 https://www.cve.org/CVERecord?id=CVE-2022-48554 https://nvd.nist.gov/vuln/detail/CVE-2022-48554 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-48554.json https://access.redhat.com/errata/RHSA-2024:2512&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:5.39-16.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Rm7aeXEOy4+PSaaC/AfGyw==&#34;: {&#xA;      &#34;id&#34;: &#34;Rm7aeXEOy4+PSaaC/AfGyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-25724&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libarchive package. Affected versions of libarchive do not check a strftime return value, which can lead to a denial of service or unspecified other impacts via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-25724 https://bugzilla.redhat.com/show_bug.cgi?id=2349221 https://www.cve.org/CVERecord?id=CVE-2025-25724 https://nvd.nist.gov/vuln/detail/CVE-2025-25724 https://gist.github.com/Ekkosun/a83870ce7f3b7813b9b462a395e8ad92 https://github.com/Ekkosun/pocs/blob/main/bsdtarbug https://github.com/libarchive/libarchive/blob/b439d586f53911c84be5e380445a8a259e19114c/tar/util.c#L751-L752 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-25724.json https://access.redhat.com/errata/RHSA-2025:9431&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bsdtar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-5.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RnzVpoLf3gQvIDiBFFXm6w==&#34;: {&#xA;      &#34;id&#34;: &#34;RnzVpoLf3gQvIDiBFFXm6w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38546&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. This flaw allows an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38546 https://bugzilla.redhat.com/show_bug.cgi?id=2241938 https://access.redhat.com/errata/RHSA-2024:2101 https://www.cve.org/CVERecord?id=CVE-2023-38546 https://nvd.nist.gov/vuln/detail/CVE-2023-38546 https://curl.se/docs/CVE-2023-38546.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38546.json https://access.redhat.com/errata/RHSA-2023:6745&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RoQvxPrgcpXyTej834bT2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;RoQvxPrgcpXyTej834bT2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-57360&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the nm utility of binutils. A local user who specifies the `--without-symbol-versions` option on a specially crafted ELF file can trigger a segmentation fault condition. This may lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-57360 https://bugzilla.redhat.com/show_bug.cgi?id=2339263 https://www.cve.org/CVERecord?id=CVE-2024-57360 https://nvd.nist.gov/vuln/detail/CVE-2024-57360 https://sourceware.org/bugzilla/show_bug.cgi?id=32467 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-57360.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RxiYxX3H5lL8cc7k0ac/mQ==&#34;: {&#xA;      &#34;id&#34;: &#34;RxiYxX3H5lL8cc7k0ac/mQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4516&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in CPython&#39;s bytes.decode() function when used with the \&#34;unicode_escape\&#34; encoding and the \&#34;ignore\&#34; or \&#34;replace\&#34; error handling modes. This flaw can result in the incorrect decoding of byte strings. While this may not directly lead to traditional security breaches like data exfiltration, the resulting unexpected program behavior could introduce instability, logic errors, or unintended side effects within applications that rely on this specific decoding functionality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-15T13:29:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4516 https://bugzilla.redhat.com/show_bug.cgi?id=2366509 https://www.cve.org/CVERecord?id=CVE-2025-4516 https://nvd.nist.gov/vuln/detail/CVE-2025-4516 https://github.com/python/cpython/commit/69b4387f78f413e8c47572a85b3478c47eba8142 https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e https://github.com/python/cpython/issues/133767 https://github.com/python/cpython/pull/129648 https://mail.python.org/archives/list/security-announce@python.org/thread/L75IPBBTSCYEF56I2M4KIW353BB3AY74/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4516.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RxmnlWamNxvphCIuarducQ==&#34;: {&#xA;      &#34;id&#34;: &#34;RxmnlWamNxvphCIuarducQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30086&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the libtiff library. This flaw causes a buffer overflow in libtiff that allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30086 https://bugzilla.redhat.com/show_bug.cgi?id=2203650 https://www.cve.org/CVERecord?id=CVE-2023-30086 https://nvd.nist.gov/vuln/detail/CVE-2023-30086 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30086.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;RxwFiIUPJYMo6r5lfv+sdQ==&#34;: {&#xA;      &#34;id&#34;: &#34;RxwFiIUPJYMo6r5lfv+sdQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-47011&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in binutils. This flaw allows an attacker to use a set of steps to trigger a memory leak and perform a denial of service, resulting in a loss of the system&#39;s availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-47011 https://bugzilla.redhat.com/show_bug.cgi?id=2233992 https://www.cve.org/CVERecord?id=CVE-2022-47011 https://nvd.nist.gov/vuln/detail/CVE-2022-47011 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47011.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ry6vRm+cs1w4rnhTcw+4ww==&#34;: {&#xA;      &#34;id&#34;: &#34;Ry6vRm+cs1w4rnhTcw+4ww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38546&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. This flaw allows an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38546 https://bugzilla.redhat.com/show_bug.cgi?id=2241938 https://access.redhat.com/errata/RHSA-2024:2101 https://www.cve.org/CVERecord?id=CVE-2023-38546 https://nvd.nist.gov/vuln/detail/CVE-2023-38546 https://curl.se/docs/CVE-2023-38546.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38546.json https://access.redhat.com/errata/RHSA-2023:6745&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Rz0KcMyzx8GC2p+YUZpHPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Rz0KcMyzx8GC2p+YUZpHPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4603&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use the EVP_PKEY_param_check() or EVP_PKEY_public_check() function to check a DSA public key or DSA parameters may experience long delays when checking excessively long DSA keys or parameters.  In applications that allow untrusted sources to provide the key or parameters that are checked, an attacker may be able to cause a denial of service. These functions are not called by OpenSSL on untrusted DSA keys. The applications that directly call these functions are the ones that may be vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4603 https://bugzilla.redhat.com/show_bug.cgi?id=2281029 https://www.cve.org/CVERecord?id=CVE-2024-4603 https://nvd.nist.gov/vuln/detail/CVE-2024-4603 https://www.openssl.org/news/secadv/20240516.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4603.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;S01BJ2Ht59Iq71LsHWKLzg==&#34;: {&#xA;      &#34;id&#34;: &#34;S01BJ2Ht59Iq71LsHWKLzg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23919&#34;,&#xA;      &#34;description&#34;: &#34;A cryptographic vulnerability exists in Node.js \u003c19.2.0, \u003c18.14.1, \u003c16.19.1, \u003c14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23919 https://bugzilla.redhat.com/show_bug.cgi?id=2172170 https://www.cve.org/CVERecord?id=CVE-2023-23919 https://nvd.nist.gov/vuln/detail/CVE-2023-23919 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23919.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;S2Vz+b7SfKEl74LFjj2t7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;S2Vz+b7SfKEl74LFjj2t7Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27614&#34;,&#xA;      &#34;description&#34;: &#34;There&#39;s a vulnerability in gitk where an user can be tricked to run malicious scripts supplied by the attacker when running gitk filename command. When successfully exploited this vulnerability may result in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T13:01:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27614 https://bugzilla.redhat.com/show_bug.cgi?id=2379125 https://www.cve.org/CVERecord?id=CVE-2025-27614 https://nvd.nist.gov/vuln/detail/CVE-2025-27614 https://lore.kernel.org/git/xmqq5xg2wrd1.fsf@gitster.g/ https://www.openwall.com/lists/oss-security/2025/07/08/4 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27614.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;S2g7delheJOLf2DxVbw0Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;S2g7delheJOLf2DxVbw0Hg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0450&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python/CPython &#39;zipfile&#39; that can allow a zip-bomb type of attack. An attacker may craft a zip file format, leading to a Denial of Service when processed.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0450 https://bugzilla.redhat.com/show_bug.cgi?id=2276525 https://www.cve.org/CVERecord?id=CVE-2024-0450 https://nvd.nist.gov/vuln/detail/CVE-2024-0450 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0450.json https://access.redhat.com/errata/RHSA-2024:4078&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;S2kC/8+NtHD0EdQuoPqXlg==&#34;: {&#xA;      &#34;id&#34;: &#34;S2kC/8+NtHD0EdQuoPqXlg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-1394&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \&#34;return nil, nil, fail(...)\&#34; pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-1394 https://bugzilla.redhat.com/show_bug.cgi?id=2262921 https://www.cve.org/CVERecord?id=CVE-2024-1394 https://nvd.nist.gov/vuln/detail/CVE-2024-1394 https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136 https://github.com/golang-fips/openssl/security/advisories/GHSA-78hx-gp6g-7mj6 https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f https://pkg.go.dev/vuln/GO-2024-2660 https://vuln.go.dev/ID/GO-2024-2660.json https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-1394.json https://access.redhat.com/errata/RHSA-2024:1462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-2.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;S3c04CkV3MUFBzUssTpBSg==&#34;: {&#xA;      &#34;id&#34;: &#34;S3c04CkV3MUFBzUssTpBSg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;: {&#xA;      &#34;id&#34;: &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41409&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in PCRE2, where it is susceptible to an integer overflow vulnerability triggered by a negative repeat value in the pcre2test subject line that causes infinite looping. This flaw allows a remote attacker to pass specially crafted data to the application, initiating an integer overflow and executing a denial of service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41409 https://bugzilla.redhat.com/show_bug.cgi?id=2260814 https://www.cve.org/CVERecord?id=CVE-2022-41409 https://nvd.nist.gov/vuln/detail/CVE-2022-41409 https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35 https://github.com/PCRE2Project/pcre2/issues/141 https://github.com/advisories/GHSA-4qfx-v7wh-3q4j https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41409.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;S9GgHs7lpMPNDjvswObhPg==&#34;: {&#xA;      &#34;id&#34;: &#34;S9GgHs7lpMPNDjvswObhPg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25062&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free flaw was found in libxml2. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25062 https://bugzilla.redhat.com/show_bug.cgi?id=2262726 https://www.cve.org/CVERecord?id=CVE-2024-25062 https://nvd.nist.gov/vuln/detail/CVE-2024-25062 https://gitlab.gnome.org/GNOME/libxml2/-/issues/604 https://gitlab.gnome.org/GNOME/libxml2/-/tags https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25062.json https://access.redhat.com/errata/RHSA-2024:2679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SBAWrxfXaQ2Ka48xajW62A==&#34;: {&#xA;      &#34;id&#34;: &#34;SBAWrxfXaQ2Ka48xajW62A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24807&#34;,&#xA;      &#34;description&#34;: &#34;Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24807 https://bugzilla.redhat.com/show_bug.cgi?id=2172204 https://www.cve.org/CVERecord?id=CVE-2023-24807 https://nvd.nist.gov/vuln/detail/CVE-2023-24807 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24807.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SFiwTqc+C9HkxslIGbfU0g==&#34;: {&#xA;      &#34;id&#34;: &#34;SFiwTqc+C9HkxslIGbfU0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23936&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the fetch API in Node.js that did not prevent CRLF injection in the &#39;host&#39; header. This issue could allow HTTP response splitting and HTTP header injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23936 https://bugzilla.redhat.com/show_bug.cgi?id=2172190 https://www.cve.org/CVERecord?id=CVE-2023-23936 https://nvd.nist.gov/vuln/detail/CVE-2023-23936 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23936.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SFoELvc6okNKWKi7mExikA==&#34;: {&#xA;      &#34;id&#34;: &#34;SFoELvc6okNKWKi7mExikA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21896&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a buffer, the implementation uses Buffer.from() to obtain a buffer from the result of path.resolve(). By monkey-patching buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21896 https://bugzilla.redhat.com/show_bug.cgi?id=2265717 https://www.cve.org/CVERecord?id=CVE-2024-21896 https://nvd.nist.gov/vuln/detail/CVE-2024-21896 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21896.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SIPkCsjtWsrsJnfVRjxnKA==&#34;: {&#xA;      &#34;id&#34;: &#34;SIPkCsjtWsrsJnfVRjxnKA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29404&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. The go command may execute arbitrary code at build time when using cgo. This can occur when running \&#34;go get\&#34; on a malicious module, or when running any other command which builds untrusted code. This can be triggered by linker flags, specified via a \&#34;#cgo LDFLAGS\&#34; directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29404 https://bugzilla.redhat.com/show_bug.cgi?id=2217565 https://www.cve.org/CVERecord?id=CVE-2023-29404 https://nvd.nist.gov/vuln/detail/CVE-2023-29404 https://go.dev/cl/501225 https://go.dev/issue/60305 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29404.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SJA+1v6mehbGh4JXJ2n5jA==&#34;: {&#xA;      &#34;id&#34;: &#34;SJA+1v6mehbGh4JXJ2n5jA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22695&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a reference library for processing PNG (Portable Network Graphics) image files. A local attacker could exploit a heap buffer over-read vulnerability in the `png_image_finish_read` function by tricking a user into processing a specially crafted interlaced 16-bit PNG file with an 8-bit output format and non-minimal row stride. This could lead to a denial of service (DoS) and potentially information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T22:55:40Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22695 https://bugzilla.redhat.com/show_bug.cgi?id=2428825 https://www.cve.org/CVERecord?id=CVE-2026-22695 https://nvd.nist.gov/vuln/detail/CVE-2026-22695 https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea https://github.com/pnggroup/libpng/commit/e4f7ad4ea2 https://github.com/pnggroup/libpng/issues/778 https://github.com/pnggroup/libpng/security/advisories/GHSA-mmq5-27w3-rxpp https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22695.json https://access.redhat.com/errata/RHSA-2026:3405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SKOD3G/MxX5t9s/HjT+ehg==&#34;: {&#xA;      &#34;id&#34;: &#34;SKOD3G/MxX5t9s/HjT+ehg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6387&#34;,&#xA;      &#34;description&#34;: &#34;A security regression (CVE-2006-5051) was discovered in OpenSSH&#39;s server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-01T08:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6387 https://bugzilla.redhat.com/show_bug.cgi?id=2294604 https://www.cve.org/CVERecord?id=CVE-2024-6387 https://nvd.nist.gov/vuln/detail/CVE-2024-6387 https://santandersecurityresearch.github.io/blog/sshing_the_masses.html https://www.openssh.com/txt/release-9.8 https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6387.json https://access.redhat.com/errata/RHSA-2024:4312&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-38.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SKyAPnATFclliIE0mjtq+w==&#34;: {&#xA;      &#34;id&#34;: &#34;SKyAPnATFclliIE0mjtq+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SPxMxLW2DZ8IvP04UR/H6g==&#34;: {&#xA;      &#34;id&#34;: &#34;SPxMxLW2DZ8IvP04UR/H6g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5683&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in qt. Loading a specially crafted ICNS image file within QImage results in a crash. This flaw allows a local attacker to provide a malicious image. The vulnerability is exploited via the image loading process, leading to application termination.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T05:31:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5683 https://bugzilla.redhat.com/show_bug.cgi?id=2370384 https://www.cve.org/CVERecord?id=CVE-2025-5683 https://nvd.nist.gov/vuln/detail/CVE-2025-5683 https://codereview.qt-project.org/c/qt/qtimageformats/+/644548 https://issues.oss-fuzz.com/issues/415350704 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5683.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;qt5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SRL0fsSEDtOf7vYyf/BewQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SRL0fsSEDtOf7vYyf/BewQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6597&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the tempfile.TemporaryDirectory class in python3/cpython3. The class may dereference symbolic links during permission-related errors, resulting in users that run privileged programs being able to modify permissions of files referenced by the symbolic link.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6597 https://bugzilla.redhat.com/show_bug.cgi?id=2276518 https://www.cve.org/CVERecord?id=CVE-2023-6597 https://nvd.nist.gov/vuln/detail/CVE-2023-6597 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6597.json https://access.redhat.com/errata/RHSA-2024:4078&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SRtj8i4HsQkjCyC1YPMDYw==&#34;: {&#xA;      &#34;id&#34;: &#34;SRtj8i4HsQkjCyC1YPMDYw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22025&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22025 https://bugzilla.redhat.com/show_bug.cgi?id=2270559 https://www.cve.org/CVERecord?id=CVE-2024-22025 https://nvd.nist.gov/vuln/detail/CVE-2024-22025 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22025.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SS38Q6SbT7pMry4emWgqdg==&#34;: {&#xA;      &#34;id&#34;: &#34;SS38Q6SbT7pMry4emWgqdg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39318&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. The html/template package did not properly handle HMTL-like \&#34;\u003c!--\&#34; and \&#34;--\u003e\&#34; comment tokens, nor hashbang \&#34;#!\&#34; comment tokens, in \u003cscript\u003e contexts. This issue may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39318 https://bugzilla.redhat.com/show_bug.cgi?id=2237776 https://www.cve.org/CVERecord?id=CVE-2023-39318 https://nvd.nist.gov/vuln/detail/CVE-2023-39318 https://go.dev/cl/526156 https://go.dev/issue/62196 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2041.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39318.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SSAJUNd+iNG0Dh0JEHjSXA==&#34;: {&#xA;      &#34;id&#34;: &#34;SSAJUNd+iNG0Dh0JEHjSXA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Getopt-Std&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.12-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SSReN3l+Qu29CQbqRghmtA==&#34;: {&#xA;      &#34;id&#34;: &#34;SSReN3l+Qu29CQbqRghmtA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33416&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a library used for processing PNG (Portable Network Graphics) image files. This vulnerability arises from improper memory management where a heap-allocated buffer is aliased between internal data structures. When specific functions are called, a freed memory region can still be referenced, leading to a use-after-free condition. An attacker could potentially exploit this to achieve arbitrary code execution or cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-26T16:48:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33416 https://bugzilla.redhat.com/show_bug.cgi?id=2451805 https://www.cve.org/CVERecord?id=CVE-2026-33416 https://nvd.nist.gov/vuln/detail/CVE-2026-33416 https://github.com/pnggroup/libpng/commit/23019269764e35ed8458e517f1897bd3c54820eb https://github.com/pnggroup/libpng/commit/7ea9eea884a2328cc7fdcb3c0c00246a50d90667 https://github.com/pnggroup/libpng/commit/a3a21443ed12bfa1ef46fa0d4fb2b74a0fa34a25 https://github.com/pnggroup/libpng/commit/c1b0318b393c90679e6fa5bc1d329fd5d5012ec1 https://github.com/pnggroup/libpng/pull/824 https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7j https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33416.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ST+HmAso4vf4Hnu6TuBXXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ST+HmAso4vf4Hnu6TuBXXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-12818&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in PostgreSQL’s libpq client library, where integer wraparound in several allocation-size calculations allows a peer or input provider to cause an undersized buffer and then write out-of-bounds by hundreds of megabytes. This can lead to a client application segmentation fault or crash when using libpq to connect to a PostgreSQL server.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-13T13:00:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-12818 https://bugzilla.redhat.com/show_bug.cgi?id=2414826 https://www.cve.org/CVERecord?id=CVE-2025-12818 https://nvd.nist.gov/vuln/detail/CVE-2025-12818 https://www.postgresql.org/support/security/CVE-2025-12818/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-12818.json https://access.redhat.com/errata/RHSA-2026:0458&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpq&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:13.23-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;STluRm8qQBZc5ygxny9Znw==&#34;: {&#xA;      &#34;id&#34;: &#34;STluRm8qQBZc5ygxny9Znw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25547&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-04T21:51:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25547 https://bugzilla.redhat.com/show_bug.cgi?id=2436942 https://www.cve.org/CVERecord?id=CVE-2026-25547 https://nvd.nist.gov/vuln/detail/CVE-2026-25547 https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25547.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SU1MGh9+Zg3Zuy+khiN0Og==&#34;: {&#xA;      &#34;id&#34;: &#34;SU1MGh9+Zg3Zuy+khiN0Og==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0938&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accept domain names that included square brackets, which isn&#39;t valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-31T17:51:35Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0938 https://bugzilla.redhat.com/show_bug.cgi?id=2343237 https://www.cve.org/CVERecord?id=CVE-2025-0938 https://nvd.nist.gov/vuln/detail/CVE-2025-0938 https://github.com/python/cpython/issues/105704 https://github.com/python/cpython/pull/129418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0938.json https://access.redhat.com/errata/RHSA-2025:6977&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SWMi5UoagLshKWAW26MJTw==&#34;: {&#xA;      &#34;id&#34;: &#34;SWMi5UoagLshKWAW26MJTw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SXF95Q57bdA0qf3iy/XSPw==&#34;: {&#xA;      &#34;id&#34;: &#34;SXF95Q57bdA0qf3iy/XSPw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js package. By embedding non-network imports in data URLs, this flaw allows an attacker to execute arbitrary code, compromising system security.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22020 https://bugzilla.redhat.com/show_bug.cgi?id=2296417 https://www.cve.org/CVERecord?id=CVE-2024-22020 https://nvd.nist.gov/vuln/detail/CVE-2024-22020 https://hackerone.com/reports/2092749 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22020.json https://access.redhat.com/errata/RHSA-2024:6147&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.4-1.module+el9.4.0+22195+c221878e&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T13:22:46Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15281 https://bugzilla.redhat.com/show_bug.cgi?id=2431196 https://www.cve.org/CVERecord?id=CVE-2025-15281 https://nvd.nist.gov/vuln/detail/CVE-2025-15281 https://sourceware.org/bugzilla/show_bug.cgi?id=33814 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15281.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SaWdJL5a+HL0ZieRiKpgNA==&#34;: {&#xA;      &#34;id&#34;: &#34;SaWdJL5a+HL0ZieRiKpgNA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-38428&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-38428 https://bugzilla.redhat.com/show_bug.cgi?id=2292836 https://www.cve.org/CVERecord?id=CVE-2024-38428 https://nvd.nist.gov/vuln/detail/CVE-2024-38428 https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-38428.json https://access.redhat.com/errata/RHSA-2024:6192&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;wget&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Sal0GJMIh5Nqb3U4N6ro0g==&#34;: {&#xA;      &#34;id&#34;: &#34;Sal0GJMIh5Nqb3U4N6ro0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0466&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The X509_VERIFY_PARAM_add0_policy() function is documented to enable the certificate policy check when doing certificate verification implicitly. However, implementing the function does not enable the check, allowing certificates with invalid or incorrect policies to pass the certificate verification. Suddenly enabling the policy check could break existing deployments, so it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. The applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0466 https://bugzilla.redhat.com/show_bug.cgi?id=2182565 https://www.cve.org/CVERecord?id=CVE-2023-0466 https://nvd.nist.gov/vuln/detail/CVE-2023-0466 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0466.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SbrfelK/hRkg8QJAv7881A==&#34;: {&#xA;      &#34;id&#34;: &#34;SbrfelK/hRkg8QJAv7881A==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1570&#34;,&#xA;      &#34;description&#34;: &#34;Panic on large handshake records in crypto/tls&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T22:24:51Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/58001 https://go.dev/cl/468125 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.6&#34;&#xA;    },&#xA;    &#34;SbvnfacnQ1X9A0OepqCdbg==&#34;: {&#xA;      &#34;id&#34;: &#34;SbvnfacnQ1X9A0OepqCdbg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59465&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been discovered in NodeJS. A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59465 https://bugzilla.redhat.com/show_bug.cgi?id=2431349 https://www.cve.org/CVERecord?id=CVE-2025-59465 https://nvd.nist.gov/vuln/detail/CVE-2025-59465 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59465.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ScOp6HuJxBp54FxFpTVDnA==&#34;: {&#xA;      &#34;id&#34;: &#34;ScOp6HuJxBp54FxFpTVDnA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25645&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `requests` HTTP library, specifically in the `requests.utils.extract_zipped_paths()` function, which is used to load Certificate Authority (CA) bundles. A local attacker can exploit this vulnerability by pre-creating a malicious CA bundle file in the system&#39;s temporary directory. When a vulnerable application initializes the `requests` library, it may load this malicious file instead of the legitimate CA bundle, leading to a bypass of security controls and potential integrity compromise.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-25T17:02:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25645 https://bugzilla.redhat.com/show_bug.cgi?id=2451408 https://www.cve.org/CVERecord?id=CVE-2026-25645 https://nvd.nist.gov/vuln/detail/CVE-2026-25645 https://github.com/psf/requests/commit/66d21cb07bd6255b1280291c4fafb71803cdb3b7 https://github.com/psf/requests/releases/tag/v2.33.0 https://github.com/psf/requests/security/advisories/GHSA-gc5v-m9x4-r6x2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25645.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SdlHZBjfHlAbNa/I1YXwQA==&#34;: {&#xA;      &#34;id&#34;: &#34;SdlHZBjfHlAbNa/I1YXwQA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-10158&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in rsync. A malicious client acting as the receiver of an rsync file transfer can trigger an OOB read via a negative array index. The rsync client requires at least read access to the remote rsync module to trigger the issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-18T14:24:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-10158 https://bugzilla.redhat.com/show_bug.cgi?id=2415637 https://www.cve.org/CVERecord?id=CVE-2025-10158 https://nvd.nist.gov/vuln/detail/CVE-2025-10158 https://attackerkb.com/assessments/fbacb2a6-d1cd-4011-bb3a-f06b1c8306b1 https://github.com/RsyncProject/rsync/commit/797e17fc4a6f15e3b1756538a9f812b63942686f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-10158.json https://access.redhat.com/errata/RHSA-2026:6390&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.2.5-3.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SduSwzmffGiGJfqQDrSyEA==&#34;: {&#xA;      &#34;id&#34;: &#34;SduSwzmffGiGJfqQDrSyEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3570&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in Libtiff&#39;s tiffcrop utility. This issue occurs during the conversion of a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes an out-of-bound access resulting an application crash, eventually leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-02-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3570 https://bugzilla.redhat.com/show_bug.cgi?id=2142734 https://www.cve.org/CVERecord?id=CVE-2022-3570 https://nvd.nist.gov/vuln/detail/CVE-2022-3570 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3570.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Seg9bNv2Tp+fFcixDR+uTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Seg9bNv2Tp+fFcixDR+uTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-26T01:07:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27904 https://bugzilla.redhat.com/show_bug.cgi?id=2442922 https://www.cve.org/CVERecord?id=CVE-2026-27904 https://nvd.nist.gov/vuln/detail/CVE-2026-27904 https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27904.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.20.2.1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SfJy5i/9nh3s5fpZxZDQCg==&#34;: {&#xA;      &#34;id&#34;: &#34;SfJy5i/9nh3s5fpZxZDQCg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4786&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python webbrowser.open() API. If a specially crafted URL containing \&#34;%action\&#34; is processed, an attacker could bypass a previous mitigation for CVE-2026-4519. This bypass allows for command injection into the underlying shell, potentially leading to arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T21:52:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4786 https://bugzilla.redhat.com/show_bug.cgi?id=2458049 https://www.cve.org/CVERecord?id=CVE-2026-4786 https://nvd.nist.gov/vuln/detail/CVE-2026-4786 https://github.com/python/cpython/issues/148169 https://github.com/python/cpython/pull/148170 https://mail.python.org/archives/list/security-announce@python.org/thread/JQDUNJVB4AQNTJECSUKOBDU3XCJIPSE5/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4786.json https://access.redhat.com/errata/RHSA-2026:10949&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Sfn7NNniMfKKkrbS2KIlnA==&#34;: {&#xA;      &#34;id&#34;: &#34;Sfn7NNniMfKKkrbS2KIlnA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-55549&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxslt. This vulnerability allows an attacker to trigger a use-after-free issue by excluding result prefixes.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-55549 https://bugzilla.redhat.com/show_bug.cgi?id=2352484 https://www.cve.org/CVERecord?id=CVE-2024-55549 https://nvd.nist.gov/vuln/detail/CVE-2024-55549 https://gitlab.gnome.org/GNOME/libxslt/-/issues/127 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-55549.json https://access.redhat.com/errata/RHSA-2025:7410&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxslt-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.1.34-13.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Sgu/tfTuRDchfvDOoiuHSw==&#34;: {&#xA;      &#34;id&#34;: &#34;Sgu/tfTuRDchfvDOoiuHSw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1525&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \&#34;Content-Length\&#34; and \&#34;content-length\&#34;). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T19:56:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1525 https://bugzilla.redhat.com/show_bug.cgi?id=2447144 https://www.cve.org/CVERecord?id=CVE-2026-1525 https://nvd.nist.gov/vuln/detail/CVE-2026-1525 https://cna.openjsf.org/security-advisories.html https://cwe.mitre.org/data/definitions/444.html https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm https://hackerone.com/reports/3556037 https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1525.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SjRIPS8zwG2cWHBok+S2aw==&#34;: {&#xA;      &#34;id&#34;: &#34;SjRIPS8zwG2cWHBok+S2aw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61728&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61728 https://bugzilla.redhat.com/show_bug.cgi?id=2434431 https://www.cve.org/CVERecord?id=CVE-2025-61728 https://nvd.nist.gov/vuln/detail/CVE-2025-61728 https://go.dev/cl/736713 https://go.dev/issue/77102 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4342 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61728.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SjbW0rogoRJo0my37ozMDg==&#34;: {&#xA;      &#34;id&#34;: &#34;SjbW0rogoRJo0my37ozMDg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Sl37ASpmhZPtZSKlrwYF6A==&#34;: {&#xA;      &#34;id&#34;: &#34;Sl37ASpmhZPtZSKlrwYF6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23085&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23085 https://bugzilla.redhat.com/show_bug.cgi?id=2342618 https://www.cve.org/CVERecord?id=CVE-2025-23085 https://nvd.nist.gov/vuln/detail/CVE-2025-23085 https://nodejs.org/pt/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23085.json https://access.redhat.com/errata/RHSA-2025:1446&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.6-1.module+el9.5.0+22773+9a359385&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SmczXqxeZRCcJykxG3Abrg==&#34;: {&#xA;      &#34;id&#34;: &#34;SmczXqxeZRCcJykxG3Abrg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32465&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git in a full copy of a Git repository. A prerequisite for this vulnerability is for an unauthenticated attacker to place a specialized repository on their target&#39;s local system. If the victim were to clone this repository, it could result in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32465 https://bugzilla.redhat.com/show_bug.cgi?id=2280446 https://www.cve.org/CVERecord?id=CVE-2024-32465 https://nvd.nist.gov/vuln/detail/CVE-2024-32465 https://github.com/git/git/security/advisories/GHSA-vm9j-46j9-qvq4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32465.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SnI5fUbXuT/Xt+VkGvddww==&#34;: {&#xA;      &#34;id&#34;: &#34;SnI5fUbXuT/Xt+VkGvddww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3517&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the nodejs-minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-02-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3517 https://bugzilla.redhat.com/show_bug.cgi?id=2134609 https://www.cve.org/CVERecord?id=CVE-2022-3517 https://nvd.nist.gov/vuln/detail/CVE-2022-3517 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3517.json https://access.redhat.com/errata/RHSA-2022:8832&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.2-1.18.12.1.1.module+el9.1.0.z+17326+318294bb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SqKI5VB6698Nen4zsScUuw==&#34;: {&#xA;      &#34;id&#34;: &#34;SqKI5VB6698Nen4zsScUuw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24783&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s crypto/x509 standard library package. Verifying a certificate chain that contains a certificate with an unknown public key algorithm will cause a Certificate.Verify to panic. This issue affects all crypto/tls clients and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24783 https://bugzilla.redhat.com/show_bug.cgi?id=2268019 https://www.cve.org/CVERecord?id=CVE-2024-24783 https://nvd.nist.gov/vuln/detail/CVE-2024-24783 http://www.openwall.com/lists/oss-security/2024/03/08/4 https://github.com/advisories/GHSA-3q2c-pvp5-3cqp https://go.dev/cl/569339 https://go.dev/issue/65390 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg https://pkg.go.dev/vuln/GO-2024-2598 https://security.netapp.com/advisory/ntap-20240329-0005 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24783.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Srb0jwMVUQlaoxewBgoI7A==&#34;: {&#xA;      &#34;id&#34;: &#34;Srb0jwMVUQlaoxewBgoI7A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SsDTRy6ZHTEEM+UFVh6QDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SsDTRy6ZHTEEM+UFVh6QDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SsFE9yHqow9BNx1O4nMcCg==&#34;: {&#xA;      &#34;id&#34;: &#34;SsFE9yHqow9BNx1O4nMcCg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SsNZleqCp7tmOqFZQ6ZaBA==&#34;: {&#xA;      &#34;id&#34;: &#34;SsNZleqCp7tmOqFZQ6ZaBA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34156&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34156 https://bugzilla.redhat.com/show_bug.cgi?id=2310528 https://www.cve.org/CVERecord?id=CVE-2024-34156 https://nvd.nist.gov/vuln/detail/CVE-2024-34156 https://go.dev/cl/611239 https://go.dev/issue/69139 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3106 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34156.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Stfm7ne4Ofst02xkZn9K1w==&#34;: {&#xA;      &#34;id&#34;: &#34;Stfm7ne4Ofst02xkZn9K1w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-43552&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in curl. In this issue, curl can be asked to tunnel all protocols virtually it supports through an HTTP proxy. HTTP proxies can deny these tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific SMB or TELNET protocols, curl can use a heap-allocated struct after it has been freed and shut down the code path in its transfer.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-43552 https://bugzilla.redhat.com/show_bug.cgi?id=2152652 https://www.cve.org/CVERecord?id=CVE-2022-43552 https://nvd.nist.gov/vuln/detail/CVE-2022-43552 https://curl.se/docs/CVE-2022-43552.html https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-43552.json https://access.redhat.com/errata/RHSA-2023:2478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SueY1m9dU5duigybt2Nk8g==&#34;: {&#xA;      &#34;id&#34;: &#34;SueY1m9dU5duigybt2Nk8g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55132&#34;,&#xA;      &#34;description&#34;: &#34;A file access flaw has been discovered in NodeJS. A file&#39;s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55132 https://bugzilla.redhat.com/show_bug.cgi?id=2431338 https://www.cve.org/CVERecord?id=CVE-2025-55132 https://nvd.nist.gov/vuln/detail/CVE-2025-55132 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55132.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;SvhQ7tNvl6ANrVnaJ4cBNw==&#34;: {&#xA;      &#34;id&#34;: &#34;SvhQ7tNvl6ANrVnaJ4cBNw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3099&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in vim&#39;s do_cmdline() function of the src/ex_docmd.c file. The issue triggers when an invalid line number on :for is ignored. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering use-after-free that causes an application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3099 https://bugzilla.redhat.com/show_bug.cgi?id=2124157 https://www.cve.org/CVERecord?id=CVE-2022-3099 https://nvd.nist.gov/vuln/detail/CVE-2022-3099 https://huntr.dev/bounties/403210c7-6cc7-4874-8934-b57f88bd4f5e https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3099.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Sw8bDdvvxQW2LmbjS6B1hg==&#34;: {&#xA;      &#34;id&#34;: &#34;Sw8bDdvvxQW2LmbjS6B1hg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-30630&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-30630 https://bugzilla.redhat.com/show_bug.cgi?id=2107371 https://www.cve.org/CVERecord?id=CVE-2022-30630 https://nvd.nist.gov/vuln/detail/CVE-2022-30630 https://go.dev/issue/53415 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-30630.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;: {&#xA;      &#34;id&#34;: &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;T0HgzMn5d4x2X74gH/2z+g==&#34;: {&#xA;      &#34;id&#34;: &#34;T0HgzMn5d4x2X74gH/2z+g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2229&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client&#39;s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:27:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2229 https://bugzilla.redhat.com/show_bug.cgi?id=2447143 https://www.cve.org/CVERecord?id=CVE-2026-2229 https://nvd.nist.gov/vuln/detail/CVE-2026-2229 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8 https://hackerone.com/reports/3487486 https://nodejs.org/api/zlib.html#class-zlibinflateraw https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2229.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;T1160/hke2bN2YNtHQGAVQ==&#34;: {&#xA;      &#34;id&#34;: &#34;T1160/hke2bN2YNtHQGAVQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7104&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in SQLite3. This issue affects the sessionReadRecord function of the ext/session/sqlite3session.c function in the make alltest Handler component. Manipulation may cause a heap-based buffer overflow to occur.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7104 https://bugzilla.redhat.com/show_bug.cgi?id=2256194 https://www.cve.org/CVERecord?id=CVE-2023-7104 https://nvd.nist.gov/vuln/detail/CVE-2023-7104 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7104.json https://access.redhat.com/errata/RHSA-2024:0465&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-7.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;T1AEmBcJCa6ktci+apxdAg==&#34;: {&#xA;      &#34;id&#34;: &#34;T1AEmBcJCa6ktci+apxdAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55132&#34;,&#xA;      &#34;description&#34;: &#34;A file access flaw has been discovered in NodeJS. A file&#39;s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55132 https://bugzilla.redhat.com/show_bug.cgi?id=2431338 https://www.cve.org/CVERecord?id=CVE-2025-55132 https://nvd.nist.gov/vuln/detail/CVE-2025-55132 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55132.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;T2rcJ7DPtdiGNP7r4L5R2g==&#34;: {&#xA;      &#34;id&#34;: &#34;T2rcJ7DPtdiGNP7r4L5R2g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24807&#34;,&#xA;      &#34;description&#34;: &#34;Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24807 https://bugzilla.redhat.com/show_bug.cgi?id=2172204 https://www.cve.org/CVERecord?id=CVE-2023-24807 https://nvd.nist.gov/vuln/detail/CVE-2023-24807 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24807.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.3-1.16.19.1.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;T38zlL6BTag6EVZfMAMcaw==&#34;: {&#xA;      &#34;id&#34;: &#34;T38zlL6BTag6EVZfMAMcaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5535&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the &#39;no overlap&#39; response in ALPN or uses the output as the opportunistic protocol in NPN.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-5535 https://bugzilla.redhat.com/show_bug.cgi?id=2294581 https://www.cve.org/CVERecord?id=CVE-2024-5535 https://nvd.nist.gov/vuln/detail/CVE-2024-5535 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-5535.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;T4bxk7MHk24P39KEeRKoig==&#34;: {&#xA;      &#34;id&#34;: &#34;T4bxk7MHk24P39KEeRKoig==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;T5/Q0DOZypWV6o3x9ziKqw==&#34;: {&#xA;      &#34;id&#34;: &#34;T5/Q0DOZypWV6o3x9ziKqw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6387&#34;,&#xA;      &#34;description&#34;: &#34;A security regression (CVE-2006-5051) was discovered in OpenSSH&#39;s server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-01T08:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6387 https://bugzilla.redhat.com/show_bug.cgi?id=2294604 https://www.cve.org/CVERecord?id=CVE-2024-6387 https://nvd.nist.gov/vuln/detail/CVE-2024-6387 https://santandersecurityresearch.github.io/blog/sshing_the_masses.html https://www.openssh.com/txt/release-9.8 https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6387.json https://access.redhat.com/errata/RHSA-2024:4312&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-38.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;T507T5wFbtPlOW9lG7LxIA==&#34;: {&#xA;      &#34;id&#34;: &#34;T507T5wFbtPlOW9lG7LxIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0727&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The optional ContentInfo fields can be set to null, even if the \&#34;type\&#34; is a valid value, which can lead to a null dereference error that may cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0727 https://bugzilla.redhat.com/show_bug.cgi?id=2259944 https://www.cve.org/CVERecord?id=CVE-2024-0727 https://nvd.nist.gov/vuln/detail/CVE-2024-0727 https://github.com/openssl/openssl/pull/23362 https://www.openssl.org/news/secadv/20240125.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0727.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;T5Nghm4crNWWnUrYvZZItg==&#34;: {&#xA;      &#34;id&#34;: &#34;T5Nghm4crNWWnUrYvZZItg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2124&#34;,&#xA;      &#34;description&#34;: &#34;Buffer Over-read in GitHub repository vim/vim prior to 8.2.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2124 https://bugzilla.redhat.com/show_bug.cgi?id=2099558 https://www.cve.org/CVERecord?id=CVE-2022-2124 https://nvd.nist.gov/vuln/detail/CVE-2022-2124 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2124.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;T6MROVROqLQIoY85LYvLww==&#34;: {&#xA;      &#34;id&#34;: &#34;T6MROVROqLQIoY85LYvLww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29458&#34;,&#xA;      &#34;description&#34;: &#34;A segmentation fault vulnerability was found in ncurses&#39;s convert_strings() function of tinfo/read_entry.c file. This flaw occurs due to corrupted terminfo data, triggering an out-of-bounds read error.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-04-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-29458 https://bugzilla.redhat.com/show_bug.cgi?id=2076483 https://www.cve.org/CVERecord?id=CVE-2022-29458 https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-29458.json https://access.redhat.com/errata/RHSA-2025:12876&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:6.2-10.20210508.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;T8IbBnTK2Iv5YVT88l9ngQ==&#34;: {&#xA;      &#34;id&#34;: &#34;T8IbBnTK2Iv5YVT88l9ngQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-62408&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This vulnerability allows a Denial of Service (DoS) via terminating a query after maximum attempts when using `read_answer()` and `process_answer()` functions.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-08T22:04:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-62408 https://bugzilla.redhat.com/show_bug.cgi?id=2420217 https://www.cve.org/CVERecord?id=CVE-2025-62408 https://nvd.nist.gov/vuln/detail/CVE-2025-62408 https://github.com/c-ares/c-ares/commit/714bf5675c541bd1e668a8db8e67ce012651e618 https://github.com/c-ares/c-ares/security/advisories/GHSA-jq53-42q6-pqr5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-62408.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;T9nCb/lA5TdipGMhtb6HJA==&#34;: {&#xA;      &#34;id&#34;: &#34;T9nCb/lA5TdipGMhtb6HJA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TA2J/BLShfgMiVMvb2bFmA==&#34;: {&#xA;      &#34;id&#34;: &#34;TA2J/BLShfgMiVMvb2bFmA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32988&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure.\n\nThis vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T07:55:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32988 https://bugzilla.redhat.com/show_bug.cgi?id=2359622 https://www.cve.org/CVERecord?id=CVE-2025-32988 https://nvd.nist.gov/vuln/detail/CVE-2025-32988 https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32988.json https://access.redhat.com/errata/RHSA-2025:16116&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-6.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TAntNn3gBlGhX3mRHNXfWw==&#34;: {&#xA;      &#34;id&#34;: &#34;TAntNn3gBlGhX3mRHNXfWw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12747&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in rsync. This vulnerability arises from a race condition during rsync&#39;s handling of symbolic links. Rsync&#39;s default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T15:06:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12747 https://bugzilla.redhat.com/show_bug.cgi?id=2332968 https://www.cve.org/CVERecord?id=CVE-2024-12747 https://nvd.nist.gov/vuln/detail/CVE-2024-12747 https://kb.cert.org/vuls/id/952657 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12747.json https://access.redhat.com/errata/RHSA-2025:7050&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.2.5-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TBYZOvAMUG/MxA4GOKP5FQ==&#34;: {&#xA;      &#34;id&#34;: &#34;TBYZOvAMUG/MxA4GOKP5FQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59465&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been discovered in NodeJS. A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59465 https://bugzilla.redhat.com/show_bug.cgi?id=2431349 https://www.cve.org/CVERecord?id=CVE-2025-59465 https://nvd.nist.gov/vuln/detail/CVE-2025-59465 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59465.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TCtup4kp9cBGgmnLMbI+rw==&#34;: {&#xA;      &#34;id&#34;: &#34;TCtup4kp9cBGgmnLMbI+rw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-40745&#34;,&#xA;      &#34;description&#34;: &#34;LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-40745 https://bugzilla.redhat.com/show_bug.cgi?id=2235265 https://www.cve.org/CVERecord?id=CVE-2023-40745 https://nvd.nist.gov/vuln/detail/CVE-2023-40745 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-40745.json https://access.redhat.com/errata/RHSA-2024:2289&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-12.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TEg+H5IUFEuL8/4VudXtEg==&#34;: {&#xA;      &#34;id&#34;: &#34;TEg+H5IUFEuL8/4VudXtEg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3554&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in LibX11. There is a possible memory leak in the _XimRegisterIMInstantiateCallback() of modules/im/ximcp/imsClbk.c. This issue may lead to limited availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3554 https://bugzilla.redhat.com/show_bug.cgi?id=2136411 https://www.cve.org/CVERecord?id=CVE-2022-3554 https://nvd.nist.gov/vuln/detail/CVE-2022-3554 https://ubuntu.com/security/CVE-2022-3554 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3554.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TFku8MBahkkWbmKYS7dbIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;TFku8MBahkkWbmKYS7dbIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32611&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32611 https://bugzilla.redhat.com/show_bug.cgi?id=2211829 https://www.cve.org/CVERecord?id=CVE-2023-32611 https://nvd.nist.gov/vuln/detail/CVE-2023-32611 https://gitlab.gnome.org/GNOME/glib/-/issues/2797 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32611.json https://access.redhat.com/errata/RHSA-2023:6631&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TGjVfFW0jWP1/Slr8hCo8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;TGjVfFW0jWP1/Slr8hCo8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-3751&#34;,&#xA;      &#34;description&#34;: &#34;Sensitive headers not cleared on cross-origin redirect in net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T16:23:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/679257 https://go.dev/issue/73816 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.23.10&#34;&#xA;    },&#xA;    &#34;TI1OyePXauC23iR42z7HKg==&#34;: {&#xA;      &#34;id&#34;: &#34;TI1OyePXauC23iR42z7HKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46809&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The privateDecrypt() API of the crypto library may allow a covert timing side-channel during PKCS#1 v1.5 padding error handling. This issue revealed significant timing differences in decryption for valid and invalid ciphertexts, which may allow a remote attacker to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing JSON Web Encryption messages.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46809 https://bugzilla.redhat.com/show_bug.cgi?id=2264569 https://www.cve.org/CVERecord?id=CVE-2023-46809 https://nvd.nist.gov/vuln/detail/CVE-2023-46809 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46809.json https://access.redhat.com/errata/RHSA-2024:1503&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.19.1-1.module+el9.3.0+21388+22892fb9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TIcWaTRsDD52irGN4xUQyA==&#34;: {&#xA;      &#34;id&#34;: &#34;TIcWaTRsDD52irGN4xUQyA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2125&#34;,&#xA;      &#34;description&#34;: &#34;Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2125 https://bugzilla.redhat.com/show_bug.cgi?id=2099590 https://www.cve.org/CVERecord?id=CVE-2022-2125 https://nvd.nist.gov/vuln/detail/CVE-2022-2125 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2125.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TK/tQUH9MhuStrQUTQS1ZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;TK/tQUH9MhuStrQUTQS1ZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31147&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs when /dev/urandom or RtlGenRandom() are unavailable, c-ares will use rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand(), so it will generate predictable output.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31147 https://bugzilla.redhat.com/show_bug.cgi?id=2209501 https://www.cve.org/CVERecord?id=CVE-2023-31147 https://nvd.nist.gov/vuln/detail/CVE-2023-31147 https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31147.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TMzu1Teu8W2WYCPcLUGpbg==&#34;: {&#xA;      &#34;id&#34;: &#34;TMzu1Teu8W2WYCPcLUGpbg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5222&#34;,&#xA;      &#34;description&#34;: &#34;A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the &#39;subtag&#39; struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5222 https://bugzilla.redhat.com/show_bug.cgi?id=2368600 https://www.cve.org/CVERecord?id=CVE-2025-5222 https://nvd.nist.gov/vuln/detail/CVE-2025-5222 https://unicode-org.atlassian.net/jira/software/c/projects/ICU/issues/ICU-22957 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5222.json https://access.redhat.com/errata/RHSA-2025:12083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libicu-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:67.1-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TN9ZqAQo2vEW/Tx62EpRcg==&#34;: {&#xA;      &#34;id&#34;: &#34;TN9ZqAQo2vEW/Tx62EpRcg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21896&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a buffer, the implementation uses Buffer.from() to obtain a buffer from the result of path.resolve(). By monkey-patching buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21896 https://bugzilla.redhat.com/show_bug.cgi?id=2265717 https://www.cve.org/CVERecord?id=CVE-2024-21896 https://nvd.nist.gov/vuln/detail/CVE-2024-21896 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21896.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TNb7OrRxFn2Bis7zp2oi8A==&#34;: {&#xA;      &#34;id&#34;: &#34;TNb7OrRxFn2Bis7zp2oi8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9165&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in LibTIFF. This vulnerability affects the _TIFFmallocExt/_TIFFCheckRealloc/TIFFHashSetNew/InitCCITTFax3 function in the file tools/tiffcmp.c of the tiffcmp component. Executing manipulation can lead to a memory leak. The attack is restricted to local execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-19T20:02:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9165 https://bugzilla.redhat.com/show_bug.cgi?id=2389574 https://www.cve.org/CVERecord?id=CVE-2025-9165 https://nvd.nist.gov/vuln/detail/CVE-2025-9165 http://www.libtiff.org/ https://drive.google.com/file/d/1FWhmkzksH8-qU0ZM6seBzGNB3aPnX3G8/view?usp=sharing https://gitlab.com/libtiff/libtiff/-/commit/ed141286a37f6e5ddafb5069347ff5d587e7a4e0 https://gitlab.com/libtiff/libtiff/-/issues/728 https://gitlab.com/libtiff/libtiff/-/merge_requests/747 https://vuldb.com/?ctiid.320543 https://vuldb.com/?id.320543 https://vuldb.com/?submit.630506 https://vuldb.com/?submit.630507 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9165.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TQEoFglRNgkSreqoAySz5A==&#34;: {&#xA;      &#34;id&#34;: &#34;TQEoFglRNgkSreqoAySz5A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js due to a lack of safeguards on chunk extension bytes. The server may read an unbounded number of bytes from a single connection, which can allow an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22019 https://bugzilla.redhat.com/show_bug.cgi?id=2264574 https://www.cve.org/CVERecord?id=CVE-2024-22019 https://nvd.nist.gov/vuln/detail/CVE-2024-22019 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22019.json https://access.redhat.com/errata/RHSA-2024:1438&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-4.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TQa/g/LeIEmPrJezTGlmcw==&#34;: {&#xA;      &#34;id&#34;: &#34;TQa/g/LeIEmPrJezTGlmcw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1526&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \&#34;decompression bomb,\&#34; during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:08:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1526 https://bugzilla.redhat.com/show_bug.cgi?id=2447142 https://www.cve.org/CVERecord?id=CVE-2026-1526 https://nvd.nist.gov/vuln/detail/CVE-2026-1526 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q https://hackerone.com/reports/3481206 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1526.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TRC0h0EsXNyoIhQGny9CvA==&#34;: {&#xA;      &#34;id&#34;: &#34;TRC0h0EsXNyoIhQGny9CvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23085&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23085 https://bugzilla.redhat.com/show_bug.cgi?id=2342618 https://www.cve.org/CVERecord?id=CVE-2025-23085 https://nvd.nist.gov/vuln/detail/CVE-2025-23085 https://nodejs.org/pt/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23085.json https://access.redhat.com/errata/RHSA-2025:1443&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.18.2.1.module+el9.5.0+22758+4ad2c198&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TRd8qEGSmZkjG+mmOfTmTg==&#34;: {&#xA;      &#34;id&#34;: &#34;TRd8qEGSmZkjG+mmOfTmTg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35939&#34;,&#xA;      &#34;description&#34;: &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35939 https://bugzilla.redhat.com/show_bug.cgi?id=1964129 https://www.cve.org/CVERecord?id=CVE-2021-35939 https://nvd.nist.gov/vuln/detail/CVE-2021-35939 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35939.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-rpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TT6ujth4uzblGI4VcnKBOw==&#34;: {&#xA;      &#34;id&#34;: &#34;TT6ujth4uzblGI4VcnKBOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-12084&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in cpython. This vulnerability allows impacted availability via a quadratic algorithm in `xml.dom.minidom` methods, such as `appendChild()`, when building excessively nested documents due to a dependency on `_clear_id_cache()`&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-03T18:55:32Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-12084 https://bugzilla.redhat.com/show_bug.cgi?id=2418655 https://www.cve.org/CVERecord?id=CVE-2025-12084 https://nvd.nist.gov/vuln/detail/CVE-2025-12084 https://github.com/python/cpython/issues/142145 https://github.com/python/cpython/pull/142146 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-12084.json https://access.redhat.com/errata/RHSA-2026:1478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TTh9HGJJgt1I4lhDqtPBIA==&#34;: {&#xA;      &#34;id&#34;: &#34;TTh9HGJJgt1I4lhDqtPBIA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-1095&#34;,&#xA;      &#34;description&#34;: &#34;Unsanitized NUL in environment variables on Windows in syscall and os/exec&#34;,&#xA;      &#34;issued&#34;: &#34;2022-11-01T23:55:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/56284 https://go.dev/cl/446916 https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM/m/hSpmRzk-AgAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.8&#34;&#xA;    },&#xA;    &#34;TU6sUeJdvbpf1Uxt7QBVXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;TU6sUeJdvbpf1Uxt7QBVXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32414&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows out-of-bounds memory access due to incorrect handling of return values in xmlPythonFileRead and xmlPythonFileReadRaw. This is caused by a mismatch between the length of the file in bytes vs the length in characters, as unicode characters can occupy up to 4 bytes per character.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32414 https://bugzilla.redhat.com/show_bug.cgi?id=2358121 https://www.cve.org/CVERecord?id=CVE-2025-32414 https://nvd.nist.gov/vuln/detail/CVE-2025-32414 https://gitlab.gnome.org/GNOME/libxml2/-/issues/889 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32414.json https://access.redhat.com/errata/RHSA-2025:13428&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-12.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TUvm6koxiDQRc/8CJ4TCOA==&#34;: {&#xA;      &#34;id&#34;: &#34;TUvm6koxiDQRc/8CJ4TCOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TXvJlim3LAUzBPedea1SGA==&#34;: {&#xA;      &#34;id&#34;: &#34;TXvJlim3LAUzBPedea1SGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;: {&#xA;      &#34;id&#34;: &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmount&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Tgjy7QZmeE1bsLws5liQbA==&#34;: {&#xA;      &#34;id&#34;: &#34;Tgjy7QZmeE1bsLws5liQbA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1525&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \&#34;Content-Length\&#34; and \&#34;content-length\&#34;). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T19:56:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1525 https://bugzilla.redhat.com/show_bug.cgi?id=2447144 https://www.cve.org/CVERecord?id=CVE-2026-1525 https://nvd.nist.gov/vuln/detail/CVE-2026-1525 https://cna.openjsf.org/security-advisories.html https://cwe.mitre.org/data/definitions/444.html https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm https://hackerone.com/reports/3556037 https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1525.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ThUekCEizKQbaM9qGtWShw==&#34;: {&#xA;      &#34;id&#34;: &#34;ThUekCEizKQbaM9qGtWShw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js package. By embedding non-network imports in data URLs, this flaw allows an attacker to execute arbitrary code, compromising system security.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22020 https://bugzilla.redhat.com/show_bug.cgi?id=2296417 https://www.cve.org/CVERecord?id=CVE-2024-22020 https://nvd.nist.gov/vuln/detail/CVE-2024-22020 https://hackerone.com/reports/2092749 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22020.json https://access.redhat.com/errata/RHSA-2024:5815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.16.0-1.module+el9.4.0+22197+9e60f127&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ToyZiPOtBFPiNJOZ8QaYng==&#34;: {&#xA;      &#34;id&#34;: &#34;ToyZiPOtBFPiNJOZ8QaYng==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23167&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the HTTP parser of Node.js. This vulnerability allows attackers to perform request smuggling and bypass proxy-based access controls via improperly terminated HTTP/1 headers using \\r\\n\\rX instead of the standard \\r\\n\\r\\n.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23167 https://bugzilla.redhat.com/show_bug.cgi?id=2367167 https://www.cve.org/CVERecord?id=CVE-2025-23167 https://nvd.nist.gov/vuln/detail/CVE-2025-23167 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23167.json https://access.redhat.com/errata/RHSA-2025:8468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.19.2-1.module+el9.6.0+23146+be9976bd&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TrfUjn7Hi6JPe4l/9tuyAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;TrfUjn7Hi6JPe4l/9tuyAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28757&#34;,&#xA;      &#34;description&#34;: &#34;An XML Entity Expansion flaw was found in libexpat. This flaw allows an attacker to cause a denial of service when there is an isolated use of external parsers.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28757 https://bugzilla.redhat.com/show_bug.cgi?id=2268766 https://www.cve.org/CVERecord?id=CVE-2024-28757 https://nvd.nist.gov/vuln/detail/CVE-2024-28757 https://github.com/libexpat/libexpat/issues/839 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28757.json https://access.redhat.com/errata/RHBA-2024:2518&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TsVNXuAeF3PhiRZhIOjjtQ==&#34;: {&#xA;      &#34;id&#34;: &#34;TsVNXuAeF3PhiRZhIOjjtQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-50182&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in urllib3. The library fails to properly validate redirect URLs, allowing an attacker to manipulate redirect chains when used in environments like Pyodide utilizing the JavaScript Fetch API. This lack of validation can enable a remote attacker to control the redirect destination, leading to arbitrary URL redirection. Consequently, an attacker can redirect users to malicious websites. This \nvulnerability stems from a failure to constrain the redirect target.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-19T01:42:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-50182 https://bugzilla.redhat.com/show_bug.cgi?id=2373800 https://www.cve.org/CVERecord?id=CVE-2025-50182 https://nvd.nist.gov/vuln/detail/CVE-2025-50182 https://github.com/urllib3/urllib3/commit/7eb4a2aafe49a279c29b6d1f0ed0f42e9736194f https://github.com/urllib3/urllib3/security/advisories/GHSA-48p4-8xcf-vxj5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-50182.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TszqopCoskBv4coMA3/peg==&#34;: {&#xA;      &#34;id&#34;: &#34;TszqopCoskBv4coMA3/peg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1153&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-10T19:00:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1153 https://bugzilla.redhat.com/show_bug.cgi?id=2344743 https://www.cve.org/CVERecord?id=CVE-2025-1153 https://nvd.nist.gov/vuln/detail/CVE-2025-1153 https://sourceware.org/bugzilla/show_bug.cgi?id=32603 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150 https://vuldb.com/?ctiid.295057 https://vuldb.com/?id.295057 https://vuldb.com/?submit.489991 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1153.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TteHTvD/qC9z9/bg4D+o8w==&#34;: {&#xA;      &#34;id&#34;: &#34;TteHTvD/qC9z9/bg4D+o8w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-FileHandle&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.03-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TwoNniaY2Urt7TF64epJXg==&#34;: {&#xA;      &#34;id&#34;: &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-31790&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. Applications that use RSASVE key encapsulation, a method for securely exchanging encryption keys, may inadvertently expose sensitive data. This vulnerability arises when an application processes a malicious, invalid RSA public key provided by an attacker without proper validation. Consequently, the application might send the contents of an uninitialized memory buffer, which could contain confidential information, to the attacker.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31790 https://bugzilla.redhat.com/show_bug.cgi?id=2451094 https://www.cve.org/CVERecord?id=CVE-2026-31790 https://nvd.nist.gov/vuln/detail/CVE-2026-31790 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31790.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Tz9Z9WUqfvL0BrLTJjlG5g==&#34;: {&#xA;      &#34;id&#34;: &#34;Tz9Z9WUqfvL0BrLTJjlG5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33810&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33810 https://bugzilla.redhat.com/show_bug.cgi?id=2456335 https://www.cve.org/CVERecord?id=CVE-2026-33810 https://nvd.nist.gov/vuln/detail/CVE-2026-33810 https://go.dev/cl/763763 https://go.dev/issue/78332 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4866 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33810.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;U/ITon4/vjzN/EsZEGI38Q==&#34;: {&#xA;      &#34;id&#34;: &#34;U/ITon4/vjzN/EsZEGI38Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25652&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security flaw occurs when feeding specially crafted input to `git apply --reject`; a path outside the working tree can be overwritten with partially controlled contents corresponding to the rejected hunk(s) from the given patch.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25652 https://bugzilla.redhat.com/show_bug.cgi?id=2188333 https://www.cve.org/CVERecord?id=CVE-2023-25652 https://nvd.nist.gov/vuln/detail/CVE-2023-25652 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25652.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;U06t0kkLaLeKpn0QxtZUSg==&#34;: {&#xA;      &#34;id&#34;: &#34;U06t0kkLaLeKpn0QxtZUSg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39318&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. The html/template package did not properly handle HMTL-like \&#34;\u003c!--\&#34; and \&#34;--\u003e\&#34; comment tokens, nor hashbang \&#34;#!\&#34; comment tokens, in \u003cscript\u003e contexts. This issue may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39318 https://bugzilla.redhat.com/show_bug.cgi?id=2237776 https://www.cve.org/CVERecord?id=CVE-2023-39318 https://nvd.nist.gov/vuln/detail/CVE-2023-39318 https://go.dev/cl/526156 https://go.dev/issue/62196 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2041.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39318.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;U2e7dgKDqk0OlJ2oJw2iuw==&#34;: {&#xA;      &#34;id&#34;: &#34;U2e7dgKDqk0OlJ2oJw2iuw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-1038&#34;,&#xA;      &#34;description&#34;: &#34;Incorrect sanitization of forwarded query parameters in net/http/httputil&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-06T16:42:43Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/54663 https://go.dev/cl/432976 https://groups.google.com/g/golang-announce/c/xtuG5faxtaU&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.7&#34;&#xA;    },&#xA;    &#34;U2w6LmoqKmaGSd6IxLZGKg==&#34;: {&#xA;      &#34;id&#34;: &#34;U2w6LmoqKmaGSd6IxLZGKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34397&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNOME GLib. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This issue could lead to the GDBus-based client behaving incorrectly with an application-dependent impact.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34397 https://bugzilla.redhat.com/show_bug.cgi?id=2279632 https://www.cve.org/CVERecord?id=CVE-2024-34397 https://nvd.nist.gov/vuln/detail/CVE-2024-34397 https://gitlab.gnome.org/GNOME/glib/-/issues/3268 https://www.openwall.com/lists/oss-security/2024/05/07/5 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34397.json https://access.redhat.com/errata/RHSA-2024:6464&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-14.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;U31VkPC5v6K7XIsRFDo19w==&#34;: {&#xA;      &#34;id&#34;: &#34;U31VkPC5v6K7XIsRFDo19w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6232&#34;,&#xA;      &#34;description&#34;: &#34;A regular expression denial of service (ReDos) vulnerability was found in Python&#39;s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-03T13:15:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6232 https://bugzilla.redhat.com/show_bug.cgi?id=2309426 https://www.cve.org/CVERecord?id=CVE-2024-6232 https://nvd.nist.gov/vuln/detail/CVE-2024-6232 https://github.com/python/cpython/issues/121285 https://github.com/python/cpython/pull/121286 https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6232.json https://access.redhat.com/errata/RHSA-2024:9468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.19-8.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;U47k8+SGMpP7nHNJFxv5oA==&#34;: {&#xA;      &#34;id&#34;: &#34;U47k8+SGMpP7nHNJFxv5oA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4373&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4373 https://bugzilla.redhat.com/show_bug.cgi?id=2364265 https://www.cve.org/CVERecord?id=CVE-2025-4373 https://nvd.nist.gov/vuln/detail/CVE-2025-4373 https://gitlab.gnome.org/GNOME/glib/-/issues/3677 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4373.json https://access.redhat.com/errata/RHSA-2025:11140&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-16.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;U61IeOaU1v6bOHJxSPbCCw==&#34;: {&#xA;      &#34;id&#34;: &#34;U61IeOaU1v6bOHJxSPbCCw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6923&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the email module that uses Python language. The email module doesn&#39;t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6923 https://bugzilla.redhat.com/show_bug.cgi?id=2302255 https://www.cve.org/CVERecord?id=CVE-2024-6923 https://nvd.nist.gov/vuln/detail/CVE-2024-6923 https://github.com/python/cpython/issues/121650 https://github.com/python/cpython/pull/122233 https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6923.json https://access.redhat.com/errata/RHSA-2024:6163&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;U6XBHhWp5n1+o2ZlJ9FraQ==&#34;: {&#xA;      &#34;id&#34;: &#34;U6XBHhWp5n1+o2ZlJ9FraQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6176&#34;,&#xA;      &#34;description&#34;: &#34;Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-31T00:00:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6176 https://bugzilla.redhat.com/show_bug.cgi?id=2408762 https://www.cve.org/CVERecord?id=CVE-2025-6176 https://nvd.nist.gov/vuln/detail/CVE-2025-6176 https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6176.json https://access.redhat.com/errata/RHSA-2026:2042&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libbrotli&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.0.9-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;U7q9649W3+OXGS9kMwowkw==&#34;: {&#xA;      &#34;id&#34;: &#34;U7q9649W3+OXGS9kMwowkw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;U86hsRMcoSpvWp72aUJNFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;U86hsRMcoSpvWp72aUJNFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24538&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go. This flaw allows a remote attacker to execute arbitrary code on the system, caused by not properly considering backticks (`) as Javascript string delimiters. By sending a specially crafted request, an attacker execute arbitrary code on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24538 https://bugzilla.redhat.com/show_bug.cgi?id=2184481 https://www.cve.org/CVERecord?id=CVE-2023-24538 https://nvd.nist.gov/vuln/detail/CVE-2023-24538 https://github.com/golang/go/issues/59234 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24538.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;U86r1ELAOJanBnxwrapY0g==&#34;: {&#xA;      &#34;id&#34;: &#34;U86r1ELAOJanBnxwrapY0g==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-4015&#34;,&#xA;      &#34;description&#34;: &#34;Excessive CPU consumption in Reader.ReadResponse in net/textproto&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T21:51:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/709859 https://go.dev/issue/75716 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.8&#34;&#xA;    },&#xA;    &#34;UAhBHfztlbXF0z40Y/JYoA==&#34;: {&#xA;      &#34;id&#34;: &#34;UAhBHfztlbXF0z40Y/JYoA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35414&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability arises from the incorrect handling of the authorized_keys principals option in uncommon scenarios. Specifically, when a principals list is used with a Certificate Authority that includes comma characters, OpenSSH may misinterpret the input. This could lead to security bypasses, potentially allowing unintended access or information disclosure in specific authentication contexts.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T17:08:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35414 https://bugzilla.redhat.com/show_bug.cgi?id=2454490 https://www.cve.org/CVERecord?id=CVE-2026-35414 https://nvd.nist.gov/vuln/detail/CVE-2026-35414 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35414.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UApauQbQz6UZdsAuW9miOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UApauQbQz6UZdsAuW9miOQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UBV+Z4vQ/HB9/cVGq/+u3w==&#34;: {&#xA;      &#34;id&#34;: &#34;UBV+Z4vQ/HB9/cVGq/+u3w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-53905&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T20:48:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-53905 https://bugzilla.redhat.com/show_bug.cgi?id=2380362 https://www.cve.org/CVERecord?id=CVE-2025-53905 https://nvd.nist.gov/vuln/detail/CVE-2025-53905 https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239 https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-53905.json https://access.redhat.com/errata/RHSA-2025:17742&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-22.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UBzPfwycyyJOBETwdSTG/w==&#34;: {&#xA;      &#34;id&#34;: &#34;UBzPfwycyyJOBETwdSTG/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-47814&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. When closing a buffer visible in a window, a `BufWinLeave` auto command can trigger a use-after-free if this auto command happens to reopen the same buffer in a new split window. This issue can potentially cause Vim to crash, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-10-07T21:16:01Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-47814 https://bugzilla.redhat.com/show_bug.cgi?id=2317096 https://www.cve.org/CVERecord?id=CVE-2024-47814 https://nvd.nist.gov/vuln/detail/CVE-2024-47814 https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3 https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-47814.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UC0U9/zd+klwBmGR1YYVPg==&#34;: {&#xA;      &#34;id&#34;: &#34;UC0U9/zd+klwBmGR1YYVPg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UCWDKxZlG+RSFVukTFuFFw==&#34;: {&#xA;      &#34;id&#34;: &#34;UCWDKxZlG+RSFVukTFuFFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UEW14H6J4RBSZEjpG6p4bw==&#34;: {&#xA;      &#34;id&#34;: &#34;UEW14H6J4RBSZEjpG6p4bw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24790&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Go language standard library net/netip. The method Is*() (IsPrivate(), IsPublic(), etc) doesn&#39;t behave properly when working with IPv6 mapped to IPv4 addresses. The unexpected behavior can lead to integrity and confidentiality issues, specifically when these methods are used to control access to resources or data.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24790 https://bugzilla.redhat.com/show_bug.cgi?id=2292787 https://www.cve.org/CVERecord?id=CVE-2024-24790 https://nvd.nist.gov/vuln/detail/CVE-2024-24790 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24790.json https://access.redhat.com/errata/RHSA-2024:4212&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.11-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UEgRngB2KVq3bhFU/6+13Q==&#34;: {&#xA;      &#34;id&#34;: &#34;UEgRngB2KVq3bhFU/6+13Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22017&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, where the setuid() does not affect libuv&#39;s internal io_uring operations if initialized before the call to setuid(). This issue allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22017 https://bugzilla.redhat.com/show_bug.cgi?id=2265727 https://www.cve.org/CVERecord?id=CVE-2024-22017 https://nvd.nist.gov/vuln/detail/CVE-2024-22017 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22017.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UH1xPpnVOud+f1gKl26ATQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UH1xPpnVOud+f1gKl26ATQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23936&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the fetch API in Node.js that did not prevent CRLF injection in the &#39;host&#39; header. This issue could allow HTTP response splitting and HTTP header injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23936 https://bugzilla.redhat.com/show_bug.cgi?id=2172190 https://www.cve.org/CVERecord?id=CVE-2023-23936 https://nvd.nist.gov/vuln/detail/CVE-2023-23936 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23936.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UPjX59r3QHIaBVa54cqtzA==&#34;: {&#xA;      &#34;id&#34;: &#34;UPjX59r3QHIaBVa54cqtzA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45290&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was discovered in Go&#39;s net/http standard library package. When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45290 https://bugzilla.redhat.com/show_bug.cgi?id=2268017 https://www.cve.org/CVERecord?id=CVE-2023-45290 https://nvd.nist.gov/vuln/detail/CVE-2023-45290 http://www.openwall.com/lists/oss-security/2024/03/08/4 https://go.dev/cl/569341 https://go.dev/issue/65383 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg https://pkg.go.dev/vuln/GO-2024-2599 https://security.netapp.com/advisory/ntap-20240329-0004 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45290.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;USroe8+XCxLDwAOkjWfs+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;USroe8+XCxLDwAOkjWfs+Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UTm7DZVRUmqWWBx0Js7vCA==&#34;: {&#xA;      &#34;id&#34;: &#34;UTm7DZVRUmqWWBx0Js7vCA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29404&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. The go command may execute arbitrary code at build time when using cgo. This can occur when running \&#34;go get\&#34; on a malicious module, or when running any other command which builds untrusted code. This can be triggered by linker flags, specified via a \&#34;#cgo LDFLAGS\&#34; directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29404 https://bugzilla.redhat.com/show_bug.cgi?id=2217565 https://www.cve.org/CVERecord?id=CVE-2023-29404 https://nvd.nist.gov/vuln/detail/CVE-2023-29404 https://go.dev/cl/501225 https://go.dev/issue/60305 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29404.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UV2MuUVVyu0L6wfdUc0Qpg==&#34;: {&#xA;      &#34;id&#34;: &#34;UV2MuUVVyu0L6wfdUc0Qpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23165&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ReadFileUtf8 internal binding of Node.js. This vulnerability can allow an attacker to cause an application denial of service via repeated file read operations that trigger an unrecoverable memory leak due to a corrupted pointer in the underlying file system binding.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23165 https://bugzilla.redhat.com/show_bug.cgi?id=2367162 https://www.cve.org/CVERecord?id=CVE-2025-23165 https://nvd.nist.gov/vuln/detail/CVE-2025-23165 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23165.json https://access.redhat.com/errata/RHSA-2025:8468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.19.2.1.module+el9.6.0+23146+be9976bd&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UVRy+pWnw+7xa7f2U2B15Q==&#34;: {&#xA;      &#34;id&#34;: &#34;UVRy+pWnw+7xa7f2U2B15Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7008&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222672 https://www.cve.org/CVERecord?id=CVE-2023-7008 https://nvd.nist.gov/vuln/detail/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222261 https://github.com/systemd/systemd/issues/25676 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7008.json https://access.redhat.com/errata/RHSA-2024:2463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-32.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UWR5dcXlfiNMz/BIfTGvfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UWR5dcXlfiNMz/BIfTGvfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35939&#34;,&#xA;      &#34;description&#34;: &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35939 https://bugzilla.redhat.com/show_bug.cgi?id=1964129 https://www.cve.org/CVERecord?id=CVE-2021-35939 https://nvd.nist.gov/vuln/detail/CVE-2021-35939 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35939.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-build-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ub9JoNToSyT09hD5MOIlGA==&#34;: {&#xA;      &#34;id&#34;: &#34;Ub9JoNToSyT09hD5MOIlGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8961&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in libTIFF. This issue affects the  May function of the tiffcrop.c file in the tiffcrop component. This attack needs to be approached locally.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-14T12:02:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8961 https://bugzilla.redhat.com/show_bug.cgi?id=2388541 https://www.cve.org/CVERecord?id=CVE-2025-8961 https://nvd.nist.gov/vuln/detail/CVE-2025-8961 http://www.libtiff.org/ https://drive.google.com/file/d/15L4q2eD8GX3Aj3z6SWC3_FbqaM1ChUx2/view?usp=sharing https://gitlab.com/libtiff/libtiff/-/issues/721 https://gitlab.com/libtiff/libtiff/-/issues/721#note_2670686960 https://vuldb.com/?ctiid.319955 https://vuldb.com/?id.319955 https://vuldb.com/?submit.627957 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8961.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UbJne6U4WRZmmyYLeEtt4w==&#34;: {&#xA;      &#34;id&#34;: &#34;UbJne6U4WRZmmyYLeEtt4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3277&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in SQLite’s `concat_ws()` function, where an integer overflow can be triggered. The resulting truncated integer can allocate a buffer. When SQLite writes the resulting string to the buffer, it uses the original, untruncated size, and a wild heap buffer overflow size of around 4GB can occur. This issue can result in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-14T16:50:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3277 https://bugzilla.redhat.com/show_bug.cgi?id=2359553 https://www.cve.org/CVERecord?id=CVE-2025-3277 https://nvd.nist.gov/vuln/detail/CVE-2025-3277 https://sqlite.org/src/info/498e3f1cf57f164f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3277.json https://access.redhat.com/errata/RHSA-2025:7433&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.15.0-1.module+el9.6.0+23062+9e7801b9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UcI2WjL14mHQYOfXIkpuzA==&#34;: {&#xA;      &#34;id&#34;: &#34;UcI2WjL14mHQYOfXIkpuzA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29400&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. Templates containing actions in unquoted HTML attributes, for example, \&#34;attr={{.}}\&#34;) executed with empty input, could result in output that has unexpected results when parsed due to HTML normalization rules. This issue may allow the injection of arbitrary attributes into tags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29400 https://bugzilla.redhat.com/show_bug.cgi?id=2196029 https://www.cve.org/CVERecord?id=CVE-2023-29400 https://nvd.nist.gov/vuln/detail/CVE-2023-29400 https://go.dev/issue/59722 https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29400.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UcSRaJxHOHBFxbLpeEwTSA==&#34;: {&#xA;      &#34;id&#34;: &#34;UcSRaJxHOHBFxbLpeEwTSA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39326&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Golang net/http/internal package. This issue may allow a malicious user to send an HTTP request and cause the receiver to read more bytes from network than are in the body (up to 1GiB), causing the receiver to fail reading the response, possibly leading to a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39326 https://bugzilla.redhat.com/show_bug.cgi?id=2253330 https://www.cve.org/CVERecord?id=CVE-2023-39326 https://nvd.nist.gov/vuln/detail/CVE-2023-39326 https://pkg.go.dev/vuln/GO-2023-2382 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39326.json https://access.redhat.com/errata/RHSA-2024:1131&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UdpGJo841LNQDU8fdaEoEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UdpGJo841LNQDU8fdaEoEQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25679&#34;,&#xA;      &#34;description&#34;: &#34;The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:28:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25679 https://bugzilla.redhat.com/show_bug.cgi?id=2445356 https://www.cve.org/CVERecord?id=CVE-2026-25679 https://nvd.nist.gov/vuln/detail/CVE-2026-25679 https://go.dev/cl/752180 https://go.dev/issue/77578 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://pkg.go.dev/vuln/GO-2026-4601 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25679.json https://access.redhat.com/errata/RHSA-2026:5942&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.8-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UeiYbCd+yCsmz4K385pQkQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UeiYbCd+yCsmz4K385pQkQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-4175&#34;,&#xA;      &#34;description&#34;: &#34;Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-02T20:55:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/723900 https://go.dev/issue/76442 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.11&#34;&#xA;    },&#xA;    &#34;UeuwcxsDMDrcMU7c13lXsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UeuwcxsDMDrcMU7c13lXsQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4285&#34;,&#xA;      &#34;description&#34;: &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4285 https://bugzilla.redhat.com/show_bug.cgi?id=2150768 https://www.cve.org/CVERecord?id=CVE-2022-4285 https://nvd.nist.gov/vuln/detail/CVE-2022-4285 https://sourceware.org/bugzilla/show_bug.cgi?id=29699 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5c831a3c7f3ca98d6aba1200353311e1a1f84c70 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4285.json https://access.redhat.com/errata/RHSA-2023:6593&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.35.2-42.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UgQV4Vz6WyghQx4C2rQgVw==&#34;: {&#xA;      &#34;id&#34;: &#34;UgQV4Vz6WyghQx4C2rQgVw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12797&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL&#39;s RFC7250 Raw Public Key (RPK) authentication. This vulnerability allows man-in-the-middle (MITM) attacks via failure to abort TLS/DTLS handshakes when the server&#39;s RPK does not match the expected key despite the SSL_VERIFY_PEER verification mode being set.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-11T15:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12797 https://bugzilla.redhat.com/show_bug.cgi?id=2342757 https://www.cve.org/CVERecord?id=CVE-2024-12797 https://nvd.nist.gov/vuln/detail/CVE-2024-12797 https://openssl-library.org/news/secadv/20250211.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12797.json https://access.redhat.com/errata/RHSA-2025:1330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Uh6QIejNBmYSJ+kLmnZWzw==&#34;: {&#xA;      &#34;id&#34;: &#34;Uh6QIejNBmYSJ+kLmnZWzw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-22652&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libeconf library. This issue occurs when parsing a specially crafted configuration file, causing a stack-based buffer overflow, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-22652 https://bugzilla.redhat.com/show_bug.cgi?id=2212463 https://www.cve.org/CVERecord?id=CVE-2023-22652 https://nvd.nist.gov/vuln/detail/CVE-2023-22652 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-22652.json https://access.redhat.com/errata/RHSA-2023:4347&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libeconf&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:0.4.1-3.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UhBP4F/rEtGjZG3U8Wvp2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;UhBP4F/rEtGjZG3U8Wvp2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23166&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, specifically in the C++ method SignTraits::DeriveBits(). This vulnerability can allow a remote attacker to crash the Node.js runtime via untrusted input, triggering an exception in a background thread.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23166 https://bugzilla.redhat.com/show_bug.cgi?id=2367163 https://www.cve.org/CVERecord?id=CVE-2025-23166 https://nvd.nist.gov/vuln/detail/CVE-2025-23166 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23166.json https://access.redhat.com/errata/RHSA-2025:8467&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.16.0-1.module+el9.6.0+23151+b1496e9d&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UiO8eKIdcPJIKIj94tK4ug==&#34;: {&#xA;      &#34;id&#34;: &#34;UiO8eKIdcPJIKIj94tK4ug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0464&#34;,&#xA;      &#34;description&#34;: &#34;A security vulnerability has been identified in all supported OpenSSL versions related to verifying X.509 certificate chains that include policy constraints. This flaw allows attackers to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial of service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the -policy&#39; argument to the command line utilities or calling the X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0464 https://bugzilla.redhat.com/show_bug.cgi?id=2181082 https://www.cve.org/CVERecord?id=CVE-2023-0464 https://nvd.nist.gov/vuln/detail/CVE-2023-0464 https://www.openssl.org/news/secadv/20230322.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0464.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UjXmsuFAyS2A1LN7d6S/5w==&#34;: {&#xA;      &#34;id&#34;: &#34;UjXmsuFAyS2A1LN7d6S/5w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4674&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-29T21:19:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4674 https://bugzilla.redhat.com/show_bug.cgi?id=2384329 https://www.cve.org/CVERecord?id=CVE-2025-4674 https://nvd.nist.gov/vuln/detail/CVE-2025-4674 https://go.dev/cl/686515 https://go.dev/issue/74380 https://groups.google.com/g/golang-announce/c/gTNJnDXmn34 https://pkg.go.dev/vuln/GO-2025-3828 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4674.json https://access.redhat.com/errata/RHSA-2025:13935&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.6-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UoBD3GwEne6Zwl54oZgCCg==&#34;: {&#xA;      &#34;id&#34;: &#34;UoBD3GwEne6Zwl54oZgCCg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2511&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A malicious client can trigger an uncontrolled memory consumption, resulting in a Denial of Service. This issue occurs due to OpenSSL&#39;s TLSv1.3 session cache going into an incorrect state, leading to it failing to flush properly as it fills. OpenSSL must be configured with the non-default SSL_OP_NO_TICKET option enabled to be vulnerable. This issue only affects TLSv1.3 servers, while TLS clients are not affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2511 https://bugzilla.redhat.com/show_bug.cgi?id=2274020 https://www.cve.org/CVERecord?id=CVE-2024-2511 https://nvd.nist.gov/vuln/detail/CVE-2024-2511 https://www.openssl.org/news/vulnerabilities.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2511.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Us6zMNu9gwaRC0UH2SSoQw==&#34;: {&#xA;      &#34;id&#34;: &#34;Us6zMNu9gwaRC0UH2SSoQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24784&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s net/mail standard library package. The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions made by programs using different parsers.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24784 https://bugzilla.redhat.com/show_bug.cgi?id=2268021 https://www.cve.org/CVERecord?id=CVE-2024-24784 https://nvd.nist.gov/vuln/detail/CVE-2024-24784 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24784.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UsE9/aKvx7HhPwZe6KY1zw==&#34;: {&#xA;      &#34;id&#34;: &#34;UsE9/aKvx7HhPwZe6KY1zw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30589&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30589 https://bugzilla.redhat.com/show_bug.cgi?id=2219841 https://www.cve.org/CVERecord?id=CVE-2023-30589 https://nvd.nist.gov/vuln/detail/CVE-2023-30589 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30589.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.1.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UsTHWG7fBbgk8T9K0i79Ww==&#34;: {&#xA;      &#34;id&#34;: &#34;UsTHWG7fBbgk8T9K0i79Ww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2398&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an application configures libcurl to use HTTP/2 server push and the amount of received headers for the push surpasses the maximum allowed limit, libcurl aborts the server push. When aborting, libcurl does not free all the previously allocated headers, resulting in a memory leak.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2398 https://bugzilla.redhat.com/show_bug.cgi?id=2270498 https://www.cve.org/CVERecord?id=CVE-2024-2398 https://nvd.nist.gov/vuln/detail/CVE-2024-2398 https://curl.se/docs/CVE-2024-2398.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2398.json https://access.redhat.com/errata/RHSA-2024:5529&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-29.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UuV6vmv/pMSyQBUW2Wn3bA==&#34;: {&#xA;      &#34;id&#34;: &#34;UuV6vmv/pMSyQBUW2Wn3bA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Uy8P+1ImBLgh4EjZYlMO1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Uy8P+1ImBLgh4EjZYlMO1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4863&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer flaw was found in the way libwebp, a library used to process \&#34;WebP\&#34; image format data, processes certain specially formatted WebP images. An attacker could use this flaw to crash or execute remotely arbitrary code in an application such as a web browser compiled with this library.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4863 https://bugzilla.redhat.com/show_bug.cgi?id=2238431 https://www.cve.org/CVERecord?id=CVE-2023-4863 https://nvd.nist.gov/vuln/detail/CVE-2023-4863 https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/ https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4863.json https://access.redhat.com/errata/RHSA-2023:5214&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libwebp-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.2.0-7.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;UykJtPxmRiaRteAhKYbbOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UykJtPxmRiaRteAhKYbbOQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-42574&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the way Unicode standards are implemented in the context of development environments, which have specialized requirements for rendering text. An attacker could exploit this to deceive a human reviewer by creating a malicious patch containing well placed BiDi characters. The special handling and rendering of those characters can be then used in an attempt to hide unexpected and potentially dangerous behaviour from the reviewer.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-11-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-42574 https://bugzilla.redhat.com/show_bug.cgi?id=2005819 https://access.redhat.com/security/vulnerabilities/RHSB-2021-007 https://www.cve.org/CVERecord?id=CVE-2021-42574 https://nvd.nist.gov/vuln/detail/CVE-2021-42574 https://trojansource.codes/ https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing https://www.unicode.org/reports/tr39/ https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-42574.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;V+7K8Rg1uux3xnVmyH12/A==&#34;: {&#xA;      &#34;id&#34;: &#34;V+7K8Rg1uux3xnVmyH12/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28835&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \&#34;certtool --verify-chain\&#34; command.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28835 https://bugzilla.redhat.com/show_bug.cgi?id=2269084 https://www.cve.org/CVERecord?id=CVE-2024-28835 https://nvd.nist.gov/vuln/detail/CVE-2024-28835 https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28835.json https://access.redhat.com/errata/RHSA-2024:1879&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.7.6-23.el9_3.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;V0Rkaf0QFhuzPUd+sx60Og==&#34;: {&#xA;      &#34;id&#34;: &#34;V0Rkaf0QFhuzPUd+sx60Og==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23085&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23085 https://bugzilla.redhat.com/show_bug.cgi?id=2342618 https://www.cve.org/CVERecord?id=CVE-2025-23085 https://nvd.nist.gov/vuln/detail/CVE-2025-23085 https://nodejs.org/pt/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23085.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.2-1.22.13.1.1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;V0awGVhndNVps/Yhh/P2GQ==&#34;: {&#xA;      &#34;id&#34;: &#34;V0awGVhndNVps/Yhh/P2GQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30589&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30589 https://bugzilla.redhat.com/show_bug.cgi?id=2219841 https://www.cve.org/CVERecord?id=CVE-2023-30589 https://nvd.nist.gov/vuln/detail/CVE-2023-30589 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30589.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;V2/vsNJeH5BxrzuVis91/A==&#34;: {&#xA;      &#34;id&#34;: &#34;V2/vsNJeH5BxrzuVis91/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15282&#34;,&#xA;      &#34;description&#34;: &#34;Missing newline filtering has been discovered in Python. User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:35:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15282 https://bugzilla.redhat.com/show_bug.cgi?id=2431366 https://www.cve.org/CVERecord?id=CVE-2025-15282 https://nvd.nist.gov/vuln/detail/CVE-2025-15282 https://github.com/python/cpython/issues/143925 https://github.com/python/cpython/pull/143926 https://mail.python.org/archives/list/security-announce@python.org/thread/X66HL7SISGJT33J53OHXMZT4DFLMHVKF/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15282.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;V2C0OnbFKs9wiV3IrUOPew==&#34;: {&#xA;      &#34;id&#34;: &#34;V2C0OnbFKs9wiV3IrUOPew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;V4GddSO/lMB9AeE2VC0gSA==&#34;: {&#xA;      &#34;id&#34;: &#34;V4GddSO/lMB9AeE2VC0gSA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69646&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. A local attacker can exploit this vulnerability by supplying a malicious input file containing malformed DWARF debug_rnglists data. This can cause the objdump tool to enter an unbounded logging loop, leading to excessive CPU and I/O usage and preventing analysis completion. This issue results in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69646 https://bugzilla.redhat.com/show_bug.cgi?id=2445264 https://www.cve.org/CVERecord?id=CVE-2025-69646 https://nvd.nist.gov/vuln/detail/CVE-2025-69646 https://sourceware.org/bugzilla/show_bug.cgi?id=33638 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=598704a00cbac5e85c2bedd363357b5bf6fcee33 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69646.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;V6UHlQALqhW5x7Cn9PKUfg==&#34;: {&#xA;      &#34;id&#34;: &#34;V6UHlQALqhW5x7Cn9PKUfg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26996&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-20T03:05:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26996 https://bugzilla.redhat.com/show_bug.cgi?id=2441268 https://www.cve.org/CVERecord?id=CVE-2026-26996 https://nvd.nist.gov/vuln/detail/CVE-2026-26996 https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26996.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;V8n5VKFkjNZwkLq+W6E59g==&#34;: {&#xA;      &#34;id&#34;: &#34;V8n5VKFkjNZwkLq+W6E59g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6129&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in in the POLY1305 MAC (message authentication code) implementation in OpenSSL, affecting applications running on PowerPC CPU-based platforms that utilize vector instructions, and has the potential to corrupt the internal state of these applications. If an attacker can manipulate the utilization of the POLY1305 MAC algorithm, it may lead to the corruption of the application state, resulting in various application-dependent consequences, often resulting in a crash and leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6129 https://bugzilla.redhat.com/show_bug.cgi?id=2257571 https://www.cve.org/CVERecord?id=CVE-2023-6129 https://nvd.nist.gov/vuln/detail/CVE-2023-6129 https://www.openssl.org/news/secadv/20240109.txt https://www.openwall.com/lists/oss-security/2024/01/09/1 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6129.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;V8tjixCGBsaAWvQP5Hvn+A==&#34;: {&#xA;      &#34;id&#34;: &#34;V8tjixCGBsaAWvQP5Hvn+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5713&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. A malicious Python process could exploit the \&#34;profiling.sampling\&#34; module and \&#34;asyncio introspection capabilities\&#34; to read and write memory addresses within a privileged process. This vulnerability occurs when the privileged process connects to the malicious process via its remote debugging feature, potentially leading to information disclosure and arbitrary code execution. Successful exploitation requires repeated connections, which may cause instability in the connecting process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-14T15:11:51Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5713 https://bugzilla.redhat.com/show_bug.cgi?id=2458239 https://www.cve.org/CVERecord?id=CVE-2026-5713 https://nvd.nist.gov/vuln/detail/CVE-2026-5713 https://github.com/python/cpython/issues/148178 https://github.com/python/cpython/pull/148187 https://mail.python.org/archives/list/security-announce@python.org/thread/OG4RHARYSNIE22GGOMVMCRH76L5HKPLM/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5713.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;V9f8Tc0z/tWsm1egJDudPA==&#34;: {&#xA;      &#34;id&#34;: &#34;V9f8Tc0z/tWsm1egJDudPA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;V9lyeZvue30g1R6RiITjAw==&#34;: {&#xA;      &#34;id&#34;: &#34;V9lyeZvue30g1R6RiITjAw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32004&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This vulnerability can be exploited by an unauthenticated attacker who places a specialized repository on the target&#39;s local system. If the victim clones this repository, the attacker can execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32004 https://bugzilla.redhat.com/show_bug.cgi?id=2280428 https://www.cve.org/CVERecord?id=CVE-2024-32004 https://nvd.nist.gov/vuln/detail/CVE-2024-32004 https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32004.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VAImfCoV0wqw11Rnggbqlw==&#34;: {&#xA;      &#34;id&#34;: &#34;VAImfCoV0wqw11Rnggbqlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1526&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \&#34;decompression bomb,\&#34; during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:08:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1526 https://bugzilla.redhat.com/show_bug.cgi?id=2447142 https://www.cve.org/CVERecord?id=CVE-2026-1526 https://nvd.nist.gov/vuln/detail/CVE-2026-1526 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q https://hackerone.com/reports/3481206 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1526.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VAdEk79bS0dMBh0fcQAI2w==&#34;: {&#xA;      &#34;id&#34;: &#34;VAdEk79bS0dMBh0fcQAI2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26996&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-20T03:05:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26996 https://bugzilla.redhat.com/show_bug.cgi?id=2441268 https://www.cve.org/CVERecord?id=CVE-2026-26996 https://nvd.nist.gov/vuln/detail/CVE-2026-26996 https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26996.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.2-1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VDQb6roo+zwBamxPu+hGeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;VDQb6roo+zwBamxPu+hGeQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5535&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the &#39;no overlap&#39; response in ALPN or uses the output as the opportunistic protocol in NPN.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-5535 https://bugzilla.redhat.com/show_bug.cgi?id=2294581 https://www.cve.org/CVERecord?id=CVE-2024-5535 https://nvd.nist.gov/vuln/detail/CVE-2024-5535 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-5535.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VDdxJUjxgL4zXvGWC/1xnw==&#34;: {&#xA;      &#34;id&#34;: &#34;VDdxJUjxgL4zXvGWC/1xnw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4138&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python tarfile module. This vulnerability allows attackers to bypass extraction filters, enabling symlink targets to escape the destination directory and allowing unauthorized modification of file metadata via the use of TarFile.extract() or TarFile.extractall() with the filter= parameter set to \&#34;data\&#34; or \&#34;tar\&#34;.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4138 https://bugzilla.redhat.com/show_bug.cgi?id=2372426 https://www.cve.org/CVERecord?id=CVE-2025-4138 https://nvd.nist.gov/vuln/detail/CVE-2025-4138 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4138.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VDqplxSZcK9CHQ9RjGiEqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;VDqplxSZcK9CHQ9RjGiEqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32665&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32665 https://bugzilla.redhat.com/show_bug.cgi?id=2211827 https://www.cve.org/CVERecord?id=CVE-2023-32665 https://nvd.nist.gov/vuln/detail/CVE-2023-32665 https://gitlab.gnome.org/GNOME/glib/-/issues/2121 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32665.json https://access.redhat.com/errata/RHSA-2023:6631&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VEE7ccbKf4EH2dNVXOf2uA==&#34;: {&#xA;      &#34;id&#34;: &#34;VEE7ccbKf4EH2dNVXOf2uA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64118&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in node-tar, a Tar utility for Node.js. This vulnerability allows a local attacker to potentially disclose sensitive information. When the .t (or .list) function is used with { sync: true } to read tar entry contents, and the tar file is concurrently modified on disk to a smaller size, the function may return uninitialized memory contents. This could lead to the exposure of arbitrary data.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-30T17:50:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64118 https://bugzilla.redhat.com/show_bug.cgi?id=2407440 https://www.cve.org/CVERecord?id=CVE-2025-64118 https://nvd.nist.gov/vuln/detail/CVE-2025-64118 https://github.com/isaacs/node-tar/commit/5330eb04bc43014f216e5c271b40d5c00d45224d https://github.com/isaacs/node-tar/issues/445 https://github.com/isaacs/node-tar/pull/446 https://github.com/isaacs/node-tar/security/advisories/GHSA-29xp-372q-xqph https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64118.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VGewdTS02tdqYoORYHK7Rg==&#34;: {&#xA;      &#34;id&#34;: &#34;VGewdTS02tdqYoORYHK7Rg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-39253&#34;,&#xA;      &#34;description&#34;: &#34;Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source&#39;s `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim&#39;s machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-39253 https://bugzilla.redhat.com/show_bug.cgi?id=2137422 https://www.cve.org/CVERecord?id=CVE-2022-39253 https://nvd.nist.gov/vuln/detail/CVE-2022-39253 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-39253.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VJAm4vMolMmA2ytzFknQUA==&#34;: {&#xA;      &#34;id&#34;: &#34;VJAm4vMolMmA2ytzFknQUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52356&#34;,&#xA;      &#34;description&#34;: &#34;A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-52356 https://bugzilla.redhat.com/show_bug.cgi?id=2251344 https://www.cve.org/CVERecord?id=CVE-2023-52356 https://nvd.nist.gov/vuln/detail/CVE-2023-52356 https://gitlab.com/libtiff/libtiff/-/issues/622 https://gitlab.com/libtiff/libtiff/-/merge_requests/546 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-52356.json https://access.redhat.com/errata/RHSA-2025:20801&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-15.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VKPJSs7Cf+zeQ6s9gNUvhw==&#34;: {&#xA;      &#34;id&#34;: &#34;VKPJSs7Cf+zeQ6s9gNUvhw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35388&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability allows for a low integrity impact due to the omission of connection multiplexing confirmation for proxy-mode multiplexing sessions. A local user, under specific and complex conditions requiring user interaction, could potentially establish a multiplexed session without explicit confirmation, leading to unintended data handling.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:57:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35388 https://bugzilla.redhat.com/show_bug.cgi?id=2454500 https://www.cve.org/CVERecord?id=CVE-2026-35388 https://nvd.nist.gov/vuln/detail/CVE-2026-35388 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35388.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VMHGA3jL56ecJElCiIU9nQ==&#34;: {&#xA;      &#34;id&#34;: &#34;VMHGA3jL56ecJElCiIU9nQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4786&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python webbrowser.open() API. If a specially crafted URL containing \&#34;%action\&#34; is processed, an attacker could bypass a previous mitigation for CVE-2026-4519. This bypass allows for command injection into the underlying shell, potentially leading to arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T21:52:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4786 https://bugzilla.redhat.com/show_bug.cgi?id=2458049 https://www.cve.org/CVERecord?id=CVE-2026-4786 https://nvd.nist.gov/vuln/detail/CVE-2026-4786 https://github.com/python/cpython/issues/148169 https://github.com/python/cpython/pull/148170 https://mail.python.org/archives/list/security-announce@python.org/thread/JQDUNJVB4AQNTJECSUKOBDU3XCJIPSE5/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4786.json https://access.redhat.com/errata/RHSA-2026:10949&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VNA7ljkMyeRq9SDNO9drHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;VNA7ljkMyeRq9SDNO9drHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1568&#34;,&#xA;      &#34;description&#34;: &#34;Path traversal on Windows in path/filepath&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T19:49:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/57274 https://go.dev/cl/468123 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.6&#34;&#xA;    },&#xA;    &#34;VQ+eWJsUMBep4PD4xfj8Vw==&#34;: {&#xA;      &#34;id&#34;: &#34;VQ+eWJsUMBep4PD4xfj8Vw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3517&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the nodejs-minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-02-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3517 https://bugzilla.redhat.com/show_bug.cgi?id=2134609 https://www.cve.org/CVERecord?id=CVE-2022-3517 https://nvd.nist.gov/vuln/detail/CVE-2022-3517 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3517.json https://access.redhat.com/errata/RHSA-2022:8832&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.12.1-1.module+el9.1.0.z+17326+318294bb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VUNwpBj4hvcLARxqxrvCCg==&#34;: {&#xA;      &#34;id&#34;: &#34;VUNwpBj4hvcLARxqxrvCCg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21891&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwritten with user-defined implementations, leading to a filesystem permission model bypass through a path traversal attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21891 https://bugzilla.redhat.com/show_bug.cgi?id=2265720 https://www.cve.org/CVERecord?id=CVE-2024-21891 https://nvd.nist.gov/vuln/detail/CVE-2024-21891 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21891.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VVK93SGSs31Rb325qicorA==&#34;: {&#xA;      &#34;id&#34;: &#34;VVK93SGSs31Rb325qicorA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29458&#34;,&#xA;      &#34;description&#34;: &#34;A segmentation fault vulnerability was found in ncurses&#39;s convert_strings() function of tinfo/read_entry.c file. This flaw occurs due to corrupted terminfo data, triggering an out-of-bounds read error.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-04-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-29458 https://bugzilla.redhat.com/show_bug.cgi?id=2076483 https://www.cve.org/CVERecord?id=CVE-2022-29458 https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-29458.json https://access.redhat.com/errata/RHSA-2025:12876&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:6.2-10.20210508.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VVUozaap6uAAqX8QCLFGyg==&#34;: {&#xA;      &#34;id&#34;: &#34;VVUozaap6uAAqX8QCLFGyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3817&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security issue occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3817 https://bugzilla.redhat.com/show_bug.cgi?id=2227852 https://www.cve.org/CVERecord?id=CVE-2023-3817 https://nvd.nist.gov/vuln/detail/CVE-2023-3817 https://www.openssl.org/news/secadv/20230731.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3817.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;: {&#xA;      &#34;id&#34;: &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30571&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libarchive. This issue can cause a race condition in a multi-threaded use of archive_write_disk_header() on posix based systems, which could allow implicit directory creation with permissions 777, without sticky bit, which means any low privileged user on the system can delete and rename files inside those directories.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30571 https://bugzilla.redhat.com/show_bug.cgi?id=2210921 https://www.cve.org/CVERecord?id=CVE-2023-30571 https://nvd.nist.gov/vuln/detail/CVE-2023-30571 https://access.redhat.com/solutions/7033331 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30571.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;: {&#xA;      &#34;id&#34;: &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1489&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1489 https://bugzilla.redhat.com/show_bug.cgi?id=2433348 https://www.cve.org/CVERecord?id=CVE-2026-1489 https://nvd.nist.gov/vuln/detail/CVE-2026-1489 https://gitlab.gnome.org/GNOME/glib/-/issues/3872 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1489.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VZxWbc2wJwiwTLhillEtpA==&#34;: {&#xA;      &#34;id&#34;: &#34;VZxWbc2wJwiwTLhillEtpA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21892&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. On Linux, Node.js ignores certain environment variables if an unprivileged user has set them while the process is running with elevated privileges, except for CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when other capabilities have been set. This flaw allows unprivileged users to inject code that inherits the process&#39;s elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21892 https://bugzilla.redhat.com/show_bug.cgi?id=2264582 https://www.cve.org/CVERecord?id=CVE-2024-21892 https://nvd.nist.gov/vuln/detail/CVE-2024-21892 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21892.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Vbqm1jpiIiIM2rxq++FdoQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Vbqm1jpiIiIM2rxq++FdoQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38545&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \&#34;let the host resolve the name\&#34; could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38545 https://bugzilla.redhat.com/show_bug.cgi?id=2241933 https://www.cve.org/CVERecord?id=CVE-2023-38545 https://nvd.nist.gov/vuln/detail/CVE-2023-38545 https://curl.se/docs/CVE-2023-38545.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38545.json https://access.redhat.com/errata/RHSA-2023:6745&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VcgFEXPgpzLsj5tOjILVtw==&#34;: {&#xA;      &#34;id&#34;: &#34;VcgFEXPgpzLsj5tOjILVtw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VdMk4kWMgrdK/5+i3n6XhA==&#34;: {&#xA;      &#34;id&#34;: &#34;VdMk4kWMgrdK/5+i3n6XhA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23083&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js diagnostics_channel. This vulnerability allows an attacker to reinstate and misuse worker constructors, potentially bypassing the Permission Model via hooking into events when a worker thread is created.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T01:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23083 https://bugzilla.redhat.com/show_bug.cgi?id=2339392 https://www.cve.org/CVERecord?id=CVE-2025-23083 https://nvd.nist.gov/vuln/detail/CVE-2025-23083 https://nodejs.org/en/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23083.json https://access.redhat.com/errata/RHSA-2025:1443&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.18.2-1.module+el9.5.0+22758+4ad2c198&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VdavXNeRp4EjkXxldYSiUw==&#34;: {&#xA;      &#34;id&#34;: &#34;VdavXNeRp4EjkXxldYSiUw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VgTIKWxJpYFkd788UcqT3A==&#34;: {&#xA;      &#34;id&#34;: &#34;VgTIKWxJpYFkd788UcqT3A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32414&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows out-of-bounds memory access due to incorrect handling of return values in xmlPythonFileRead and xmlPythonFileReadRaw. This is caused by a mismatch between the length of the file in bytes vs the length in characters, as unicode characters can occupy up to 4 bytes per character.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32414 https://bugzilla.redhat.com/show_bug.cgi?id=2358121 https://www.cve.org/CVERecord?id=CVE-2025-32414 https://nvd.nist.gov/vuln/detail/CVE-2025-32414 https://gitlab.gnome.org/GNOME/libxml2/-/issues/889 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32414.json https://access.redhat.com/errata/RHSA-2025:13428&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-12.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VgaIsJDFBatjqT1h+RQLFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;VgaIsJDFBatjqT1h+RQLFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25652&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security flaw occurs when feeding specially crafted input to `git apply --reject`; a path outside the working tree can be overwritten with partially controlled contents corresponding to the rejected hunk(s) from the given patch.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25652 https://bugzilla.redhat.com/show_bug.cgi?id=2188333 https://www.cve.org/CVERecord?id=CVE-2023-25652 https://nvd.nist.gov/vuln/detail/CVE-2023-25652 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25652.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Vl7X+IopOqzOWh1MyUOYCw==&#34;: {&#xA;      &#34;id&#34;: &#34;Vl7X+IopOqzOWh1MyUOYCw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-1394&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \&#34;return nil, nil, fail(...)\&#34; pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-1394 https://bugzilla.redhat.com/show_bug.cgi?id=2262921 https://www.cve.org/CVERecord?id=CVE-2024-1394 https://nvd.nist.gov/vuln/detail/CVE-2024-1394 https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136 https://github.com/golang-fips/openssl/security/advisories/GHSA-78hx-gp6g-7mj6 https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f https://pkg.go.dev/vuln/GO-2024-2660 https://vuln.go.dev/ID/GO-2024-2660.json https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-1394.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Vm1exr1mz0tcpwIoZQ3ySQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Vm1exr1mz0tcpwIoZQ3ySQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35387&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability allows the system to use unintended Elliptic Curve Digital Signature Algorithm (ECDSA) algorithms. This occurs because the configuration for accepted public key algorithms is misinterpreted, leading to the use of weaker cryptographic methods than intended. This could potentially allow an attacker to compromise the confidentiality of data.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:52:53Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35387 https://bugzilla.redhat.com/show_bug.cgi?id=2454494 https://www.cve.org/CVERecord?id=CVE-2026-35387 https://nvd.nist.gov/vuln/detail/CVE-2026-35387 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35387.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VnqYDU7XWi+aYnVQJuYtxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;VnqYDU7XWi+aYnVQJuYtxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45341&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/x509 package of the Golang standard library. A certificate with a URI, which has a IPv6 address with a zone ID, may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI; this issue only affects users of private PKIs that make use of URIs.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45341 https://bugzilla.redhat.com/show_bug.cgi?id=2341750 https://www.cve.org/CVERecord?id=CVE-2024-45341 https://nvd.nist.gov/vuln/detail/CVE-2024-45341 https://github.com/golang/go/commit/2b2314e9f6103de322b2e247387c8b01fd0cd5a4 https://github.com/golang/go/issues/71156 https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45341.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;delve&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.1-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VwRZMkFc1pqkTIff/cjZtQ==&#34;: {&#xA;      &#34;id&#34;: &#34;VwRZMkFc1pqkTIff/cjZtQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6075&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in Python’s os.path.expandvars() function that can cause performance degradation. When processing specially crafted, user-controlled input with nested environment variable patterns, the function exhibits quadratic time complexity, potentially leading to excessive CPU usage and denial of service (DoS) conditions. No code execution or data exposure occurs, so the impact is limited to performance slowdown.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-31T16:41:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6075 https://bugzilla.redhat.com/show_bug.cgi?id=2408891 https://www.cve.org/CVERecord?id=CVE-2025-6075 https://nvd.nist.gov/vuln/detail/CVE-2025-6075 https://github.com/python/cpython/issues/136065 https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6075.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Vwf+9XwzpTrnxfhej9q9cg==&#34;: {&#xA;      &#34;id&#34;: &#34;Vwf+9XwzpTrnxfhej9q9cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-65018&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow flaw has been discovered in libpng. There is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:50:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-65018 https://bugzilla.redhat.com/show_bug.cgi?id=2416907 https://www.cve.org/CVERecord?id=CVE-2025-65018 https://nvd.nist.gov/vuln/detail/CVE-2025-65018 https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea https://github.com/pnggroup/libpng/issues/755 https://github.com/pnggroup/libpng/pull/757 https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-65018.json https://access.redhat.com/errata/RHSA-2026:0238&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VxNINARrmRd6QnZ2htNesA==&#34;: {&#xA;      &#34;id&#34;: &#34;VxNINARrmRd6QnZ2htNesA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22874&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s crypto/x509 package. This vulnerability allows improper certificate validation, bypassing policy constraints via using ExtKeyUsageAny in VerifyOptions.KeyUsages.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T16:42:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22874 https://bugzilla.redhat.com/show_bug.cgi?id=2372320 https://www.cve.org/CVERecord?id=CVE-2025-22874 https://nvd.nist.gov/vuln/detail/CVE-2025-22874 https://go.dev/cl/670375 https://go.dev/issue/73612 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A https://pkg.go.dev/vuln/GO-2025-3749 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22874.json https://access.redhat.com/errata/RHSA-2025:10676&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.4-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;VyeYHICkBiXwLbWKsz4//A==&#34;: {&#xA;      &#34;id&#34;: &#34;VyeYHICkBiXwLbWKsz4//A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js package. By embedding non-network imports in data URLs, this flaw allows an attacker to execute arbitrary code, compromising system security.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22020 https://bugzilla.redhat.com/show_bug.cgi?id=2296417 https://www.cve.org/CVERecord?id=CVE-2024-22020 https://nvd.nist.gov/vuln/detail/CVE-2024-22020 https://hackerone.com/reports/2092749 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22020.json https://access.redhat.com/errata/RHSA-2024:5815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;W01A5sOetTjsV/4bYawPgA==&#34;: {&#xA;      &#34;id&#34;: &#34;W01A5sOetTjsV/4bYawPgA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4673&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in net/http. Handling Proxy-Authorization and Proxy-Authenticate headers during cross-origin redirects allows these headers to be inadvertently forwarded, potentially exposing sensitive authentication credentials. This flaw allows a network-based attacker to manipulate redirect responses, unintentionally exposing authentication details to unauthorized parties.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T16:42:53Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4673 https://bugzilla.redhat.com/show_bug.cgi?id=2373305 https://www.cve.org/CVERecord?id=CVE-2025-4673 https://nvd.nist.gov/vuln/detail/CVE-2025-4673 https://go.dev/cl/679257 https://go.dev/issue/73816 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A https://pkg.go.dev/vuln/GO-2025-3751 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4673.json https://access.redhat.com/errata/RHSA-2025:10676&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.4-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;W08Ska67/8hV/b3GYflglQ==&#34;: {&#xA;      &#34;id&#34;: &#34;W08Ska67/8hV/b3GYflglQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32067&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32067 https://bugzilla.redhat.com/show_bug.cgi?id=2209502 https://www.cve.org/CVERecord?id=CVE-2023-32067 https://nvd.nist.gov/vuln/detail/CVE-2023-32067 https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32067.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;W0TAw6aTfwXOMlJwloDkZA==&#34;: {&#xA;      &#34;id&#34;: &#34;W0TAw6aTfwXOMlJwloDkZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-4136&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-12-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-4136 https://bugzilla.redhat.com/show_bug.cgi?id=2034720 https://www.cve.org/CVERecord?id=CVE-2021-4136 https://nvd.nist.gov/vuln/detail/CVE-2021-4136 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-4136.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;W1tMz8vPaPxg0wpYqAjagA==&#34;: {&#xA;      &#34;id&#34;: &#34;W1tMz8vPaPxg0wpYqAjagA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25646&#34;,&#xA;      &#34;description&#34;: &#34;A heap based buffer overflow flaw has been discovered in LibPNG. Prior to version 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user&#39;s display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T17:04:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25646 https://bugzilla.redhat.com/show_bug.cgi?id=2438542 https://www.cve.org/CVERecord?id=CVE-2026-25646 https://nvd.nist.gov/vuln/detail/CVE-2026-25646 http://www.openwall.com/lists/oss-security/2026/02/09/7 https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88 https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25646.json https://access.redhat.com/errata/RHSA-2026:3405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;W38wbfyrQoe88ivLfgHXaA==&#34;: {&#xA;      &#34;id&#34;: &#34;W38wbfyrQoe88ivLfgHXaA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1525&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \&#34;Content-Length\&#34; and \&#34;content-length\&#34;). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T19:56:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1525 https://bugzilla.redhat.com/show_bug.cgi?id=2447144 https://www.cve.org/CVERecord?id=CVE-2026-1525 https://nvd.nist.gov/vuln/detail/CVE-2026-1525 https://cna.openjsf.org/security-advisories.html https://cwe.mitre.org/data/definitions/444.html https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm https://hackerone.com/reports/3556037 https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1525.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;W3qe9/KhW5BUF2s+kXxVcA==&#34;: {&#xA;      &#34;id&#34;: &#34;W3qe9/KhW5BUF2s+kXxVcA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5981&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5981 https://bugzilla.redhat.com/show_bug.cgi?id=2248445 https://www.cve.org/CVERecord?id=CVE-2023-5981 https://nvd.nist.gov/vuln/detail/CVE-2023-5981 https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5981.json https://access.redhat.com/errata/RHSA-2024:0533&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.7.6-23.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;W4i+1AnMm5l6mD/A/2lJnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;W4i+1AnMm5l6mD/A/2lJnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33636&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng. A remote attacker could exploit an out-of-bounds read and write vulnerability in the ARM/AArch64 Neon-optimized palette expansion path. This occurs when processing a final partial chunk of 8-bit paletted rows without verifying sufficient input pixels, leading to dereferencing pointers before the start of the row buffer and writing expanded pixel data to underflowed positions. This flaw can result in information disclosure and denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-26T16:51:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33636 https://bugzilla.redhat.com/show_bug.cgi?id=2451819 https://www.cve.org/CVERecord?id=CVE-2026-33636 https://nvd.nist.gov/vuln/detail/CVE-2026-33636 https://github.com/pnggroup/libpng/commit/7734cda20cf1236aef60f3bbd2267c97bbb40869 https://github.com/pnggroup/libpng/commit/aba9f18eba870d14fb52c5ba5d73451349e339c3 https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33636.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;W5AFCpfA9GqOU4nKI8CYwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;W5AFCpfA9GqOU4nKI8CYwQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23085&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23085 https://bugzilla.redhat.com/show_bug.cgi?id=2342618 https://www.cve.org/CVERecord?id=CVE-2025-23085 https://nvd.nist.gov/vuln/detail/CVE-2025-23085 https://nodejs.org/pt/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23085.json https://access.redhat.com/errata/RHSA-2025:1446&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.18.20.6.1.module+el9.5.0+22773+9a359385&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;W5SSItV7fPTUmtVkE5E9HQ==&#34;: {&#xA;      &#34;id&#34;: &#34;W5SSItV7fPTUmtVkE5E9HQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25646&#34;,&#xA;      &#34;description&#34;: &#34;A heap based buffer overflow flaw has been discovered in LibPNG. Prior to version 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user&#39;s display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T17:04:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25646 https://bugzilla.redhat.com/show_bug.cgi?id=2438542 https://www.cve.org/CVERecord?id=CVE-2026-25646 https://nvd.nist.gov/vuln/detail/CVE-2026-25646 http://www.openwall.com/lists/oss-security/2026/02/09/7 https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88 https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25646.json https://access.redhat.com/errata/RHSA-2026:3405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;W5birtu1clZwp55QDPxkAA==&#34;: {&#xA;      &#34;id&#34;: &#34;W5birtu1clZwp55QDPxkAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5678&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL, which caused the generation or checking of long X9.42 DH keys or parameters to be much slower than expected. This issue could lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5678 https://bugzilla.redhat.com/show_bug.cgi?id=2248616 https://www.cve.org/CVERecord?id=CVE-2023-5678 https://nvd.nist.gov/vuln/detail/CVE-2023-5678 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6 https://www.openssl.org/news/secadv/20231106.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5678.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;W9IdHW1dLxMcDTawlof8yw==&#34;: {&#xA;      &#34;id&#34;: &#34;W9IdHW1dLxMcDTawlof8yw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28863&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in ISAACS&#39;s node-tar, where it is vulnerable to a denial of service, caused by the lack of folder count validation. The vulnerability exists due to the application not properly controlling the consumption of internal resources while parsing a tar file. By sending a specially crafted request, a remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28863 https://bugzilla.redhat.com/show_bug.cgi?id=2293200 https://www.cve.org/CVERecord?id=CVE-2024-28863 https://nvd.nist.gov/vuln/detail/CVE-2024-28863 https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36 https://security.netapp.com/advisory/ntap-20240524-0005/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28863.json https://access.redhat.com/errata/RHSA-2024:6147&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.4-1.module+el9.4.0+22195+c221878e&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;W9Pcn9xdPg78KgFAK5oOyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;W9Pcn9xdPg78KgFAK5oOyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0450&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python/CPython &#39;zipfile&#39; that can allow a zip-bomb type of attack. An attacker may craft a zip file format, leading to a Denial of Service when processed.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0450 https://bugzilla.redhat.com/show_bug.cgi?id=2276525 https://www.cve.org/CVERecord?id=CVE-2024-0450 https://nvd.nist.gov/vuln/detail/CVE-2024-0450 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0450.json https://access.redhat.com/errata/RHSA-2024:4078&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WACsy7vAhq3GJRyxAuj7NA==&#34;: {&#xA;      &#34;id&#34;: &#34;WACsy7vAhq3GJRyxAuj7NA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4752&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, where it is vulnerable to a use-after-free in the ins_compl_get_exp function. This flaw allows a specially crafted file to crash software, use unexpected values, or possibly execute code when opened in Vim.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4752 https://bugzilla.redhat.com/show_bug.cgi?id=2237311 https://www.cve.org/CVERecord?id=CVE-2023-4752 https://nvd.nist.gov/vuln/detail/CVE-2023-4752 https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4752.json https://access.redhat.com/errata/RHSA-2025:7440&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-22.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WALxwIFXDH8ZvKesDKBFiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WALxwIFXDH8ZvKesDKBFiQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4138&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python tarfile module. This vulnerability allows attackers to bypass extraction filters, enabling symlink targets to escape the destination directory and allowing unauthorized modification of file metadata via the use of TarFile.extract() or TarFile.extractall() with the filter= parameter set to \&#34;data\&#34; or \&#34;tar\&#34;.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4138 https://bugzilla.redhat.com/show_bug.cgi?id=2372426 https://www.cve.org/CVERecord?id=CVE-2025-4138 https://nvd.nist.gov/vuln/detail/CVE-2025-4138 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4138.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WCZXmTnbo+2lbMuZdpH8NA==&#34;: {&#xA;      &#34;id&#34;: &#34;WCZXmTnbo+2lbMuZdpH8NA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27043&#34;,&#xA;      &#34;description&#34;: &#34;The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27043 https://bugzilla.redhat.com/show_bug.cgi?id=2196183 https://www.cve.org/CVERecord?id=CVE-2023-27043 https://nvd.nist.gov/vuln/detail/CVE-2023-27043 https://access.redhat.com/articles/7051467 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27043.json https://access.redhat.com/errata/RHSA-2024:0466&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-1.el9_3.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WFXV6zzHKCX8JuqtokClVw==&#34;: {&#xA;      &#34;id&#34;: &#34;WFXV6zzHKCX8JuqtokClVw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0465&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. OpenSSL and other certificate policy checks silently ignore invalid certificate policies in leaf certificates that are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0465 https://bugzilla.redhat.com/show_bug.cgi?id=2182561 https://www.cve.org/CVERecord?id=CVE-2023-0465 https://nvd.nist.gov/vuln/detail/CVE-2023-0465 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0465.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WGccGAwrqbQSNjycPuaPsA==&#34;: {&#xA;      &#34;id&#34;: &#34;WGccGAwrqbQSNjycPuaPsA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-43552&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in curl. In this issue, curl can be asked to tunnel all protocols virtually it supports through an HTTP proxy. HTTP proxies can deny these tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific SMB or TELNET protocols, curl can use a heap-allocated struct after it has been freed and shut down the code path in its transfer.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-43552 https://bugzilla.redhat.com/show_bug.cgi?id=2152652 https://www.cve.org/CVERecord?id=CVE-2022-43552 https://nvd.nist.gov/vuln/detail/CVE-2022-43552 https://curl.se/docs/CVE-2022-43552.html https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-43552.json https://access.redhat.com/errata/RHSA-2023:2478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WGwIYJUrzsJ4/8TTyxMGGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WGwIYJUrzsJ4/8TTyxMGGQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27138&#34;,&#xA;      &#34;description&#34;: &#34;A certificate validation flaw has been discovered in the golang crypto/x509 module. Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:28:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27138 https://bugzilla.redhat.com/show_bug.cgi?id=2445344 https://www.cve.org/CVERecord?id=CVE-2026-27138 https://nvd.nist.gov/vuln/detail/CVE-2026-27138 https://go.dev/cl/752183 https://go.dev/issue/77953 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://pkg.go.dev/vuln/GO-2026-4600 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27138.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WHLXl098SguAfGDl/9SUeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WHLXl098SguAfGDl/9SUeQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27143&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the cmd/compile package in the Go standard library. The compiler fails to correctly check for integer overflow or underflow in arithmetic operations involving loop induction variables. As a result, the compiler allows invalid memory indexing to occur at runtime, potentially leading to memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27143 https://bugzilla.redhat.com/show_bug.cgi?id=2456342 https://www.cve.org/CVERecord?id=CVE-2026-27143 https://nvd.nist.gov/vuln/detail/CVE-2026-27143 https://go.dev/cl/763765 https://go.dev/issue/78333 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4868 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27143.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WHMzYQNPFNnp30WX8W+gnw==&#34;: {&#xA;      &#34;id&#34;: &#34;WHMzYQNPFNnp30WX8W+gnw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WIbunUW6+W30QKZc5Tmqzw==&#34;: {&#xA;      &#34;id&#34;: &#34;WIbunUW6+W30QKZc5Tmqzw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32020&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw allows an unauthenticated attacker to place a specialized repository on their target&#39;s local system. For performance reasons, Git uses hardlinks when cloning a repository located on the same disk. However, if the repo being cloned is owned by a different user, this can introduce a security risk. At any time in the future, the original repo owner could rewrite the hardlinked files in the cloned user&#39;s repo.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32020 https://bugzilla.redhat.com/show_bug.cgi?id=2280466 https://www.cve.org/CVERecord?id=CVE-2024-32020 https://nvd.nist.gov/vuln/detail/CVE-2024-32020 https://github.com/git/git/security/advisories/GHSA-5rfh-556j-fhgj https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32020.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WKEI7EQhRkCAgIF18HZjKg==&#34;: {&#xA;      &#34;id&#34;: &#34;WKEI7EQhRkCAgIF18HZjKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32573&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in qt. The security flaw occurs due to uninitialized variable usage in m_unitsPerEm.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32573 https://bugzilla.redhat.com/show_bug.cgi?id=2208135 https://www.cve.org/CVERecord?id=CVE-2023-32573 https://nvd.nist.gov/vuln/detail/CVE-2023-32573 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32573.json https://access.redhat.com/errata/RHSA-2023:6369&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;qt5-srpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:5.15.9-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WLpGLJSV+lV8a0xggVfA3A==&#34;: {&#xA;      &#34;id&#34;: &#34;WLpGLJSV+lV8a0xggVfA3A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-48384&#34;,&#xA;      &#34;description&#34;: &#34;A line-end handling flaw was found in Git. When writing a config entry, values with a trailing carriage return (CR) are not quoted, resulting in the CR being lost when the config is read later. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read, resulting in the submodule being checked out to an incorrect location.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T18:23:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-48384 https://bugzilla.redhat.com/show_bug.cgi?id=2378806 https://www.cve.org/CVERecord?id=CVE-2025-48384 https://nvd.nist.gov/vuln/detail/CVE-2025-48384 https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384 https://github.com/git/git/commit/05e9cd64ee23bbadcea6bcffd6660ed02b8eab89 https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9 https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-48384.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WLri8p9NfgX8reKybIYziw==&#34;: {&#xA;      &#34;id&#34;: &#34;WLri8p9NfgX8reKybIYziw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-31498&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This vulnerability allows a remote or local attacker to cause a use-after-free, potentially leading to application-level denial of service or other unexpected behavior via manipulation of DNS responses or network conditions during query processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T13:53:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-31498 https://bugzilla.redhat.com/show_bug.cgi?id=2358271 https://www.cve.org/CVERecord?id=CVE-2025-31498 https://nvd.nist.gov/vuln/detail/CVE-2025-31498 https://github.com/c-ares/c-ares/commit/29d38719112639d8c0ba910254a3dd4f482ea2d1 https://github.com/c-ares/c-ares/pull/821 https://github.com/c-ares/c-ares/security/advisories/GHSA-6hxc-62jh-p29v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-31498.json https://access.redhat.com/errata/RHSA-2025:7426&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.19.1-1.module+el9.6.0+23053+4195b0b2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WNA27LqRIql90O1m/PSAgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WNA27LqRIql90O1m/PSAgQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WNRX1UWo4fDLFOhq9mcbIA==&#34;: {&#xA;      &#34;id&#34;: &#34;WNRX1UWo4fDLFOhq9mcbIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23936&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the fetch API in Node.js that did not prevent CRLF injection in the &#39;host&#39; header. This issue could allow HTTP response splitting and HTTP header injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23936 https://bugzilla.redhat.com/show_bug.cgi?id=2172190 https://www.cve.org/CVERecord?id=CVE-2023-23936 https://nvd.nist.gov/vuln/detail/CVE-2023-23936 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23936.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WOIdi+BEnCeSEkfRBmj1AA==&#34;: {&#xA;      &#34;id&#34;: &#34;WOIdi+BEnCeSEkfRBmj1AA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34156&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34156 https://bugzilla.redhat.com/show_bug.cgi?id=2310528 https://www.cve.org/CVERecord?id=CVE-2024-34156 https://nvd.nist.gov/vuln/detail/CVE-2024-34156 https://go.dev/cl/611239 https://go.dev/issue/69139 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3106 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34156.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WOmMgxwwjpbn/RLQX8HPBg==&#34;: {&#xA;      &#34;id&#34;: &#34;WOmMgxwwjpbn/RLQX8HPBg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24789&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. The ZIP implementation of the Go language archive/zip library behaves differently than the rest of the ZIP file format implementations. When handling ZIP files with a corrupted central directory record, the library skips over the invalid record and processes the next valid one. This flaw allows a malicious user to access hidden information or files inside maliciously crafted ZIP files.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24789 https://bugzilla.redhat.com/show_bug.cgi?id=2292668 https://www.cve.org/CVERecord?id=CVE-2024-24789 https://nvd.nist.gov/vuln/detail/CVE-2024-24789 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24789.json https://access.redhat.com/errata/RHSA-2024:4212&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.11-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;: {&#xA;      &#34;id&#34;: &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WPBuKgPICmQT6PHBjmoC1A==&#34;: {&#xA;      &#34;id&#34;: &#34;WPBuKgPICmQT6PHBjmoC1A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WV6CLob4bxW/eDgXBTJfxA==&#34;: {&#xA;      &#34;id&#34;: &#34;WV6CLob4bxW/eDgXBTJfxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-47081&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-09T17:57:47Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-47081 https://bugzilla.redhat.com/show_bug.cgi?id=2371272 https://www.cve.org/CVERecord?id=CVE-2024-47081 https://nvd.nist.gov/vuln/detail/CVE-2024-47081 http://seclists.org/fulldisclosure/2025/Jun/2 http://www.openwall.com/lists/oss-security/2025/06/03/11 http://www.openwall.com/lists/oss-security/2025/06/03/9 http://www.openwall.com/lists/oss-security/2025/06/04/1 http://www.openwall.com/lists/oss-security/2025/06/04/6 https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef https://github.com/psf/requests/pull/6965 https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7 https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env https://seclists.org/fulldisclosure/2025/Jun/2 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-47081.json https://access.redhat.com/errata/RHSA-2025:12519&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-requests&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.25.1-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WVPPqMDSvwuthc5RexsDjg==&#34;: {&#xA;      &#34;id&#34;: &#34;WVPPqMDSvwuthc5RexsDjg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2650&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL resulting in a possible denial of service while translating ASN.1 object identifiers. Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience long delays when processing messages, which may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2650 https://bugzilla.redhat.com/show_bug.cgi?id=2207947 https://www.cve.org/CVERecord?id=CVE-2023-2650 https://nvd.nist.gov/vuln/detail/CVE-2023-2650 https://www.openssl.org/news/secadv/20230530.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2650.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WVkwWFZlIInzrX99VsKBBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WVkwWFZlIInzrX99VsKBBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-43552&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in curl. In this issue, curl can be asked to tunnel all protocols virtually it supports through an HTTP proxy. HTTP proxies can deny these tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific SMB or TELNET protocols, curl can use a heap-allocated struct after it has been freed and shut down the code path in its transfer.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-43552 https://bugzilla.redhat.com/show_bug.cgi?id=2152652 https://www.cve.org/CVERecord?id=CVE-2022-43552 https://nvd.nist.gov/vuln/detail/CVE-2022-43552 https://curl.se/docs/CVE-2022-43552.html https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-43552.json https://access.redhat.com/errata/RHSA-2023:2478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WXqvm+7SM0p2PgR8h/gpvg==&#34;: {&#xA;      &#34;id&#34;: &#34;WXqvm+7SM0p2PgR8h/gpvg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1526&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \&#34;decompression bomb,\&#34; during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:08:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1526 https://bugzilla.redhat.com/show_bug.cgi?id=2447142 https://www.cve.org/CVERecord?id=CVE-2026-1526 https://nvd.nist.gov/vuln/detail/CVE-2026-1526 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q https://hackerone.com/reports/3481206 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1526.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WhQSrxicq09HlEU8PxUQSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WhQSrxicq09HlEU8PxUQSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WhY0uvyUG/ImjnbaewZftw==&#34;: {&#xA;      &#34;id&#34;: &#34;WhY0uvyUG/ImjnbaewZftw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WhaoYkvfheR7Tz30m0/IKA==&#34;: {&#xA;      &#34;id&#34;: &#34;WhaoYkvfheR7Tz30m0/IKA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-plugin-annobin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WlLXHoXR9O8Ph+uSZ6aDCg==&#34;: {&#xA;      &#34;id&#34;: &#34;WlLXHoXR9O8Ph+uSZ6aDCg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47912&#34;,&#xA;      &#34;description&#34;: &#34;The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \&#34;http://[::1]/\&#34;. IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T22:10:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47912 https://bugzilla.redhat.com/show_bug.cgi?id=2407247 https://www.cve.org/CVERecord?id=CVE-2025-47912 https://nvd.nist.gov/vuln/detail/CVE-2025-47912 https://go.dev/cl/709857 https://go.dev/issue/75678 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://pkg.go.dev/vuln/GO-2025-4010 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47912.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WnkMM/SD0E+7EEac0/vMVg==&#34;: {&#xA;      &#34;id&#34;: &#34;WnkMM/SD0E+7EEac0/vMVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js due to a lack of safeguards on chunk extension bytes. The server may read an unbounded number of bytes from a single connection, which can allow an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22019 https://bugzilla.redhat.com/show_bug.cgi?id=2264574 https://www.cve.org/CVERecord?id=CVE-2024-22019 https://nvd.nist.gov/vuln/detail/CVE-2024-22019 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22019.json https://access.redhat.com/errata/RHSA-2024:1503&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.2.4-1.18.19.1.1.module+el9.3.0+21388+22892fb9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WoF8HAs7BhQT5cycNGL9tw==&#34;: {&#xA;      &#34;id&#34;: &#34;WoF8HAs7BhQT5cycNGL9tw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WqlqRQL17MeMqdTx+SuEyw==&#34;: {&#xA;      &#34;id&#34;: &#34;WqlqRQL17MeMqdTx+SuEyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-46835&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the git GUI package. When a user clones an untrusted repository and edits a file located in a maliciously named directory, git GUI may end up creating or overwriting arbitrary files for the running user has written permission. This flaw allows an attacker to modify the content of target files without the affected user&#39;s intent, resulting in a data integrity issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T15:09:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-46835 https://bugzilla.redhat.com/show_bug.cgi?id=2379326 https://www.cve.org/CVERecord?id=CVE-2025-46835 https://nvd.nist.gov/vuln/detail/CVE-2025-46835 https://github.com/j6t/git-gui/compare/dcda716dbc9c90bcac4611bd1076747671ee0906..a437f5bc93330a70b42a230e52f3bd036ca1b1da https://github.com/j6t/git-gui/security/advisories/GHSA-xfx7-68v4-v8fg https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-46835.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ws0fZZUTvLi37jSEx1MM5g==&#34;: {&#xA;      &#34;id&#34;: &#34;Ws0fZZUTvLi37jSEx1MM5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28322&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free flaw was found in the Curl package. This issue may lead to unintended information disclosure by the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28322 https://bugzilla.redhat.com/show_bug.cgi?id=2196793 https://www.cve.org/CVERecord?id=CVE-2023-28322 https://nvd.nist.gov/vuln/detail/CVE-2023-28322 https://curl.se/docs/CVE-2023-28322.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28322.json https://access.redhat.com/errata/RHSA-2023:4354&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Wv5rERdynoJ/gHM2CtgXiw==&#34;: {&#xA;      &#34;id&#34;: &#34;Wv5rERdynoJ/gHM2CtgXiw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6597&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the tempfile.TemporaryDirectory class in python3/cpython3. The class may dereference symbolic links during permission-related errors, resulting in users that run privileged programs being able to modify permissions of files referenced by the symbolic link.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6597 https://bugzilla.redhat.com/show_bug.cgi?id=2276518 https://www.cve.org/CVERecord?id=CVE-2023-6597 https://nvd.nist.gov/vuln/detail/CVE-2023-6597 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6597.json https://access.redhat.com/errata/RHSA-2024:4078&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WwkM3aNBW0LnenEr6xDxWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WwkM3aNBW0LnenEr6xDxWQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28321&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. An incorrect International Domain Name (IDN) wildcard match may lead to improper certificate validation.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28321 https://bugzilla.redhat.com/show_bug.cgi?id=2196786 https://www.cve.org/CVERecord?id=CVE-2023-28321 https://nvd.nist.gov/vuln/detail/CVE-2023-28321 https://curl.se/docs/CVE-2023-28321.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28321.json https://access.redhat.com/errata/RHSA-2023:4354&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WxO9le6q4ACTs4KnSuckDw==&#34;: {&#xA;      &#34;id&#34;: &#34;WxO9le6q4ACTs4KnSuckDw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-56433&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in shadow-utils. Affected versions of shadow-utils establish a default /etc/subuid behavior, for example, uid 100000 through 165535 for the first user account, that can conflict with the uids of users defined on locally administered networks. This issue potentially leads to account takeover by leveraging newuidmap for access to an NFS home directory or same-host resources for remote logins by these local network users.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-56433 https://bugzilla.redhat.com/show_bug.cgi?id=2334165 https://www.cve.org/CVERecord?id=CVE-2024-56433 https://nvd.nist.gov/vuln/detail/CVE-2024-56433 https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241 https://github.com/shadow-maint/shadow/issues/1157 https://github.com/shadow-maint/shadow/releases/tag/4.4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-56433.json https://access.redhat.com/errata/RHSA-2025:20559&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:4.9-15.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WxgHh2OQ1QuZWw68VI9xSg==&#34;: {&#xA;      &#34;id&#34;: &#34;WxgHh2OQ1QuZWw68VI9xSg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55132&#34;,&#xA;      &#34;description&#34;: &#34;A file access flaw has been discovered in NodeJS. A file&#39;s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55132 https://bugzilla.redhat.com/show_bug.cgi?id=2431338 https://www.cve.org/CVERecord?id=CVE-2025-55132 https://nvd.nist.gov/vuln/detail/CVE-2025-55132 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55132.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Wy87cIX7luFb8A/riFwUyw==&#34;: {&#xA;      &#34;id&#34;: &#34;Wy87cIX7luFb8A/riFwUyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-24765&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw occurs due to Git not checking the ownership of directories in a local multi-user system when running commands specified in the local repository configuration.  This allows the owner of the repository to cause arbitrary commands to be executed by other users who access the repository.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-04-12T10:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-24765 https://bugzilla.redhat.com/show_bug.cgi?id=2073414 https://www.cve.org/CVERecord?id=CVE-2022-24765 https://nvd.nist.gov/vuln/detail/CVE-2022-24765 https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-24765.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WzMeKgvORq7XF2Xr4q+JaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WzMeKgvORq7XF2Xr4q+JaQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30590&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30590 https://bugzilla.redhat.com/show_bug.cgi?id=2219842 https://www.cve.org/CVERecord?id=CVE-2023-30590 https://nvd.nist.gov/vuln/detail/CVE-2023-30590 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30590.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;X+rjva7ecn1JedeVO9IX9w==&#34;: {&#xA;      &#34;id&#34;: &#34;X+rjva7ecn1JedeVO9IX9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:5765&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-3.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;X10PEbhI2yv6KYFUPacecg==&#34;: {&#xA;      &#34;id&#34;: &#34;X10PEbhI2yv6KYFUPacecg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-1619&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim, which is vulnerable to a heap-buffer-overflow in cmdline_erase_chars of the ex_getln.c function. This flaw allows a specially crafted file to crash software, modify memory or execute code when opened in vim.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-05-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-1619 https://bugzilla.redhat.com/show_bug.cgi?id=2083026 https://www.cve.org/CVERecord?id=CVE-2022-1619 https://nvd.nist.gov/vuln/detail/CVE-2022-1619 https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450/ https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1619.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;X1UyeDYfkBXcgz2M5KA5LQ==&#34;: {&#xA;      &#34;id&#34;: &#34;X1UyeDYfkBXcgz2M5KA5LQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6846&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. A heap-buffer-overflow vulnerability exists when processing a specially crafted XCOFF (Extended Common Object File Format) object file during linking. A local attacker could trick a user into processing this malicious file, which could lead to arbitrary code execution, allowing the attacker to run unauthorized commands, or cause a denial of service, making the system unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6846 https://bugzilla.redhat.com/show_bug.cgi?id=2460006 https://www.cve.org/CVERecord?id=CVE-2026-6846 https://nvd.nist.gov/vuln/detail/CVE-2026-6846 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6846.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;X2XVS8beM5noGWCQGlVZ6g==&#34;: {&#xA;      &#34;id&#34;: &#34;X2XVS8beM5noGWCQGlVZ6g==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4865&#34;,&#xA;      &#34;description&#34;: &#34;JsBraceDepth Context Tracking Bugs (XSS) in html/template&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T22:53:49Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/763762 https://go.dev/issue/78331 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.25.9&#34;&#xA;    },&#xA;    &#34;X2wqIFGbKlJQpE/DojrwxA==&#34;: {&#xA;      &#34;id&#34;: &#34;X2wqIFGbKlJQpE/DojrwxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-31498&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This vulnerability allows a remote or local attacker to cause a use-after-free, potentially leading to application-level denial of service or other unexpected behavior via manipulation of DNS responses or network conditions during query processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T13:53:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-31498 https://bugzilla.redhat.com/show_bug.cgi?id=2358271 https://www.cve.org/CVERecord?id=CVE-2025-31498 https://nvd.nist.gov/vuln/detail/CVE-2025-31498 https://github.com/c-ares/c-ares/commit/29d38719112639d8c0ba910254a3dd4f482ea2d1 https://github.com/c-ares/c-ares/pull/821 https://github.com/c-ares/c-ares/security/advisories/GHSA-6hxc-62jh-p29v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-31498.json https://access.redhat.com/errata/RHSA-2025:7426&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.19.1-1.module+el9.6.0+23053+4195b0b2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;X4CDljJQJsftQ2RA57ftuw==&#34;: {&#xA;      &#34;id&#34;: &#34;X4CDljJQJsftQ2RA57ftuw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3807&#34;,&#xA;      &#34;description&#34;: &#34;A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-09-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3807 https://bugzilla.redhat.com/show_bug.cgi?id=2007557 https://www.cve.org/CVERecord?id=CVE-2021-3807 https://nvd.nist.gov/vuln/detail/CVE-2021-3807 https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3807.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;X4Ym25zfqcH7/samBN+yPw==&#34;: {&#xA;      &#34;id&#34;: &#34;X4Ym25zfqcH7/samBN+yPw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5545&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl. An application using libcurl that performs an authenticated HTTP(S) request after a Negotiate-authenticated one to the same host may incorrectly reuse the previous connection. This authentication bypass vulnerability allows the second request to be sent over a connection authenticated with different credentials, potentially leading to unauthorized access or information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5545 https://bugzilla.redhat.com/show_bug.cgi?id=2461204 https://www.cve.org/CVERecord?id=CVE-2026-5545 https://nvd.nist.gov/vuln/detail/CVE-2026-5545 https://curl.se/docs/CVE-2026-5545.html https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5545.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;X5o2Qoo8DgfpPtqZ+d9MzQ==&#34;: {&#xA;      &#34;id&#34;: &#34;X5o2Qoo8DgfpPtqZ+d9MzQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4603&#34;,&#xA;      &#34;description&#34;: &#34;URLs in meta content attribute actions are not escaped in html/template&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:03:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://go.dev/issue/77954 https://go.dev/cl/752081&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.25.8&#34;&#xA;    },&#xA;    &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;: {&#xA;      &#34;id&#34;: &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1965&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:08:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1965 https://bugzilla.redhat.com/show_bug.cgi?id=2446448 https://www.cve.org/CVERecord?id=CVE-2026-1965 https://nvd.nist.gov/vuln/detail/CVE-2026-1965 https://curl.se/docs/CVE-2026-1965.html https://curl.se/docs/CVE-2026-1965.json https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1965.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;X7vlygSvbngQQIjU19VnZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;X7vlygSvbngQQIjU19VnZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;X9G3TF69Pz3xUY5yIPno7w==&#34;: {&#xA;      &#34;id&#34;: &#34;X9G3TF69Pz3xUY5yIPno7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41723&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-17T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41723 https://bugzilla.redhat.com/show_bug.cgi?id=2178358 https://www.cve.org/CVERecord?id=CVE-2022-41723 https://nvd.nist.gov/vuln/detail/CVE-2022-41723 https://github.com/advisories/GHSA-vvpx-j8f3-3w6h https://go.dev/cl/468135 https://go.dev/cl/468295 https://go.dev/issue/57855 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E https://pkg.go.dev/vuln/GO-2023-1571 https://vuln.go.dev/ID/GO-2023-1571.json https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41723.json https://access.redhat.com/errata/RHBA-2023:2181&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.6-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;X9na4KYJ5u50u+KLDr2iTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;X9na4KYJ5u50u+KLDr2iTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-40090&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libtiff library. This issue allows an attacker who can submit a specially crafted file to an application linked with libtiff to cause an infinite loop, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-40090 https://bugzilla.redhat.com/show_bug.cgi?id=2234970 https://www.cve.org/CVERecord?id=CVE-2022-40090 https://nvd.nist.gov/vuln/detail/CVE-2022-40090 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-40090.json https://access.redhat.com/errata/RHSA-2024:2289&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-12.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XC3MXlpMb9D+YigNspsXlA==&#34;: {&#xA;      &#34;id&#34;: &#34;XC3MXlpMb9D+YigNspsXlA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23165&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ReadFileUtf8 internal binding of Node.js. This vulnerability can allow an attacker to cause an application denial of service via repeated file read operations that trigger an unrecoverable memory leak due to a corrupted pointer in the underlying file system binding.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23165 https://bugzilla.redhat.com/show_bug.cgi?id=2367162 https://www.cve.org/CVERecord?id=CVE-2025-23165 https://nvd.nist.gov/vuln/detail/CVE-2025-23165 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23165.json https://access.redhat.com/errata/RHSA-2025:8467&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.16.0-1.module+el9.6.0+23151+b1496e9d&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XEhX6upCFgCYuF9SSk9Iyg==&#34;: {&#xA;      &#34;id&#34;: &#34;XEhX6upCFgCYuF9SSk9Iyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-26465&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client&#39;s memory resource first, turning the attack complexity high.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-26465 https://bugzilla.redhat.com/show_bug.cgi?id=2344780 https://www.cve.org/CVERecord?id=CVE-2025-26465 https://nvd.nist.gov/vuln/detail/CVE-2025-26465 https://access.redhat.com/solutions/7109879 https://seclists.org/oss-sec/2025/q1/144 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-26465.json https://access.redhat.com/errata/RHSA-2025:6993&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-45.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XH8pWtqEhhBDhQuq+NWhvQ==&#34;: {&#xA;      &#34;id&#34;: &#34;XH8pWtqEhhBDhQuq+NWhvQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5129&#34;,&#xA;      &#34;description&#34;: &#34;This CVE ID has been rejected by its CVE Numbering Authority. Duplicate of CVE-2023-4863.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5129 https://bugzilla.redhat.com/show_bug.cgi?id=2240759 https://www.cve.org/CVERecord?id=CVE-2023-5129 https://nvd.nist.gov/vuln/detail/CVE-2023-5129 https://chromium.googlesource.com/webm/libwebp/+/2af26267cdfcb63a88e5c74a85927a12d6ca1d76 https://chromium.googlesource.com/webm/libwebp/+/902bc9190331343b2017211debcec8d2ab87e17a https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5129.json https://access.redhat.com/errata/RHSA-2023:5214&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libwebp&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.2.0-7.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XHSXqyF2rScxnK03VnME5Q==&#34;: {&#xA;      &#34;id&#34;: &#34;XHSXqyF2rScxnK03VnME5Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8176&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtiff. The `get_histogram` function in `file/tiffmedian.c` exhibits a use-after-free condition when processing a specially crafted file, allowing a local attacker to trigger memory corruption. This manipulation results in a use-after-free vulnerability, and can lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-26T03:32:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8176 https://bugzilla.redhat.com/show_bug.cgi?id=2383598 https://www.cve.org/CVERecord?id=CVE-2025-8176 https://nvd.nist.gov/vuln/detail/CVE-2025-8176 http://www.libtiff.org/ https://gitlab.com/libtiff/libtiff/-/commit/fe10872e53efba9cc36c66ac4ab3b41a839d5172 https://gitlab.com/libtiff/libtiff/-/issues/707 https://gitlab.com/libtiff/libtiff/-/merge_requests/727 https://vuldb.com/?ctiid.317590 https://vuldb.com/?id.317590 https://vuldb.com/?submit.621796 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8176.json https://access.redhat.com/errata/RHSA-2025:19113&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-13.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XKuZX/r+YD1eQ8+4f77NQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;XKuZX/r+YD1eQ8+4f77NQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XL+Z1BeLmN8Pi7RZ6D6z/w==&#34;: {&#xA;      &#34;id&#34;: &#34;XL+Z1BeLmN8Pi7RZ6D6z/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15366&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the imaplib module in the Python standard library. The imaplib module does not reject control characters, such as newlines, in user-controlled input passed to IMAP commands. This issue allows an attacker to inject additional commands to be executed in the IMAP server.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:40:24Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15366 https://bugzilla.redhat.com/show_bug.cgi?id=2431368 https://www.cve.org/CVERecord?id=CVE-2025-15366 https://nvd.nist.gov/vuln/detail/CVE-2025-15366 https://github.com/python/cpython/issues/143921 https://github.com/python/cpython/pull/143922 https://mail.python.org/archives/list/security-announce@python.org/thread/DD7C7JZJYTBXMDOWKCEIEBJLBRU64OMR/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15366.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XL1Nv8y45q8aiA92A99YyA==&#34;: {&#xA;      &#34;id&#34;: &#34;XL1Nv8y45q8aiA92A99YyA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0512&#34;,&#xA;      &#34;description&#34;: &#34;A divide-by-zero flaw was found in Vim&#39;s adjust_skipcol() function in the move.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a floating point exception error and causing an application to crash, eventually leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0512 https://bugzilla.redhat.com/show_bug.cgi?id=2165798 https://www.cve.org/CVERecord?id=CVE-2023-0512 https://nvd.nist.gov/vuln/detail/CVE-2023-0512 https://huntr.dev/bounties/de83736a-1936-4872-830b-f1e9b0ad2a74 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0512.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XM09w+ZScTz4IEN6LeAUgg==&#34;: {&#xA;      &#34;id&#34;: &#34;XM09w+ZScTz4IEN6LeAUgg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-27943&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils, where GNU GCC is vulnerable to a denial of service caused by a stack consumption in the demangle_const() function in libiberty/rust-demangle.c. The vulnerability exists due to the application not properly controlling the consumption of internal resources. By persuading a victim to open a specially-crafted file, an attacker could cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-27943 https://bugzilla.redhat.com/show_bug.cgi?id=2071728 https://www.cve.org/CVERecord?id=CVE-2022-27943 https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-27943.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XPiYSctd10AtrHxx1Yivlw==&#34;: {&#xA;      &#34;id&#34;: &#34;XPiYSctd10AtrHxx1Yivlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XSCYGr+cvuvD+k3V0XhWSw==&#34;: {&#xA;      &#34;id&#34;: &#34;XSCYGr+cvuvD+k3V0XhWSw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45143&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Undici node package due to the occurrence of Cross-origin requests, possibly leading to a cookie header leakage. By default, cookie headers are forbidden request headers, and they must be enabled. This flaw allows a malicious user to access this leaked cookie if they have control of the redirection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45143 https://bugzilla.redhat.com/show_bug.cgi?id=2244104 https://www.cve.org/CVERecord?id=CVE-2023-45143 https://nvd.nist.gov/vuln/detail/CVE-2023-45143 https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45143.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XVnPYCI1ck0zTs/Cz6Yl5A==&#34;: {&#xA;      &#34;id&#34;: &#34;XVnPYCI1ck0zTs/Cz6Yl5A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XW4X9/W6MfETfE/VICA4Jw==&#34;: {&#xA;      &#34;id&#34;: &#34;XW4X9/W6MfETfE/VICA4Jw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1376&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU elfutils. This vulnerability allows denial of service via manipulation of the function elf_strptr in /libelf/elf_strptr.c.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-17T04:31:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1376 https://bugzilla.redhat.com/show_bug.cgi?id=2346061 https://www.cve.org/CVERecord?id=CVE-2025-1376 https://nvd.nist.gov/vuln/detail/CVE-2025-1376 https://sourceware.org/bugzilla/attachment.cgi?id=15940 https://sourceware.org/bugzilla/show_bug.cgi?id=32672 https://sourceware.org/bugzilla/show_bug.cgi?id=32672#c3 https://vuldb.com/?ctiid.295984 https://vuldb.com/?id.295984 https://vuldb.com/?submit.497538 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1376.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;elfutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XWaBdbEJiHpYXT1f1eBk1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;XWaBdbEJiHpYXT1f1eBk1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-47007&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak was found in function  stab_demangle_v3_arg in stabs.c in Binutils, allows local attacker to exploit the vulnerability using specially crafted file to cause Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-47007 https://bugzilla.redhat.com/show_bug.cgi?id=2233980 https://www.cve.org/CVERecord?id=CVE-2022-47007 https://nvd.nist.gov/vuln/detail/CVE-2022-47007 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47007.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XWfDomoStj3uOui0AGO+Tg==&#34;: {&#xA;      &#34;id&#34;: &#34;XWfDomoStj3uOui0AGO+Tg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23083&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js diagnostics_channel. This vulnerability allows an attacker to reinstate and misuse worker constructors, potentially bypassing the Permission Model via hooking into events when a worker thread is created.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T01:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23083 https://bugzilla.redhat.com/show_bug.cgi?id=2339392 https://www.cve.org/CVERecord?id=CVE-2025-23083 https://nvd.nist.gov/vuln/detail/CVE-2025-23083 https://nodejs.org/en/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23083.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.13.1-1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XXYPGOxEabdavz27Qo+rWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;XXYPGOxEabdavz27Qo+rWQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52006&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems, most notably .NET and node.js, interpret single Carriage Return characters as newlines, which render the protections against CVE-2020-5260 incomplete for credential helpers, which has the potential to expose stored credentials to malicious URLs.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T18:39:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52006 https://bugzilla.redhat.com/show_bug.cgi?id=2337956 https://www.cve.org/CVERecord?id=CVE-2024-52006 https://nvd.nist.gov/vuln/detail/CVE-2024-52006 https://github.com/git-ecosystem/git-credential-manager/security/advisories/GHSA-86c2-4x57-wc8g https://github.com/git/git/commit/b01b9b81d36759cdcd07305e78765199e1bc2060 https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q https://github.com/git/git/security/advisories/GHSA-r5ph-xg7q-xfrp https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52006.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XXaDpMG90Mb3fV4QxoLqXA==&#34;: {&#xA;      &#34;id&#34;: &#34;XXaDpMG90Mb3fV4QxoLqXA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25883&#34;,&#xA;      &#34;description&#34;: &#34;A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the &#39;new Range&#39; function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25883 https://bugzilla.redhat.com/show_bug.cgi?id=2216475 https://www.cve.org/CVERecord?id=CVE-2022-25883 https://nvd.nist.gov/vuln/detail/CVE-2022-25883 https://github.com/advisories/GHSA-c2qf-rxjj-qqgw https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25883.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XcaHXhT/kGXPIEcG1BNy1g==&#34;: {&#xA;      &#34;id&#34;: &#34;XcaHXhT/kGXPIEcG1BNy1g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61726&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61726 https://bugzilla.redhat.com/show_bug.cgi?id=2434432 https://www.cve.org/CVERecord?id=CVE-2025-61726 https://nvd.nist.gov/vuln/detail/CVE-2025-61726 https://go.dev/cl/736712 https://go.dev/issue/77101 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4341 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61726.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XctMW4QJZO0RsDAv/VoABQ==&#34;: {&#xA;      &#34;id&#34;: &#34;XctMW4QJZO0RsDAv/VoABQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3899&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-22T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3899 https://bugzilla.redhat.com/show_bug.cgi?id=2225407 https://www.cve.org/CVERecord?id=CVE-2023-3899 https://nvd.nist.gov/vuln/detail/CVE-2023-3899 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3899.json https://access.redhat.com/errata/RHSA-2023:4708&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-cloud-what&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.29.33.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-09T14:26:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14831 https://bugzilla.redhat.com/show_bug.cgi?id=2423177 https://www.cve.org/CVERecord?id=CVE-2025-14831 https://nvd.nist.gov/vuln/detail/CVE-2025-14831 https://gitlab.com/gnutls/gnutls/-/issues/1773 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14831.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XfjE+J06ONMJAg7vkQ3tbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;XfjE+J06ONMJAg7vkQ3tbQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25629&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25629 https://bugzilla.redhat.com/show_bug.cgi?id=2265713 https://www.cve.org/CVERecord?id=CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629 https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25629.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XhhNgYgTJmDdYc90YuE8vw==&#34;: {&#xA;      &#34;id&#34;: &#34;XhhNgYgTJmDdYc90YuE8vw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6232&#34;,&#xA;      &#34;description&#34;: &#34;A regular expression denial of service (ReDos) vulnerability was found in Python&#39;s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-03T13:15:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6232 https://bugzilla.redhat.com/show_bug.cgi?id=2309426 https://www.cve.org/CVERecord?id=CVE-2024-6232 https://nvd.nist.gov/vuln/detail/CVE-2024-6232 https://github.com/python/cpython/issues/121285 https://github.com/python/cpython/pull/121286 https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6232.json https://access.redhat.com/errata/RHSA-2024:8446&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XhkP3BSjbvvRVX8X7UztjA==&#34;: {&#xA;      &#34;id&#34;: &#34;XhkP3BSjbvvRVX8X7UztjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-12084&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in cpython. This vulnerability allows impacted availability via a quadratic algorithm in `xml.dom.minidom` methods, such as `appendChild()`, when building excessively nested documents due to a dependency on `_clear_id_cache()`&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-03T18:55:32Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-12084 https://bugzilla.redhat.com/show_bug.cgi?id=2418655 https://www.cve.org/CVERecord?id=CVE-2025-12084 https://nvd.nist.gov/vuln/detail/CVE-2025-12084 https://github.com/python/cpython/issues/142145 https://github.com/python/cpython/pull/142146 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-12084.json https://access.redhat.com/errata/RHSA-2026:1478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XjQpmqOxrg5I1zgVKxswFw==&#34;: {&#xA;      &#34;id&#34;: &#34;XjQpmqOxrg5I1zgVKxswFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XkiVaSOj/tcz5wNKnglN4w==&#34;: {&#xA;      &#34;id&#34;: &#34;XkiVaSOj/tcz5wNKnglN4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33412&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. By including a newline character in a pattern passed to Vim&#39;s glob() function, an attacker may be able to execute arbitrary shell commands. This command injection vulnerability allows for arbitrary code execution, depending on the user&#39;s shell settings.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-24T19:43:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33412 https://bugzilla.redhat.com/show_bug.cgi?id=2450907 https://www.cve.org/CVERecord?id=CVE-2026-33412 https://nvd.nist.gov/vuln/detail/CVE-2026-33412 https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a https://github.com/vim/vim/releases/tag/v9.2.0202 https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33412.json https://access.redhat.com/errata/RHSA-2026:8259&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Xme6FM3Lt2Ob4s0txlAE5w==&#34;: {&#xA;      &#34;id&#34;: &#34;Xme6FM3Lt2Ob4s0txlAE5w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35387&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability allows the system to use unintended Elliptic Curve Digital Signature Algorithm (ECDSA) algorithms. This occurs because the configuration for accepted public key algorithms is misinterpreted, leading to the use of weaker cryptographic methods than intended. This could potentially allow an attacker to compromise the confidentiality of data.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:52:53Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35387 https://bugzilla.redhat.com/show_bug.cgi?id=2454494 https://www.cve.org/CVERecord?id=CVE-2026-35387 https://nvd.nist.gov/vuln/detail/CVE-2026-35387 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35387.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Xms/F5NRiyBcCNuPxw8aoA==&#34;: {&#xA;      &#34;id&#34;: &#34;Xms/F5NRiyBcCNuPxw8aoA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-28164&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng. This buffer overflow vulnerability allows a local attacker to cause a denial of service (DoS) by exploiting the `png_create_read_struct()` function. This can lead to the affected system becoming unresponsive or crashing.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-28164 https://bugzilla.redhat.com/show_bug.cgi?id=2433398 https://www.cve.org/CVERecord?id=CVE-2025-28164 https://nvd.nist.gov/vuln/detail/CVE-2025-28164 https://gist.github.com/kittener/506516f8c22178005b4379c8b2a7de20 https://github.com/pnggroup/libpng/issues/655 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-28164.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Xnj4Kpl+tPifTh/+xOnglw==&#34;: {&#xA;      &#34;id&#34;: &#34;Xnj4Kpl+tPifTh/+xOnglw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Xo53LSQ1UPT3k4c2guU75Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Xo53LSQ1UPT3k4c2guU75Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6993&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in go-kratos kratos. A remote attacker could exploit a vulnerability in the HTTP server&#39;s `NewServer` function, specifically within the `http.DefaultServeMux Fallback Handler`. This manipulation creates an unintended intermediary, which can lead to the disclosure of sensitive information.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-25T18:30:16Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6993 https://bugzilla.redhat.com/show_bug.cgi?id=2461841 https://www.cve.org/CVERecord?id=CVE-2026-6993 https://nvd.nist.gov/vuln/detail/CVE-2026-6993 https://github.com/Yanhu007/kratos/commit/0284a5bcf92b5a7ee015300ce3051baf7ae4718d https://github.com/go-kratos/kratos/ https://github.com/go-kratos/kratos/issues/3810 https://github.com/go-kratos/kratos/pull/3814 https://vuldb.com/submit/797099 https://vuldb.com/vuln/359545 https://vuldb.com/vuln/359545/cti https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6993.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XoUEjlwE1Uyl1H7Seu8qUw==&#34;: {&#xA;      &#34;id&#34;: &#34;XoUEjlwE1Uyl1H7Seu8qUw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5642&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Python/CPython that does not disallow configuring an empty list (\&#34;[]\&#34;) for SSLContext.set_npn_protocols(), which is an invalid value for the underlying OpenSSL API. This issue results in a buffer over-read when NPN is used. See CVE -2024-5535 for OpenSSL for more information.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-5642 https://bugzilla.redhat.com/show_bug.cgi?id=2294682 https://www.cve.org/CVERecord?id=CVE-2024-5642 https://nvd.nist.gov/vuln/detail/CVE-2024-5642 https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-5642.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XqfFkzS9GKZn0SPxJdTgfA==&#34;: {&#xA;      &#34;id&#34;: &#34;XqfFkzS9GKZn0SPxJdTgfA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25547&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-04T21:51:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25547 https://bugzilla.redhat.com/show_bug.cgi?id=2436942 https://www.cve.org/CVERecord?id=CVE-2026-25547 https://nvd.nist.gov/vuln/detail/CVE-2026-25547 https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25547.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;XsxaedsaFYv/ys7GTRoUVw==&#34;: {&#xA;      &#34;id&#34;: &#34;XsxaedsaFYv/ys7GTRoUVw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. This vulnerability allows a remote attacker to inject malicious data into HTTP headers or prematurely end HTTP requests by sending specially crafted input to the `upgrade` option of `client.request()`. This is possible because undici does not properly validate input for invalid header characters, which could lead to unauthorized information disclosure or bypassing of security controls.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:17:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1527 https://bugzilla.redhat.com/show_bug.cgi?id=2447141 https://www.cve.org/CVERecord?id=CVE-2026-1527 https://nvd.nist.gov/vuln/detail/CVE-2026-1527 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq https://hackerone.com/reports/3487198 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1527.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XuMP4XKeqFlYH9jgvFKXXw==&#34;: {&#xA;      &#34;id&#34;: &#34;XuMP4XKeqFlYH9jgvFKXXw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2609&#34;,&#xA;      &#34;description&#34;: &#34;NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1531.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2609 https://bugzilla.redhat.com/show_bug.cgi?id=2209050 https://www.cve.org/CVERecord?id=CVE-2023-2609 https://nvd.nist.gov/vuln/detail/CVE-2023-2609 https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2609.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Y+LzorqDQD2Povh+kyYSqw==&#34;: {&#xA;      &#34;id&#34;: &#34;Y+LzorqDQD2Povh+kyYSqw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Y/1r01hBo8mhueiynQb9pg==&#34;: {&#xA;      &#34;id&#34;: &#34;Y/1r01hBo8mhueiynQb9pg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Y/6FiFNJ+h2jXNTlPOzrnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Y/6FiFNJ+h2jXNTlPOzrnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0051&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow was found in Vim in the msg_puts_printf function in the message.c file. The issue occurs because of an invalid memory access when calculating the length of a string when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0051 https://bugzilla.redhat.com/show_bug.cgi?id=2161348 https://www.cve.org/CVERecord?id=CVE-2023-0051 https://nvd.nist.gov/vuln/detail/CVE-2023-0051 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0051.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Y08Ni7+TSPQ/xSSRr851zQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Y08Ni7+TSPQ/xSSRr851zQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Y2pXpR4HKVIWAZ1sDtjo8A==&#34;: {&#xA;      &#34;id&#34;: &#34;Y2pXpR4HKVIWAZ1sDtjo8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32004&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This vulnerability can be exploited by an unauthenticated attacker who places a specialized repository on the target&#39;s local system. If the victim clones this repository, the attacker can execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32004 https://bugzilla.redhat.com/show_bug.cgi?id=2280428 https://www.cve.org/CVERecord?id=CVE-2024-32004 https://nvd.nist.gov/vuln/detail/CVE-2024-32004 https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32004.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Y3PSsgfYVK7+nWpNGBO9lQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Y3PSsgfYVK7+nWpNGBO9lQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4032&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The ipaddress module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. Due to this issue, it is possible that values will not be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4032 https://bugzilla.redhat.com/show_bug.cgi?id=2292921 https://www.cve.org/CVERecord?id=CVE-2024-4032 https://nvd.nist.gov/vuln/detail/CVE-2024-4032 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4032.json https://access.redhat.com/errata/RHSA-2024:4779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Y6TEBwH0+CoZ50j5sQV23w==&#34;: {&#xA;      &#34;id&#34;: &#34;Y6TEBwH0+CoZ50j5sQV23w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3968&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim. A possible heap use-after-free vulnerability could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-11-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3968 https://bugzilla.redhat.com/show_bug.cgi?id=2025056 https://www.cve.org/CVERecord?id=CVE-2021-3968 https://nvd.nist.gov/vuln/detail/CVE-2021-3968 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3968.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Y7j+Hhv6OMvu2cmEQkev4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Y7j+Hhv6OMvu2cmEQkev4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5642&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Python/CPython that does not disallow configuring an empty list (\&#34;[]\&#34;) for SSLContext.set_npn_protocols(), which is an invalid value for the underlying OpenSSL API. This issue results in a buffer over-read when NPN is used. See CVE -2024-5535 for OpenSSL for more information.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-5642 https://bugzilla.redhat.com/show_bug.cgi?id=2294682 https://www.cve.org/CVERecord?id=CVE-2024-5642 https://nvd.nist.gov/vuln/detail/CVE-2024-5642 https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-5642.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Y7ypeGdtYfJMJApDHYX9tg==&#34;: {&#xA;      &#34;id&#34;: &#34;Y7ypeGdtYfJMJApDHYX9tg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31124&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This issue occurs when cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross-compiling aarch64 android. As a result, it will downgrade to rand(), which could allow an attacker to utilize the lack of entropy by not using a CSPRNG.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31124 https://bugzilla.redhat.com/show_bug.cgi?id=2209494 https://www.cve.org/CVERecord?id=CVE-2023-31124 https://nvd.nist.gov/vuln/detail/CVE-2023-31124 https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31124.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Y9X/nbUFq4l8+xowG5hDkg==&#34;: {&#xA;      &#34;id&#34;: &#34;Y9X/nbUFq4l8+xowG5hDkg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3446&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security flaw occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3446 https://bugzilla.redhat.com/show_bug.cgi?id=2224962 https://www.cve.org/CVERecord?id=CVE-2023-3446 https://nvd.nist.gov/vuln/detail/CVE-2023-3446 https://www.openssl.org/news/secadv/20230719.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3446.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YCFy9R5BUcPVuUEYQkJQ4w==&#34;: {&#xA;      &#34;id&#34;: &#34;YCFy9R5BUcPVuUEYQkJQ4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0464&#34;,&#xA;      &#34;description&#34;: &#34;A security vulnerability has been identified in all supported OpenSSL versions related to verifying X.509 certificate chains that include policy constraints. This flaw allows attackers to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial of service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the -policy&#39; argument to the command line utilities or calling the X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0464 https://bugzilla.redhat.com/show_bug.cgi?id=2181082 https://www.cve.org/CVERecord?id=CVE-2023-0464 https://nvd.nist.gov/vuln/detail/CVE-2023-0464 https://www.openssl.org/news/secadv/20230322.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0464.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YGKNwwPTf6g9pxsaSlPd0g==&#34;: {&#xA;      &#34;id&#34;: &#34;YGKNwwPTf6g9pxsaSlPd0g==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-4155&#34;,&#xA;      &#34;description&#34;: &#34;Excessive resource consumption when printing error string for host certificate validation in crypto/x509&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-02T18:30:24Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/725920 https://go.dev/issue/76445 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.11&#34;&#xA;    },&#xA;    &#34;YHFFhFpG8nzfxX1O469onQ==&#34;: {&#xA;      &#34;id&#34;: &#34;YHFFhFpG8nzfxX1O469onQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61726&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61726 https://bugzilla.redhat.com/show_bug.cgi?id=2434432 https://www.cve.org/CVERecord?id=CVE-2025-61726 https://nvd.nist.gov/vuln/detail/CVE-2025-61726 https://go.dev/cl/736712 https://go.dev/issue/77101 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4341 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61726.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YHdZ6rml8dKQg9XmpjCrnw==&#34;: {&#xA;      &#34;id&#34;: &#34;YHdZ6rml8dKQg9XmpjCrnw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34156&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34156 https://bugzilla.redhat.com/show_bug.cgi?id=2310528 https://www.cve.org/CVERecord?id=CVE-2024-34156 https://nvd.nist.gov/vuln/detail/CVE-2024-34156 https://go.dev/cl/611239 https://go.dev/issue/69139 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3106 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34156.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YIgEtVnwIF6/C/aQPFqKxg==&#34;: {&#xA;      &#34;id&#34;: &#34;YIgEtVnwIF6/C/aQPFqKxg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21713&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The HMAC (Hash-based Message Authentication Code) verification process uses a comparison method that does not take a constant amount of time. This non-constant-time comparison can leak timing information, which, under specific conditions where precise timing measurements are possible, could be exploited by a remote attacker. This allows the attacker to infer sensitive HMAC values, leading to information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21713 https://bugzilla.redhat.com/show_bug.cgi?id=2453160 https://www.cve.org/CVERecord?id=CVE-2026-21713 https://nvd.nist.gov/vuln/detail/CVE-2026-21713 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21713.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;: {&#xA;      &#34;id&#34;: &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3805&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:37Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3805 https://bugzilla.redhat.com/show_bug.cgi?id=2446451 https://www.cve.org/CVERecord?id=CVE-2026-3805 https://nvd.nist.gov/vuln/detail/CVE-2026-3805 http://www.openwall.com/lists/oss-security/2026/03/11/4 https://curl.se/docs/CVE-2026-3805.html https://curl.se/docs/CVE-2026-3805.json https://hackerone.com/reports/3591944 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3805.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YJjb6TqEvdj0lSF4MHg4+w==&#34;: {&#xA;      &#34;id&#34;: &#34;YJjb6TqEvdj0lSF4MHg4+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-12084&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in cpython. This vulnerability allows impacted availability via a quadratic algorithm in `xml.dom.minidom` methods, such as `appendChild()`, when building excessively nested documents due to a dependency on `_clear_id_cache()`&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-03T18:55:32Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-12084 https://bugzilla.redhat.com/show_bug.cgi?id=2418655 https://www.cve.org/CVERecord?id=CVE-2025-12084 https://nvd.nist.gov/vuln/detail/CVE-2025-12084 https://github.com/python/cpython/issues/142145 https://github.com/python/cpython/pull/142146 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-12084.json https://access.redhat.com/errata/RHSA-2026:1478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YJkc0fG7G+dwREiIQihS/A==&#34;: {&#xA;      &#34;id&#34;: &#34;YJkc0fG7G+dwREiIQihS/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YKgthSAonF3epY42eqsMRw==&#34;: {&#xA;      &#34;id&#34;: &#34;YKgthSAonF3epY42eqsMRw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3497&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSH GSSAPI (Generic Security Service Application Program Interface) delta patches, as included in various Linux distributions. A remote attacker could exploit this by sending an unexpected GSSAPI message type during the key exchange process. This occurs because the `sshpkt_disconnect()` function, when called on an error, does not properly terminate the process, leading to the continued execution of the program with uninitialized connection variables. Accessing these uninitialized variables can lead to undefined behavior, potentially resulting in information disclosure or a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T18:27:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3497 https://bugzilla.redhat.com/show_bug.cgi?id=2447085 https://www.cve.org/CVERecord?id=CVE-2026-3497 https://nvd.nist.gov/vuln/detail/CVE-2026-3497 https://ubuntu.com/security/CVE-2026-3497 https://www.openwall.com/lists/oss-security/2026/03/12/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3497.json https://access.redhat.com/errata/RHSA-2026:6462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-48.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YPJKJ4DYdTXL0BJCCS9pgA==&#34;: {&#xA;      &#34;id&#34;: &#34;YPJKJ4DYdTXL0BJCCS9pgA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32067&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32067 https://bugzilla.redhat.com/show_bug.cgi?id=2209502 https://www.cve.org/CVERecord?id=CVE-2023-32067 https://nvd.nist.gov/vuln/detail/CVE-2023-32067 https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32067.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YPUY4Y/POEizUQSOdGH26g==&#34;: {&#xA;      &#34;id&#34;: &#34;YPUY4Y/POEizUQSOdGH26g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47907&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in database/sql. Concurrent queries can produce unexpected results when a query is cancelled during a Scan method call on returned Rows, creating a race condition. This vulnerability allows an attacker who can initiate and cancel queries to trigger this condition, possibly leading to inconsistent data being returned to the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-07T15:25:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47907 https://bugzilla.redhat.com/show_bug.cgi?id=2387083 https://www.cve.org/CVERecord?id=CVE-2025-47907 https://nvd.nist.gov/vuln/detail/CVE-2025-47907 https://go.dev/cl/693735 https://go.dev/issue/74831 https://groups.google.com/g/golang-announce/c/x5MKroML2yM https://pkg.go.dev/vuln/GO-2025-3849 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47907.json https://access.redhat.com/errata/RHSA-2025:13935&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.6-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YQVoCJX8BLl6S5wPwmTGtg==&#34;: {&#xA;      &#34;id&#34;: &#34;YQVoCJX8BLl6S5wPwmTGtg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45290&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was discovered in Go&#39;s net/http standard library package. When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45290 https://bugzilla.redhat.com/show_bug.cgi?id=2268017 https://www.cve.org/CVERecord?id=CVE-2023-45290 https://nvd.nist.gov/vuln/detail/CVE-2023-45290 http://www.openwall.com/lists/oss-security/2024/03/08/4 https://go.dev/cl/569341 https://go.dev/issue/65383 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg https://pkg.go.dev/vuln/GO-2024-2599 https://security.netapp.com/advisory/ntap-20240329-0004 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45290.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YSdK7PYtLQ7JLXu7W4mdRQ==&#34;: {&#xA;      &#34;id&#34;: &#34;YSdK7PYtLQ7JLXu7W4mdRQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-FileHandle&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.03-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YUwZZ9Cg1FloxBZV60vOCg==&#34;: {&#xA;      &#34;id&#34;: &#34;YUwZZ9Cg1FloxBZV60vOCg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2522&#34;,&#xA;      &#34;description&#34;: &#34;A heap buffer overflow vulnerability was found in vim&#39;s ins_compl_infercase_gettext() function of the src/insexpand.c file. This flaw occurs when vim tries to access uninitialized memory when completing a long line. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap-based buffer overflow that causes an application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2522 https://bugzilla.redhat.com/show_bug.cgi?id=2112299 https://www.cve.org/CVERecord?id=CVE-2022-2522 https://nvd.nist.gov/vuln/detail/CVE-2022-2522 https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2522.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YVYIQ/H++AefhUYldlykPg==&#34;: {&#xA;      &#34;id&#34;: &#34;YVYIQ/H++AefhUYldlykPg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-26966&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to an out-of-bounds read in the uv_encode function in libtiff/tif_luv.c, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-26966 https://bugzilla.redhat.com/show_bug.cgi?id=2218749 https://www.cve.org/CVERecord?id=CVE-2023-26966 https://nvd.nist.gov/vuln/detail/CVE-2023-26966 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-26966.json https://access.redhat.com/errata/RHSA-2023:6575&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;: {&#xA;      &#34;id&#34;: &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YXlS56JkLiuXwjbDNwkvdw==&#34;: {&#xA;      &#34;id&#34;: &#34;YXlS56JkLiuXwjbDNwkvdw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5642&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Python/CPython that does not disallow configuring an empty list (\&#34;[]\&#34;) for SSLContext.set_npn_protocols(), which is an invalid value for the underlying OpenSSL API. This issue results in a buffer over-read when NPN is used. See CVE -2024-5535 for OpenSSL for more information.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-5642 https://bugzilla.redhat.com/show_bug.cgi?id=2294682 https://www.cve.org/CVERecord?id=CVE-2024-5642 https://nvd.nist.gov/vuln/detail/CVE-2024-5642 https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-5642.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YXzXrFNVRnn1xbJjvqeq+w==&#34;: {&#xA;      &#34;id&#34;: &#34;YXzXrFNVRnn1xbJjvqeq+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55132&#34;,&#xA;      &#34;description&#34;: &#34;A file access flaw has been discovered in NodeJS. A file&#39;s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55132 https://bugzilla.redhat.com/show_bug.cgi?id=2431338 https://www.cve.org/CVERecord?id=CVE-2025-55132 https://nvd.nist.gov/vuln/detail/CVE-2025-55132 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55132.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YZq+CTlAXva/aUDDEFdZNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;YZq+CTlAXva/aUDDEFdZNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YdpqbsRbo4xx71CiWUF39Q==&#34;: {&#xA;      &#34;id&#34;: &#34;YdpqbsRbo4xx71CiWUF39Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21441&#34;,&#xA;      &#34;description&#34;: &#34;urllib3 is an HTTP client library for Python. urllib3&#39;s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T22:09:01Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21441 https://bugzilla.redhat.com/show_bug.cgi?id=2427726 https://www.cve.org/CVERecord?id=CVE-2026-21441 https://nvd.nist.gov/vuln/detail/CVE-2026-21441 https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21441.json https://access.redhat.com/errata/RHSA-2026:1087&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-urllib3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.26.5-6.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YfE+7ocdRscmJ75uekg0tA==&#34;: {&#xA;      &#34;id&#34;: &#34;YfE+7ocdRscmJ75uekg0tA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28484&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference vulnerability was found in libxml2. This issue occurs when parsing (invalid) XML schemas.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28484 https://bugzilla.redhat.com/show_bug.cgi?id=2185994 https://www.cve.org/CVERecord?id=CVE-2023-28484 https://nvd.nist.gov/vuln/detail/CVE-2023-28484 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28484.json https://access.redhat.com/errata/RHSA-2023:4349&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-3.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YgD8tCzB10z/Jq6XOfCfgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;YgD8tCzB10z/Jq6XOfCfgQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25815&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security flaw occurs when Git compiles with runtime prefix support and runs without translated messages, and it still uses the gettext machinery to display messages, which subsequently looks for translated messages in unexpected places. This flaw allows the malicious placement of crafted messages.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25815 https://bugzilla.redhat.com/show_bug.cgi?id=2188337 https://www.cve.org/CVERecord?id=CVE-2023-25815 https://nvd.nist.gov/vuln/detail/CVE-2023-25815 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25815.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YgehfkOilPM31dosmRXxDA==&#34;: {&#xA;      &#34;id&#34;: &#34;YgehfkOilPM31dosmRXxDA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35386&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability allows a remote attacker to achieve arbitrary command execution by injecting shell metacharacters into a username provided on the command line. Exploitation requires an untrusted username and a non-default configuration of the &#39;%&#39; character in `ssh_config`.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:44:27Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35386 https://bugzilla.redhat.com/show_bug.cgi?id=2454506 https://www.cve.org/CVERecord?id=CVE-2026-35386 https://nvd.nist.gov/vuln/detail/CVE-2026-35386 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35386.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YgwLp863ho/Lz7XdBK6IXw==&#34;: {&#xA;      &#34;id&#34;: &#34;YgwLp863ho/Lz7XdBK6IXw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-File-Compare&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.100.600-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YjXf6yY9feRqNoLqPt5iEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;YjXf6yY9feRqNoLqPt5iEQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YlN21JbaOAqORXBYjgJOYA==&#34;: {&#xA;      &#34;id&#34;: &#34;YlN21JbaOAqORXBYjgJOYA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35939&#34;,&#xA;      &#34;description&#34;: &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35939 https://bugzilla.redhat.com/show_bug.cgi?id=1964129 https://www.cve.org/CVERecord?id=CVE-2021-35939 https://nvd.nist.gov/vuln/detail/CVE-2021-35939 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35939.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-sign-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YmjsPDVfe7xyjGwOgJunGw==&#34;: {&#xA;      &#34;id&#34;: &#34;YmjsPDVfe7xyjGwOgJunGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4752&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, where it is vulnerable to a use-after-free in the ins_compl_get_exp function. This flaw allows a specially crafted file to crash software, use unexpected values, or possibly execute code when opened in Vim.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4752 https://bugzilla.redhat.com/show_bug.cgi?id=2237311 https://www.cve.org/CVERecord?id=CVE-2023-4752 https://nvd.nist.gov/vuln/detail/CVE-2023-4752 https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4752.json https://access.redhat.com/errata/RHSA-2025:7440&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-22.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YnyGgq68v/XTMEk0yU1qsA==&#34;: {&#xA;      &#34;id&#34;: &#34;YnyGgq68v/XTMEk0yU1qsA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YoJO5p1sMUFmCt+7OiX0ow==&#34;: {&#xA;      &#34;id&#34;: &#34;YoJO5p1sMUFmCt+7OiX0ow==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21710&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21710 https://bugzilla.redhat.com/show_bug.cgi?id=2453151 https://www.cve.org/CVERecord?id=CVE-2026-21710 https://nvd.nist.gov/vuln/detail/CVE-2026-21710 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21710.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YpjyzhR3jAhlzb479lBoJw==&#34;: {&#xA;      &#34;id&#34;: &#34;YpjyzhR3jAhlzb479lBoJw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-36137&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. The Node.js Permission Model does not operate on file descriptors. However, operations such as fs.fchown or fs.fchmod can use a \&#34;read-only\&#34; file descriptor to change the owner and permissions of a file.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-36137 https://bugzilla.redhat.com/show_bug.cgi?id=2299281 https://www.cve.org/CVERecord?id=CVE-2024-36137 https://nvd.nist.gov/vuln/detail/CVE-2024-36137 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-36137.json https://access.redhat.com/errata/RHSA-2024:5815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.16.0-1.module+el9.4.0+22197+9e60f127&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YtNpM5pykErH+UBXZABWdg==&#34;: {&#xA;      &#34;id&#34;: &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28390&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this vulnerability by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message. During the processing of a KeyTransportRecipientInfo with RSA-OAEP encryption, the system attempts to access an optional parameter field without first verifying its presence. This leads to a NULL pointer dereference, which can cause applications processing the attacker-controlled CMS data to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T22:00:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28390 https://bugzilla.redhat.com/show_bug.cgi?id=2456314 https://www.cve.org/CVERecord?id=CVE-2026-28390 https://nvd.nist.gov/vuln/detail/CVE-2026-28390 https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6 https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4 https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788 https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28390.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YusnUSJD47mdstk8KsgGZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;YusnUSJD47mdstk8KsgGZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4337&#34;,&#xA;      &#34;description&#34;: &#34;Unexpected session resumption in crypto/tls&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T17:23:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://groups.google.com/g/golang-announce/c/K09ubi9FQFk https://go.dev/cl/737700 https://go.dev/issue/77217&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.13&#34;&#xA;    },&#xA;    &#34;Ywdulqdw8k75jjL2qb8gPg==&#34;: {&#xA;      &#34;id&#34;: &#34;Ywdulqdw8k75jjL2qb8gPg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5704&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allowing an attacker to introduce malicious files onto a system without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T13:36:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5704 https://bugzilla.redhat.com/show_bug.cgi?id=2455360 https://www.cve.org/CVERecord?id=CVE-2026-5704 https://nvd.nist.gov/vuln/detail/CVE-2026-5704 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5704.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YwefEcZX3L6SA4VOQcDTlg==&#34;: {&#xA;      &#34;id&#34;: &#34;YwefEcZX3L6SA4VOQcDTlg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21711&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The Node.js Permission Model, designed to restrict network access, incorrectly omits permission checks for Unix Domain Socket (UDS) server operations. This allows local code, even when explicitly denied network access, to create and expose inter-process communication (IPC) endpoints. As a result, unauthorized communication can occur between processes on the same host, bypassing the intended network security restrictions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21711 https://bugzilla.redhat.com/show_bug.cgi?id=2453158 https://www.cve.org/CVERecord?id=CVE-2026-21711 https://nvd.nist.gov/vuln/detail/CVE-2026-21711 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21711.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Z064OaMrPYngYTdOmYFpOw==&#34;: {&#xA;      &#34;id&#34;: &#34;Z064OaMrPYngYTdOmYFpOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21717&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in V8&#39;s string hashing mechanism within Node.js. A remote attacker can exploit this vulnerability by crafting requests containing integer-like strings. These specially crafted strings cause predictable hash collisions in V8&#39;s internal string table, particularly when processed by functions like JSON.parse() on attacker-controlled input. This can significantly degrade the performance of the Node.js process, leading to a Denial of Service (DoS) condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21717 https://bugzilla.redhat.com/show_bug.cgi?id=2453162 https://www.cve.org/CVERecord?id=CVE-2026-21717 https://nvd.nist.gov/vuln/detail/CVE-2026-21717 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21717.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Z0bbSkX8e3OUKdJa86CbBw==&#34;: {&#xA;      &#34;id&#34;: &#34;Z0bbSkX8e3OUKdJa86CbBw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-4217&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in unzip.  The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-01-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-4217 https://bugzilla.redhat.com/show_bug.cgi?id=2044583 https://www.cve.org/CVERecord?id=CVE-2021-4217 https://nvd.nist.gov/vuln/detail/CVE-2021-4217 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-4217.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;unzip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Z1WcJp/m0RHVikTcp3uRKA==&#34;: {&#xA;      &#34;id&#34;: &#34;Z1WcJp/m0RHVikTcp3uRKA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Z3lzEUxuKss3/Hx3NeRKoQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Z3lzEUxuKss3/Hx3NeRKoQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-26T01:07:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27904 https://bugzilla.redhat.com/show_bug.cgi?id=2442922 https://www.cve.org/CVERecord?id=CVE-2026-27904 https://nvd.nist.gov/vuln/detail/CVE-2026-27904 https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27904.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Z5H14Z81HW+BVvKWtV5kDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Z5H14Z81HW+BVvKWtV5kDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34155&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the go/parser package of the Golang standard library. Calling any Parse functions on Go source code containing deeply nested literals can cause a panic due to stack exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34155 https://bugzilla.redhat.com/show_bug.cgi?id=2310527 https://www.cve.org/CVERecord?id=CVE-2024-34155 https://nvd.nist.gov/vuln/detail/CVE-2024-34155 https://go.dev/cl/611238 https://go.dev/issue/69138 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3105 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34155.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Z707rrfU/uxs1xujVpKMRA==&#34;: {&#xA;      &#34;id&#34;: &#34;Z707rrfU/uxs1xujVpKMRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2975&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries, which are unauthenticated as a consequence. Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be misled by removing, adding, or reordering such empty entries as these are ignored by the OpenSSL implementation. The AES-SIV algorithm allows for the authentication of multiple associated data entries and encryption. To authenticate empty data, the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with a NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL returns success for such a call instead of performing the associated data authentication operation. Thus, the empty data will not be authenticated.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2975 https://bugzilla.redhat.com/show_bug.cgi?id=2223016 https://www.cve.org/CVERecord?id=CVE-2023-2975 https://nvd.nist.gov/vuln/detail/CVE-2023-2975 https://www.openssl.org/news/secadv/20230714.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2975.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Z9vlvDewcgZxmJe4Kp3wxA==&#34;: {&#xA;      &#34;id&#34;: &#34;Z9vlvDewcgZxmJe4Kp3wxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2975&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries, which are unauthenticated as a consequence. Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be misled by removing, adding, or reordering such empty entries as these are ignored by the OpenSSL implementation. The AES-SIV algorithm allows for the authentication of multiple associated data entries and encryption. To authenticate empty data, the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with a NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL returns success for such a call instead of performing the associated data authentication operation. Thus, the empty data will not be authenticated.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2975 https://bugzilla.redhat.com/show_bug.cgi?id=2223016 https://www.cve.org/CVERecord?id=CVE-2023-2975 https://nvd.nist.gov/vuln/detail/CVE-2023-2975 https://www.openssl.org/news/secadv/20230714.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2975.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZAG3qysphRz8tGIp96ls9A==&#34;: {&#xA;      &#34;id&#34;: &#34;ZAG3qysphRz8tGIp96ls9A==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4946&#34;,&#xA;      &#34;description&#34;: &#34;Inefficient policy validation in crypto/x509&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T22:53:49Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/758061 https://go.dev/issue/78281 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.25.9&#34;&#xA;    },&#xA;    &#34;ZAKrc32qORy4LwsxMQgfrw==&#34;: {&#xA;      &#34;id&#34;: &#34;ZAKrc32qORy4LwsxMQgfrw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32559&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(&#39;spawn_sync&#39;) to run arbitrary code outside of the limits defined in a policy.json file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32559 https://bugzilla.redhat.com/show_bug.cgi?id=2230956 https://www.cve.org/CVERecord?id=CVE-2023-32559 https://nvd.nist.gov/vuln/detail/CVE-2023-32559 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32559.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.2.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZAUFPHu5UQZ+B2n+SrWIqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZAUFPHu5UQZ+B2n+SrWIqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-lib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:0.65-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZBDjl4GlHR5BEu3WvRQHHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZBDjl4GlHR5BEu3WvRQHHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZC2BsE3IgWbuyuu1cz3YMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZC2BsE3IgWbuyuu1cz3YMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-37371&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-37371 https://bugzilla.redhat.com/show_bug.cgi?id=2294676 https://www.cve.org/CVERecord?id=CVE-2024-37371 https://nvd.nist.gov/vuln/detail/CVE-2024-37371 https://web.mit.edu/kerberos/www/krb5-1.21/ https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-37371.json https://access.redhat.com/errata/RHSA-2024:6166&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZCWnPSXILcJ9aE646DCmag==&#34;: {&#xA;      &#34;id&#34;: &#34;ZCWnPSXILcJ9aE646DCmag==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27983&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27983 https://bugzilla.redhat.com/show_bug.cgi?id=2272764 https://www.cve.org/CVERecord?id=CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27983.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZELKWqL7/eOb/qnydXpFAg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZELKWqL7/eOb/qnydXpFAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55130&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55130 https://bugzilla.redhat.com/show_bug.cgi?id=2431352 https://www.cve.org/CVERecord?id=CVE-2025-55130 https://nvd.nist.gov/vuln/detail/CVE-2025-55130 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55130.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZEQbZFnaRO71DxSveNx3og==&#34;: {&#xA;      &#34;id&#34;: &#34;ZEQbZFnaRO71DxSveNx3og==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64720&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow flaw has been discovered in libpng. An out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:45:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64720 https://bugzilla.redhat.com/show_bug.cgi?id=2416904 https://www.cve.org/CVERecord?id=CVE-2025-64720 https://nvd.nist.gov/vuln/detail/CVE-2025-64720 https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643 https://github.com/pnggroup/libpng/issues/686 https://github.com/pnggroup/libpng/pull/751 https://github.com/pnggroup/libpng/security/advisories/GHSA-hfc7-ph9c-wcww https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64720.json https://access.redhat.com/errata/RHSA-2026:0238&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZMCWgxkMJ4LjF/nj5/+01g==&#34;: {&#xA;      &#34;id&#34;: &#34;ZMCWgxkMJ4LjF/nj5/+01g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32002&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32002 https://bugzilla.redhat.com/show_bug.cgi?id=2230948 https://www.cve.org/CVERecord?id=CVE-2023-32002 https://nvd.nist.gov/vuln/detail/CVE-2023-32002 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32002.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZMp4FVCkBvOUuQnhgF/KRQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZMp4FVCkBvOUuQnhgF/KRQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0938&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accept domain names that included square brackets, which isn&#39;t valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-31T17:51:35Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0938 https://bugzilla.redhat.com/show_bug.cgi?id=2343237 https://www.cve.org/CVERecord?id=CVE-2025-0938 https://nvd.nist.gov/vuln/detail/CVE-2025-0938 https://github.com/python/cpython/issues/105704 https://github.com/python/cpython/pull/129418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0938.json https://access.redhat.com/errata/RHSA-2025:6977&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZNESegZx5Vgpkv3OXwE5Cw==&#34;: {&#xA;      &#34;id&#34;: &#34;ZNESegZx5Vgpkv3OXwE5Cw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23946&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security issue occurs when feeding a crafted input to \&#34;git apply.\&#34; A path outside the working tree can be overwritten by the user running \&#34;git apply.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23946 https://bugzilla.redhat.com/show_bug.cgi?id=2168161 https://www.cve.org/CVERecord?id=CVE-2023-23946 https://nvd.nist.gov/vuln/detail/CVE-2023-23946 https://github.blog/2023-02-14-git-security-vulnerabilities-announced-3/ https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23946.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZNpRshLHRo06/00CGV605Q==&#34;: {&#xA;      &#34;id&#34;: &#34;ZNpRshLHRo06/00CGV605Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11083&#34;,&#xA;      &#34;description&#34;: &#34;A head based buffer overflow flaw has been discovered in GNU bin utilities. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-27T23:02:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11083 https://bugzilla.redhat.com/show_bug.cgi?id=2399948 https://www.cve.org/CVERecord?id=CVE-2025-11083 https://nvd.nist.gov/vuln/detail/CVE-2025-11083 https://sourceware.org/bugzilla/attachment.cgi?id=16353 https://sourceware.org/bugzilla/show_bug.cgi?id=33457 https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490 https://vuldb.com/?ctiid.326124 https://vuldb.com/?id.326124 https://vuldb.com/?submit.661277 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11083.json https://access.redhat.com/errata/RHSA-2025:23343&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.35.2-67.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZPTYG1GW4N8khhdO0sFXlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZPTYG1GW4N8khhdO0sFXlQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-39331&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Emacs. Arbitrary shell commands can be executed without prompting when an Org mode file is opened or when the Org mode is enabled, when Emacs is used as an email client, this issue can be triggered when previewing email attachments.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-39331 https://bugzilla.redhat.com/show_bug.cgi?id=2293942 https://www.cve.org/CVERecord?id=CVE-2024-39331 https://nvd.nist.gov/vuln/detail/CVE-2024-39331 https://www.openwall.com/lists/oss-security/2024/06/23/1 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-39331.json https://access.redhat.com/errata/RHSA-2024:6510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:27.2-10.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZQsszFOlqLuLyfXZGfRKxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZQsszFOlqLuLyfXZGfRKxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZUoGCxFJ/+PUPUdg60izwg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZUoGCxFJ/+PUPUdg60izwg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35939&#34;,&#xA;      &#34;description&#34;: &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35939 https://bugzilla.redhat.com/show_bug.cgi?id=1964129 https://www.cve.org/CVERecord?id=CVE-2021-35939 https://nvd.nist.gov/vuln/detail/CVE-2021-35939 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35939.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-rpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZZEVbWhAYTXw9FIX3zIAtw==&#34;: {&#xA;      &#34;id&#34;: &#34;ZZEVbWhAYTXw9FIX3zIAtw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32559&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(&#39;spawn_sync&#39;) to run arbitrary code outside of the limits defined in a policy.json file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32559 https://bugzilla.redhat.com/show_bug.cgi?id=2230956 https://www.cve.org/CVERecord?id=CVE-2023-32559 https://nvd.nist.gov/vuln/detail/CVE-2023-32559 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32559.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZZLfaN7MH3nRy8BlgA10kg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZZLfaN7MH3nRy8BlgA10kg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27534&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27534 https://bugzilla.redhat.com/show_bug.cgi?id=2179069 https://www.cve.org/CVERecord?id=CVE-2023-27534 https://nvd.nist.gov/vuln/detail/CVE-2023-27534 https://curl.se/docs/CVE-2023-27534.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27534.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZZYlhV9nOBPxmh+lN8Wzlg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZZYlhV9nOBPxmh+lN8Wzlg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27144&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the cmd/compile package in the Go standard library. A no-op interface conversion prevented the compiler from correctly identifying non-overlapping memory moves. As a result, the compiler allows unsafe memory move operations to occur at runtime, potentially causing data corruption, memory corruption or unexpected application behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27144 https://bugzilla.redhat.com/show_bug.cgi?id=2456340 https://www.cve.org/CVERecord?id=CVE-2026-27144 https://nvd.nist.gov/vuln/detail/CVE-2026-27144 https://go.dev/cl/763764 https://go.dev/issue/78371 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4867 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27144.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZZj+FChMvULXnT4QSAEvQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZZj+FChMvULXnT4QSAEvQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3970&#34;,&#xA;      &#34;description&#34;: &#34;An integer overflow flaw was found in LibTIFF. This issue exists in the TIFFReadRGBATileExt function of the libtiff/tif_getimage.c file, and may lead to a buffer overflow.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-11-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3970 https://bugzilla.redhat.com/show_bug.cgi?id=2148918 https://www.cve.org/CVERecord?id=CVE-2022-3970 https://nvd.nist.gov/vuln/detail/CVE-2022-3970 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3970.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Zc9mVAa+SgrDGA78Zo8GIg==&#34;: {&#xA;      &#34;id&#34;: &#34;Zc9mVAa+SgrDGA78Zo8GIg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22871&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/http golang package. The net/http package incorrectly accepts messages that end with a line feed (LF) instead of the proper line ending. When used with another server that also misinterprets this, it can lead to request smuggling—where an attacker tricks the system to send hidden or unauthorized requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T20:04:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22871 https://bugzilla.redhat.com/show_bug.cgi?id=2358493 https://www.cve.org/CVERecord?id=CVE-2025-22871 https://nvd.nist.gov/vuln/detail/CVE-2025-22871 https://go.dev/cl/652998 https://go.dev/issue/71988 https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk https://pkg.go.dev/vuln/GO-2025-3563 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22871.json https://access.redhat.com/errata/RHSA-2025:8476&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.9-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZeLcisCXFaeQKOi8dej/BQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZeLcisCXFaeQKOi8dej/BQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30086&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the libtiff library. This flaw causes a buffer overflow in libtiff that allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30086 https://bugzilla.redhat.com/show_bug.cgi?id=2203650 https://www.cve.org/CVERecord?id=CVE-2023-30086 https://nvd.nist.gov/vuln/detail/CVE-2023-30086 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30086.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Zg/5yy5ojZu/q0X+9MCQQA==&#34;: {&#xA;      &#34;id&#34;: &#34;Zg/5yy5ojZu/q0X+9MCQQA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4603&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use the EVP_PKEY_param_check() or EVP_PKEY_public_check() function to check a DSA public key or DSA parameters may experience long delays when checking excessively long DSA keys or parameters.  In applications that allow untrusted sources to provide the key or parameters that are checked, an attacker may be able to cause a denial of service. These functions are not called by OpenSSL on untrusted DSA keys. The applications that directly call these functions are the ones that may be vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4603 https://bugzilla.redhat.com/show_bug.cgi?id=2281029 https://www.cve.org/CVERecord?id=CVE-2024-4603 https://nvd.nist.gov/vuln/detail/CVE-2024-4603 https://www.openssl.org/news/secadv/20240516.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4603.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZhTLRTlcbZumWmiritxOAw==&#34;: {&#xA;      &#34;id&#34;: &#34;ZhTLRTlcbZumWmiritxOAw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6100&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s decompression modules, including `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile`. This vulnerability, a use-after-free, can occur if a program attempts to re-use a decompression object after a memory allocation error, especially when the system is experiencing high memory usage. Exploitation of this flaw could potentially allow an attacker to execute arbitrary code or access sensitive data. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T17:15:47Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6100 https://bugzilla.redhat.com/show_bug.cgi?id=2457932 https://www.cve.org/CVERecord?id=CVE-2026-6100 https://nvd.nist.gov/vuln/detail/CVE-2026-6100 https://github.com/python/cpython/commit/6a5f79c8d7bbf22b083b240910c7a8781a59437d https://github.com/python/cpython/commit/8fc66aef6d7b3ae58f43f5c66f9366cc8cbbfcd2 https://github.com/python/cpython/commit/c3cf71c3366fe49acb776a639405c0eea6169c20 https://github.com/python/cpython/issues/148395 https://github.com/python/cpython/pull/148396 https://mail.python.org/archives/list/security-announce@python.org/thread/HTWB2Z6KT5QQX4RYEZAFININDHNOSIF3/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6100.json https://access.redhat.com/errata/RHSA-2026:10949&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZhxWQvKqBGgL77fuUQ4Ghg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZhxWQvKqBGgL77fuUQ4Ghg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3358&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL, where it incorrectly handles legacy custom ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other similarly named encryption and decryption initialization functions). Instead of using the custom cipher directly, it incorrectly tries to fetch an equivalent cipher from the available providers. An equivalent cipher is found based on the NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a given cipher. However, it is possible for an application to incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef is used this way, the OpenSSL encryption/decryption initialization function will match the NULL cipher as equivalent and fetch this from the available providers. This is successful if the default provider has been loaded (or if a third-party provider has been loaded that offers this cipher). Using the NULL cipher means that the plaintext is emitted as the ciphertext.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3358 https://bugzilla.redhat.com/show_bug.cgi?id=2134740 https://www.cve.org/CVERecord?id=CVE-2022-3358 https://nvd.nist.gov/vuln/detail/CVE-2022-3358 https://www.openssl.org/news/secadv/20221011.txt https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3358.json https://access.redhat.com/errata/RHSA-2023:2523&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-6.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZiZuAbc4Tq3tBRSI53FjWg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZiZuAbc4Tq3tBRSI53FjWg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27613&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the gitk application that could lead to unauthorized file modification or data loss.\n\nThis flaw manifests in two primary scenarios:\n- Untrusted Repository Cloning: When a user is tricked into cloning an untrusted Git repository and then uses gitk to visualize it without any additional parameters, any writable file on the user&#39;s system can be arbitrarily created or truncated. Exploitation via this method also requires the Support per-file encoding option to be explicitly enabled in Gitk&#39;s preferences, which is not the default setting.\n- &#39;Show origin of this line&#39; Command: The vulnerability can also be triggered if a user employs the Show origin of this line command within gitk&#39;s main window while viewing a malicious repository. This method does not depend on the Support per-file encoding option being enabled.\n\nThe primary risk is unauthorized file system modification, which could lead to data integrity issues, data loss, or potentially open avenues for further system compromise.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T13:01:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27613 https://bugzilla.redhat.com/show_bug.cgi?id=2379124 https://www.cve.org/CVERecord?id=CVE-2025-27613 https://nvd.nist.gov/vuln/detail/CVE-2025-27613 https://github.com/j6t/gitk/security/advisories/GHSA-f3cw-xrj3-wr2v https://lore.kernel.org/git/xmqq5xg2wrd1.fsf@gitster.g/ https://www.openwall.com/lists/oss-security/2025/07/08/4 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27613.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Zk3m2J10w4VuwKsJJMXB2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Zk3m2J10w4VuwKsJJMXB2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0727&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The optional ContentInfo fields can be set to null, even if the \&#34;type\&#34; is a valid value, which can lead to a null dereference error that may cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0727 https://bugzilla.redhat.com/show_bug.cgi?id=2259944 https://www.cve.org/CVERecord?id=CVE-2024-0727 https://nvd.nist.gov/vuln/detail/CVE-2024-0727 https://github.com/openssl/openssl/pull/23362 https://www.openssl.org/news/secadv/20240125.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0727.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZmOheSIAULld8cF9POTj/w==&#34;: {&#xA;      &#34;id&#34;: &#34;ZmOheSIAULld8cF9POTj/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35937&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35937 https://bugzilla.redhat.com/show_bug.cgi?id=1964125 https://www.cve.org/CVERecord?id=CVE-2021-35937 https://nvd.nist.gov/vuln/detail/CVE-2021-35937 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35937.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-rpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Zn86UzCNWJIJ8FVaY91JYg==&#34;: {&#xA;      &#34;id&#34;: &#34;Zn86UzCNWJIJ8FVaY91JYg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5535&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the &#39;no overlap&#39; response in ALPN or uses the output as the opportunistic protocol in NPN.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-5535 https://bugzilla.redhat.com/show_bug.cgi?id=2294581 https://www.cve.org/CVERecord?id=CVE-2024-5535 https://nvd.nist.gov/vuln/detail/CVE-2024-5535 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-5535.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZoK4/bCJQ036BMFIy2mG8g==&#34;: {&#xA;      &#34;id&#34;: &#34;ZoK4/bCJQ036BMFIy2mG8g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25629&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25629 https://bugzilla.redhat.com/show_bug.cgi?id=2265713 https://www.cve.org/CVERecord?id=CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629 https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25629.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZpoRIduwcda+XFGXyoaDAA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZpoRIduwcda+XFGXyoaDAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZrKcftBnwBVZKQlRJoJcLw==&#34;: {&#xA;      &#34;id&#34;: &#34;ZrKcftBnwBVZKQlRJoJcLw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28484&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference vulnerability was found in libxml2. This issue occurs when parsing (invalid) XML schemas.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28484 https://bugzilla.redhat.com/show_bug.cgi?id=2185994 https://www.cve.org/CVERecord?id=CVE-2023-28484 https://nvd.nist.gov/vuln/detail/CVE-2023-28484 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28484.json https://access.redhat.com/errata/RHSA-2023:4349&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-3.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZtlPcxFiuXhGia0ZM6cNBg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZtlPcxFiuXhGia0ZM6cNBg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-53905&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T20:48:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-53905 https://bugzilla.redhat.com/show_bug.cgi?id=2380362 https://www.cve.org/CVERecord?id=CVE-2025-53905 https://nvd.nist.gov/vuln/detail/CVE-2025-53905 https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239 https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-53905.json https://access.redhat.com/errata/RHSA-2025:20945&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Zv+LSqi94387CYLrb5PiCw==&#34;: {&#xA;      &#34;id&#34;: &#34;Zv+LSqi94387CYLrb5PiCw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29405&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. The go command may execute arbitrary code at build time when using cgo. This can occur when running \&#34;go get\&#34; on a malicious module, or when running any other command which builds untrusted code. This can be triggered by linker flags, specified via a \&#34;#cgo LDFLAGS\&#34; directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29405 https://bugzilla.redhat.com/show_bug.cgi?id=2217569 https://www.cve.org/CVERecord?id=CVE-2023-29405 https://nvd.nist.gov/vuln/detail/CVE-2023-29405 https://go.dev/cl/501224 https://go.dev/issue/60306 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1842 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29405.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Zwyz7XImU98ApFQj0FPRmw==&#34;: {&#xA;      &#34;id&#34;: &#34;Zwyz7XImU98ApFQj0FPRmw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4869&#34;,&#xA;      &#34;description&#34;: &#34;Unbounded allocation for old GNU sparse in archive/tar&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T22:53:49Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/763766 https://go.dev/issue/78301 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.25.9&#34;&#xA;    },&#xA;    &#34;Zx7E5aKvS5JXoyQSS0VOKg==&#34;: {&#xA;      &#34;id&#34;: &#34;Zx7E5aKvS5JXoyQSS0VOKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59375&#34;,&#xA;      &#34;description&#34;: &#34;A memory amplification vulnerability in libexpat allows attackers to trigger excessive dynamic memory allocations by submitting specially crafted XML input. A small input (~250 KiB) can cause the parser to allocate hundreds of megabytes, leading to denial-of-service (DoS) through memory exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59375 https://bugzilla.redhat.com/show_bug.cgi?id=2395108 https://www.cve.org/CVERecord?id=CVE-2025-59375 https://nvd.nist.gov/vuln/detail/CVE-2025-59375 https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2025-59375 https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2025-59375 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59375.json https://access.redhat.com/errata/RHSA-2025:22175&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-5.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZxcJWoacxiKADUWqPITGyA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZxcJWoacxiKADUWqPITGyA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55130&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55130 https://bugzilla.redhat.com/show_bug.cgi?id=2431352 https://www.cve.org/CVERecord?id=CVE-2025-55130 https://nvd.nist.gov/vuln/detail/CVE-2025-55130 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55130.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ZyINijq7IMSOcH4xz5eNoQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZyINijq7IMSOcH4xz5eNoQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1299&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the email module in the Python standard library. When serializing an email message, the BytesGenerator class fails to properly quote newline characters for email headers. This issue is exploitable when the LiteralHeader class is used as it does not respect email folding rules, allowing an attacker to inject email headers and potentially modify message recipients or the email body, and spoof sender information.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-23T16:27:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1299 https://bugzilla.redhat.com/show_bug.cgi?id=2432437 https://www.cve.org/CVERecord?id=CVE-2026-1299 https://nvd.nist.gov/vuln/detail/CVE-2026-1299 https://cve.org/CVERecord?id=CVE-2024-6923 https://github.com/python/cpython/commit/052e55e7d44718fe46cbba0ca995cb8fcc359413 https://github.com/python/cpython/issues/144125 https://github.com/python/cpython/pull/144126 https://mail.python.org/archives/list/security-announce@python.org/thread/6ZZULGALJTITEAGEXLDJE2C6FORDXPBT/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1299.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;a+77t9fGz9BxOnJlGe2W1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;a+77t9fGz9BxOnJlGe2W1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29187&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw occurs due to Git not checking the ownership of directories in a local multi-user system when running commands specified in the local repository configuration. This issue allows the owner of the repository to cause arbitrary commands to be executed by other users who access the repository.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-29187 https://bugzilla.redhat.com/show_bug.cgi?id=2107439 https://www.cve.org/CVERecord?id=CVE-2022-29187 https://nvd.nist.gov/vuln/detail/CVE-2022-29187 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-29187.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;a/YI2nxM2FSL9LuqLWCJ1A==&#34;: {&#xA;      &#34;id&#34;: &#34;a/YI2nxM2FSL9LuqLWCJ1A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8176&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-13T13:51:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-8176 https://bugzilla.redhat.com/show_bug.cgi?id=2310137 https://www.cve.org/CVERecord?id=CVE-2024-8176 https://nvd.nist.gov/vuln/detail/CVE-2024-8176 https://github.com/libexpat/libexpat/issues/893 https://github.com/libexpat/libexpat/pull/973 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8176.json https://access.redhat.com/errata/RHSA-2025:3531&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-3.el9_5.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;a5tv38r7RoeoKCznzGbyPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;a5tv38r7RoeoKCznzGbyPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6345&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the package_index module of pypa/setuptools. Affected versions of this package allow remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6345 https://bugzilla.redhat.com/show_bug.cgi?id=2297771 https://www.cve.org/CVERecord?id=CVE-2024-6345 https://nvd.nist.gov/vuln/detail/CVE-2024-6345 https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0 https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6345.json https://access.redhat.com/errata/RHSA-2024:5534&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:53.0.0-12.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;a5xKL7Qrgq3D0d3zE8x4RQ==&#34;: {&#xA;      &#34;id&#34;: &#34;a5xKL7Qrgq3D0d3zE8x4RQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8291&#34;,&#xA;      &#34;description&#34;: &#34;A zip file handling flaw has been discovered in the python standard library `zipfile` module. The &#39;zipfile&#39; module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the &#39;zipfile&#39; module compared to other ZIP implementations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-07T18:10:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8291 https://bugzilla.redhat.com/show_bug.cgi?id=2402342 https://www.cve.org/CVERecord?id=CVE-2025-8291 https://nvd.nist.gov/vuln/detail/CVE-2025-8291 https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267 https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6 https://github.com/python/cpython/issues/139700 https://github.com/python/cpython/pull/139702 https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8291.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;a7PsXEXsbw8aTCMWFxM9mg==&#34;: {&#xA;      &#34;id&#34;: &#34;a7PsXEXsbw8aTCMWFxM9mg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4138&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python tarfile module. This vulnerability allows attackers to bypass extraction filters, enabling symlink targets to escape the destination directory and allowing unauthorized modification of file metadata via the use of TarFile.extract() or TarFile.extractall() with the filter= parameter set to \&#34;data\&#34; or \&#34;tar\&#34;.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4138 https://bugzilla.redhat.com/show_bug.cgi?id=2372426 https://www.cve.org/CVERecord?id=CVE-2025-4138 https://nvd.nist.gov/vuln/detail/CVE-2025-4138 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4138.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;a7WPDd2/UqA1rqbo6pjM9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;a7WPDd2/UqA1rqbo6pjM9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27535&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. Libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, several FTP settings were left out from the configuration match checks, making them match too easily. The problematic settings are `CURLOPT_FTP_ACCOUNT`, `CURLOPT_FTP_ALTERNATIVE_TO_USER`, `CURLOPT_FTP_SSL_CCC` and `CURLOPT_USE_SSL` level.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27535 https://bugzilla.redhat.com/show_bug.cgi?id=2179073 https://www.cve.org/CVERecord?id=CVE-2023-27535 https://nvd.nist.gov/vuln/detail/CVE-2023-27535 https://curl.se/docs/CVE-2023-27535.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27535.json https://access.redhat.com/errata/RHSA-2023:2650&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;a8lEoliaJpwjl9bCwQSdLA==&#34;: {&#xA;      &#34;id&#34;: &#34;a8lEoliaJpwjl9bCwQSdLA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3857&#34;,&#xA;      &#34;description&#34;: &#34;[REJECTED CVE] A issue has been identified with libpng in png_setup_paeth_row() function. A crafted PNG image from a n attacker can lead to a segmentation fault and Denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-11-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3857 https://bugzilla.redhat.com/show_bug.cgi?id=2142600 https://www.cve.org/CVERecord?id=CVE-2022-3857 https://nvd.nist.gov/vuln/detail/CVE-2022-3857 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3857.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;: {&#xA;      &#34;id&#34;: &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-11053&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-11053 https://bugzilla.redhat.com/show_bug.cgi?id=2331191 https://www.cve.org/CVERecord?id=CVE-2024-11053 https://nvd.nist.gov/vuln/detail/CVE-2024-11053 https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11053.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aF8KHEW+yeGrdIo+G60sLA==&#34;: {&#xA;      &#34;id&#34;: &#34;aF8KHEW+yeGrdIo+G60sLA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59466&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in Node.js error handling where \&#34;Maximum call stack size exceeded\&#34; errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(&#39;uncaughtException&#39;)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59466 https://bugzilla.redhat.com/show_bug.cgi?id=2431343 https://www.cve.org/CVERecord?id=CVE-2025-59466 https://nvd.nist.gov/vuln/detail/CVE-2025-59466 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59466.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;aGi0xIYQeGr5qYFMFsAN2w==&#34;: {&#xA;      &#34;id&#34;: &#34;aGi0xIYQeGr5qYFMFsAN2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61728&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61728 https://bugzilla.redhat.com/show_bug.cgi?id=2434431 https://www.cve.org/CVERecord?id=CVE-2025-61728 https://nvd.nist.gov/vuln/detail/CVE-2025-61728 https://go.dev/cl/736713 https://go.dev/issue/77102 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4342 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61728.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;aHbxsEzv/m7Yq5sqD6BR6A==&#34;: {&#xA;      &#34;id&#34;: &#34;aHbxsEzv/m7Yq5sqD6BR6A==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4947&#34;,&#xA;      &#34;description&#34;: &#34;Unexpected work during chain building in crypto/x509&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T22:53:49Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/758320 https://go.dev/issue/78282 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.25.9&#34;&#xA;    },&#xA;    &#34;aJcuD8I2FFtYOQG27x05WQ==&#34;: {&#xA;      &#34;id&#34;: &#34;aJcuD8I2FFtYOQG27x05WQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-24855&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxslt numbers.c. This vulnerability allows a use-after-free, potentially leading to memory corruption or code execution via nested XPath evaluations where an XPath context node can be modified but not restored.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-24855 https://bugzilla.redhat.com/show_bug.cgi?id=2352483 https://www.cve.org/CVERecord?id=CVE-2025-24855 https://nvd.nist.gov/vuln/detail/CVE-2025-24855 https://gitlab.gnome.org/GNOME/libxslt/-/issues/128 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-24855.json https://access.redhat.com/errata/RHSA-2025:3107&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxslt-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.1.34-9.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;: {&#xA;      &#34;id&#34;: &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34743&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in XZ Utils. When the `lzma_index_decoder()` function processes an empty index, and a subsequent `lzma_index_append()` operation is performed, insufficient memory is allocated. This can lead to a buffer overflow, potentially causing a denial of service (DoS) for affected systems.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T18:36:37Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34743 https://bugzilla.redhat.com/show_bug.cgi?id=2454589 https://www.cve.org/CVERecord?id=CVE-2026-34743 https://nvd.nist.gov/vuln/detail/CVE-2026-34743 https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87 https://github.com/tukaani-project/xz/releases/tag/v5.8.3 https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34743.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aQ/ax84rpyWNveVTm/MQww==&#34;: {&#xA;      &#34;id&#34;: &#34;aQ/ax84rpyWNveVTm/MQww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;aQGx6Am8fU9TZmcyiMNL4A==&#34;: {&#xA;      &#34;id&#34;: &#34;aQGx6Am8fU9TZmcyiMNL4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-43802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. This issue may allow a heap-buffer overflow via improper management of the typeahead buffer, leading to crashes when error messages occur in combination with several long mappings.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-26T19:15:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-43802 https://bugzilla.redhat.com/show_bug.cgi?id=2307995 https://www.cve.org/CVERecord?id=CVE-2024-43802 https://nvd.nist.gov/vuln/detail/CVE-2024-43802 https://github.com/vim/vim/commit/322ba9108612bead5eb https://github.com/vim/vim/security/advisories/GHSA-4ghr-c62x-cqfh https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-43802.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aR+DKIj7GETMsDtNSfYXNA==&#34;: {&#xA;      &#34;id&#34;: &#34;aR+DKIj7GETMsDtNSfYXNA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-35252&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability found in curl. This security flaw happens when curl is used to retrieve and parse cookies from an HTTP(S) server, where it accepts cookies using control codes (byte values below 32), and also when cookies that contain such control codes are later sent back to an HTTP(S) server, possibly causing the server to return a 400 response. This issue effectively allows a \&#34;sister site\&#34; to deny service to siblings and cause a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-35252 https://bugzilla.redhat.com/show_bug.cgi?id=2120718 https://www.cve.org/CVERecord?id=CVE-2022-35252 https://nvd.nist.gov/vuln/detail/CVE-2022-35252 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-35252.json https://access.redhat.com/errata/RHSA-2023:2478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;aUFq3vh1h0/30jIMgLEGbg==&#34;: {&#xA;      &#34;id&#34;: &#34;aUFq3vh1h0/30jIMgLEGbg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3599&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds read flaw was found in the writeSingleSection function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-02-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3599 https://bugzilla.redhat.com/show_bug.cgi?id=2142740 https://www.cve.org/CVERecord?id=CVE-2022-3599 https://nvd.nist.gov/vuln/detail/CVE-2022-3599 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3599.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ab/GKLlj0s6Lkn9DyDnUUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ab/GKLlj0s6Lkn9DyDnUUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68119&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang&#39;s cmd/go module. This vulnerability allows a local attacker to achieve local code execution by downloading and building modules with specially crafted malicious version strings. On systems with Mercurial (hg) installed, this can occur when downloading modules from non-standard sources due to how external Version Control System (VCS) commands are constructed. Additionally, on systems with Git installed, providing malicious version strings to the toolchain can enable an attacker to write to arbitrary files on the filesystem. This issue is triggered by explicitly supplying these malicious version strings.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68119 https://bugzilla.redhat.com/show_bug.cgi?id=2434438 https://www.cve.org/CVERecord?id=CVE-2025-68119 https://nvd.nist.gov/vuln/detail/CVE-2025-68119 https://go.dev/cl/736710 https://go.dev/issue/77099 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4338 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68119.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;abYhvv2PIAbu240JiMWauA==&#34;: {&#xA;      &#34;id&#34;: &#34;abYhvv2PIAbu240JiMWauA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61145&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw via segmentation fault has been found in libtiff. This segmentation fault vulnerability is caused by accessing invalid or corrupted memory addresses during memory deallocation operations. The root issue lies in the cleanup logic of the main function where the program attempts to free memory that has been corrupted or points to an invalid memory region.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61145 https://bugzilla.redhat.com/show_bug.cgi?id=2441975 https://www.cve.org/CVERecord?id=CVE-2025-61145 https://nvd.nist.gov/vuln/detail/CVE-2025-61145 https://gist.github.com/optionGo/062f109569196dbffd8ac12020b42289 https://gitlab.com/libtiff/libtiff/-/issues/736 https://gitlab.com/libtiff/libtiff/-/merge_requests/753 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61145.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ac4lX1PsJ8EE0cPV3DeA7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;ac4lX1PsJ8EE0cPV3DeA7Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29491&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in ncurses and occurs when used by a setuid application. This flaw allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29491 https://bugzilla.redhat.com/show_bug.cgi?id=2191704 https://www.cve.org/CVERecord?id=CVE-2023-29491 https://nvd.nist.gov/vuln/detail/CVE-2023-29491 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29491.json https://access.redhat.com/errata/RHSA-2023:6698&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:6.2-10.20210508.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ae3lHA7MmabWs4AIbhandQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ae3lHA7MmabWs4AIbhandQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3833&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in gnutls. This vulnerability occurs because gnutls performs case-sensitive comparisons of `nameConstraints` labels, specifically for `dNSName` (DNS) or `rfc822Name` (email) constraints within `excludedSubtrees` or `permittedSubtrees`. A remote attacker can exploit this by crafting a leaf certificate with casing differences in the Subject Alternative Name (SAN), leading to a policy bypass where a certificate that should be rejected is instead accepted. This could result in unauthorized access or information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-30T17:26:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3833 https://bugzilla.redhat.com/show_bug.cgi?id=2445763 https://www.cve.org/CVERecord?id=CVE-2026-3833 https://nvd.nist.gov/vuln/detail/CVE-2026-3833 https://gitlab.com/gnutls/gnutls/-/issues/1803 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3833.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ah5gJjq6ntKGHe05l2QLEA==&#34;: {&#xA;      &#34;id&#34;: &#34;ah5gJjq6ntKGHe05l2QLEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11414&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted object file with the ld linker can trigger an out-of-bounds read in the get_link_hash_entry function in the bfd/elflink.c file due to an improper check, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-07T22:32:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11414 https://bugzilla.redhat.com/show_bug.cgi?id=2402424 https://www.cve.org/CVERecord?id=CVE-2025-11414 https://nvd.nist.gov/vuln/detail/CVE-2025-11414 https://sourceware.org/bugzilla/show_bug.cgi?id=33450 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703 https://vuldb.com/?id.327350 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11414.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ajN2ub+i7la5x0tiLPy3pQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ajN2ub+i7la5x0tiLPy3pQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61732&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s &#39;cgo tool&#39;. This vulnerability arises from a discrepancy in how Go and C/C++ comments are parsed, which allows for malicious code to be hidden within comments and then \&#34;smuggled\&#34; into the compiled `cgo` binary. An attacker could exploit this to embed and execute arbitrary code, potentially leading to significant system compromise.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T03:42:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61732 https://bugzilla.redhat.com/show_bug.cgi?id=2437016 https://www.cve.org/CVERecord?id=CVE-2025-61732 https://nvd.nist.gov/vuln/detail/CVE-2025-61732 https://go.dev/cl/734220 https://go.dev/issue/76697 https://groups.google.com/g/golang-announce/c/K09ubi9FQFk https://pkg.go.dev/vuln/GO-2026-4433 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61732.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;akEF6NF80R9wfgwbXmOEDA==&#34;: {&#xA;      &#34;id&#34;: &#34;akEF6NF80R9wfgwbXmOEDA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0466&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The X509_VERIFY_PARAM_add0_policy() function is documented to enable the certificate policy check when doing certificate verification implicitly. However, implementing the function does not enable the check, allowing certificates with invalid or incorrect policies to pass the certificate verification. Suddenly enabling the policy check could break existing deployments, so it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. The applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0466 https://bugzilla.redhat.com/show_bug.cgi?id=2182565 https://www.cve.org/CVERecord?id=CVE-2023-0466 https://nvd.nist.gov/vuln/detail/CVE-2023-0466 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0466.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;akJLZ6dhkrnudAb8gXyuyw==&#34;: {&#xA;      &#34;id&#34;: &#34;akJLZ6dhkrnudAb8gXyuyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59466&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in Node.js error handling where \&#34;Maximum call stack size exceeded\&#34; errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(&#39;uncaughtException&#39;)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59466 https://bugzilla.redhat.com/show_bug.cgi?id=2431343 https://www.cve.org/CVERecord?id=CVE-2025-59466 https://nvd.nist.gov/vuln/detail/CVE-2025-59466 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59466.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;alSeOMnzCu4eh8h4VjVrpA==&#34;: {&#xA;      &#34;id&#34;: &#34;alSeOMnzCu4eh8h4VjVrpA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;am8Nu2Xz4xTgOxf+V74bZg==&#34;: {&#xA;      &#34;id&#34;: &#34;am8Nu2Xz4xTgOxf+V74bZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32002&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32002 https://bugzilla.redhat.com/show_bug.cgi?id=2230948 https://www.cve.org/CVERecord?id=CVE-2023-32002 https://nvd.nist.gov/vuln/detail/CVE-2023-32002 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32002.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.17.1-1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;anPJmbS134IB2gfGIWKJ0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;anPJmbS134IB2gfGIWKJ0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici package for Node.js. Undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If an app has a mechanism that sends multipart requests to an attacker-controlled website, it can leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T17:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22150 https://bugzilla.redhat.com/show_bug.cgi?id=2339176 https://www.cve.org/CVERecord?id=CVE-2025-22150 https://nvd.nist.gov/vuln/detail/CVE-2025-22150 https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113 https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0 https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385 https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975 https://hackerone.com/reports/2913312 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22150.json https://access.redhat.com/errata/RHSA-2025:1443&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.18.2-1.module+el9.5.0+22758+4ad2c198&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;aqaaxa85Ibw3RSMRWLL7yg==&#34;: {&#xA;      &#34;id&#34;: &#34;aqaaxa85Ibw3RSMRWLL7yg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6129&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in in the POLY1305 MAC (message authentication code) implementation in OpenSSL, affecting applications running on PowerPC CPU-based platforms that utilize vector instructions, and has the potential to corrupt the internal state of these applications. If an attacker can manipulate the utilization of the POLY1305 MAC algorithm, it may lead to the corruption of the application state, resulting in various application-dependent consequences, often resulting in a crash and leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6129 https://bugzilla.redhat.com/show_bug.cgi?id=2257571 https://www.cve.org/CVERecord?id=CVE-2023-6129 https://nvd.nist.gov/vuln/detail/CVE-2023-6129 https://www.openssl.org/news/secadv/20240109.txt https://www.openwall.com/lists/oss-security/2024/01/09/1 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6129.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;aqmerajri2owkCLHieW70w==&#34;: {&#xA;      &#34;id&#34;: &#34;aqmerajri2owkCLHieW70w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8194&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python tarfile module. Processing a specially crafted tar archive, specifically an archive with negative offsets, can cause an infinite loop and deadlock. This issue results in a denial of service in the Python application using the tarfile module.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-28T18:42:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8194 https://bugzilla.redhat.com/show_bug.cgi?id=2384043 https://www.cve.org/CVERecord?id=CVE-2025-8194 https://nvd.nist.gov/vuln/detail/CVE-2025-8194 https://github.com/python/cpython/issues/130577 https://github.com/python/cpython/pull/137027 https://mail.python.org/archives/list/security-announce@python.org/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8194.json https://access.redhat.com/errata/RHSA-2025:15019&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;atAnLiOuVhy8qyEUVNzM2w==&#34;: {&#xA;      &#34;id&#34;: &#34;atAnLiOuVhy8qyEUVNzM2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48338&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Emacs package. A malicious ruby source file may cause a local command injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-48338 https://bugzilla.redhat.com/show_bug.cgi?id=2171988 https://www.cve.org/CVERecord?id=CVE-2022-48338 https://nvd.nist.gov/vuln/detail/CVE-2022-48338 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-48338.json https://access.redhat.com/errata/RHSA-2023:2626&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:27.2-8.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;b+WKHvVRvScXQjTpsI/dQA==&#34;: {&#xA;      &#34;id&#34;: &#34;b+WKHvVRvScXQjTpsI/dQA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6176&#34;,&#xA;      &#34;description&#34;: &#34;Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-31T00:00:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6176 https://bugzilla.redhat.com/show_bug.cgi?id=2408762 https://www.cve.org/CVERecord?id=CVE-2025-6176 https://nvd.nist.gov/vuln/detail/CVE-2025-6176 https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6176.json https://access.redhat.com/errata/RHSA-2026:2042&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libbrotli&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.0.9-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;b/JoMKSdjTg9hoFgyAsYGg==&#34;: {&#xA;      &#34;id&#34;: &#34;b/JoMKSdjTg9hoFgyAsYGg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34158&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the go/build/constraint package of the Golang standard library. Calling Parse on a \&#34;// +build\&#34; build tag line with deeply nested expressions can cause a panic due to stack exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34158 https://bugzilla.redhat.com/show_bug.cgi?id=2310529 https://www.cve.org/CVERecord?id=CVE-2024-34158 https://nvd.nist.gov/vuln/detail/CVE-2024-34158 https://go.dev/cl/611240 https://go.dev/issue/69141 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3107 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34158.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;b2xf65/2S45gOxG8Grxy0g==&#34;: {&#xA;      &#34;id&#34;: &#34;b2xf65/2S45gOxG8Grxy0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5441&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference vulnerability was found in Vim. This flaw allows an attacker who can trick a user into processing a specially crafted file to trigger the NULL pointer dereference, causing the application to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5441 https://bugzilla.redhat.com/show_bug.cgi?id=2242926 https://www.cve.org/CVERecord?id=CVE-2023-5441 https://nvd.nist.gov/vuln/detail/CVE-2023-5441 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5441.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;b3gcqhWrOMtSFjkTMyyWQw==&#34;: {&#xA;      &#34;id&#34;: &#34;b3gcqhWrOMtSFjkTMyyWQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32067&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32067 https://bugzilla.redhat.com/show_bug.cgi?id=2209502 https://www.cve.org/CVERecord?id=CVE-2023-32067 https://nvd.nist.gov/vuln/detail/CVE-2023-32067 https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32067.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;b7Ve+kRpf1f/Y0XXi0L2vA==&#34;: {&#xA;      &#34;id&#34;: &#34;b7Ve+kRpf1f/Y0XXi0L2vA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;b8ZUCmMy8tFNcjKWAPWexQ==&#34;: {&#xA;      &#34;id&#34;: &#34;b8ZUCmMy8tFNcjKWAPWexQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21713&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The HMAC (Hash-based Message Authentication Code) verification process uses a comparison method that does not take a constant amount of time. This non-constant-time comparison can leak timing information, which, under specific conditions where precise timing measurements are possible, could be exploited by a remote attacker. This allows the attacker to infer sensitive HMAC values, leading to information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21713 https://bugzilla.redhat.com/show_bug.cgi?id=2453160 https://www.cve.org/CVERecord?id=CVE-2026-21713 https://nvd.nist.gov/vuln/detail/CVE-2026-21713 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21713.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;b8cX6Z3ptet250uYs1XjIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;b8cX6Z3ptet250uYs1XjIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39322&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39322 https://bugzilla.redhat.com/show_bug.cgi?id=2237778 https://www.cve.org/CVERecord?id=CVE-2023-39322 https://nvd.nist.gov/vuln/detail/CVE-2023-39322 https://go.dev/cl/523039 https://go.dev/issue/62266 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2045.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39322.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;b9Kb4WNexa+E+t+B4ZpfRA==&#34;: {&#xA;      &#34;id&#34;: &#34;b9Kb4WNexa+E+t+B4ZpfRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-49794&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\&#34;...\&#34;/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program&#39;s crash using libxml or other possible undefined behaviors.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-49794 https://bugzilla.redhat.com/show_bug.cgi?id=2372373 https://www.cve.org/CVERecord?id=CVE-2025-49794 https://nvd.nist.gov/vuln/detail/CVE-2025-49794 https://gitlab.gnome.org/GNOME/libxml2/-/issues/931 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-49794.json https://access.redhat.com/errata/RHSA-2025:10699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;b9vpp7YMXEAHYnt8gPj4PA==&#34;: {&#xA;      &#34;id&#34;: &#34;b9vpp7YMXEAHYnt8gPj4PA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bACUKZThWu3kcO82NfO4eg==&#34;: {&#xA;      &#34;id&#34;: &#34;bACUKZThWu3kcO82NfO4eg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1264&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference vulnerability was discovered in vim&#39;s utfc_ptr2len() function in the mbyte.c file. This issue is due to using a NULL pointer with the nested :open command. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an issue that causes an application to crash, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1264 https://bugzilla.redhat.com/show_bug.cgi?id=2176413 https://www.cve.org/CVERecord?id=CVE-2023-1264 https://nvd.nist.gov/vuln/detail/CVE-2023-1264 https://huntr.dev/bounties/b2989095-88f3-413a-9a39-c1c58a6e6815 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1264.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bDMsFO9+dr7IgrwHxKJ/2g==&#34;: {&#xA;      &#34;id&#34;: &#34;bDMsFO9+dr7IgrwHxKJ/2g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bDhy7gfmPOwxr6lS2HOcFg==&#34;: {&#xA;      &#34;id&#34;: &#34;bDhy7gfmPOwxr6lS2HOcFg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-49796&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-49796 https://bugzilla.redhat.com/show_bug.cgi?id=2372385 https://www.cve.org/CVERecord?id=CVE-2025-49796 https://nvd.nist.gov/vuln/detail/CVE-2025-49796 https://gitlab.gnome.org/GNOME/libxml2/-/issues/933 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-49796.json https://access.redhat.com/errata/RHSA-2025:10699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bDvGK7B1/5BJREOCtiSQyw==&#34;: {&#xA;      &#34;id&#34;: &#34;bDvGK7B1/5BJREOCtiSQyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-37371&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-37371 https://bugzilla.redhat.com/show_bug.cgi?id=2294676 https://www.cve.org/CVERecord?id=CVE-2024-37371 https://nvd.nist.gov/vuln/detail/CVE-2024-37371 https://web.mit.edu/kerberos/www/krb5-1.21/ https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-37371.json https://access.redhat.com/errata/RHSA-2024:6166&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bELtRRWF07YgwEcu9KD6Jg==&#34;: {&#xA;      &#34;id&#34;: &#34;bELtRRWF07YgwEcu9KD6Jg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1526&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \&#34;decompression bomb,\&#34; during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:08:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1526 https://bugzilla.redhat.com/show_bug.cgi?id=2447142 https://www.cve.org/CVERecord?id=CVE-2026-1526 https://nvd.nist.gov/vuln/detail/CVE-2026-1526 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q https://hackerone.com/reports/3481206 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1526.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bJGGlc8FG/c2T93ktUh6Ig==&#34;: {&#xA;      &#34;id&#34;: &#34;bJGGlc8FG/c2T93ktUh6Ig==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in urllib3 Python library that could lead to a Denial of Service condition. A remote, malicious server can exploit this flaw by responding to a client request with an HTTP message that uses an excessive number of chained compression algorithms. This unlimited decompression chain causes the client system to consume a virtually unbounded amount of CPU resources and memory. The high resource usage leads to service disruption, making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T16:02:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66418 https://bugzilla.redhat.com/show_bug.cgi?id=2419455 https://www.cve.org/CVERecord?id=CVE-2025-66418 https://nvd.nist.gov/vuln/detail/CVE-2025-66418 https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8 https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66418.json https://access.redhat.com/errata/RHSA-2026:1087&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-urllib3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.26.5-6.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bKE3ov27WR5dMz8a/M+jUA==&#34;: {&#xA;      &#34;id&#34;: &#34;bKE3ov27WR5dMz8a/M+jUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bN/37R0s8WD9IOTdf9jzwA==&#34;: {&#xA;      &#34;id&#34;: &#34;bN/37R0s8WD9IOTdf9jzwA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;: {&#xA;      &#34;id&#34;: &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libuuid&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bOMmd0jIpY2e7Cl4owS24g==&#34;: {&#xA;      &#34;id&#34;: &#34;bOMmd0jIpY2e7Cl4owS24g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4517&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the CPython tarfile module. This vulnerability allows arbitrary filesystem writes outside the extraction directory via extracting untrusted tar archives using the TarFile.extractall() or TarFile.extract() methods with the extraction filter parameter set to \&#34;data\&#34; or \&#34;tar\&#34;.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:58:50Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4517 https://bugzilla.redhat.com/show_bug.cgi?id=2370016 https://www.cve.org/CVERecord?id=CVE-2025-4517 https://nvd.nist.gov/vuln/detail/CVE-2025-4517 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4517.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bQ1N5xPGM/wU59iAjdfQ6A==&#34;: {&#xA;      &#34;id&#34;: &#34;bQ1N5xPGM/wU59iAjdfQ6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bS+af0/VFTa2vHJUfxeH5g==&#34;: {&#xA;      &#34;id&#34;: &#34;bS+af0/VFTa2vHJUfxeH5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61732&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s &#39;cgo tool&#39;. This vulnerability arises from a discrepancy in how Go and C/C++ comments are parsed, which allows for malicious code to be hidden within comments and then \&#34;smuggled\&#34; into the compiled `cgo` binary. An attacker could exploit this to embed and execute arbitrary code, potentially leading to significant system compromise.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T03:42:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61732 https://bugzilla.redhat.com/show_bug.cgi?id=2437016 https://www.cve.org/CVERecord?id=CVE-2025-61732 https://nvd.nist.gov/vuln/detail/CVE-2025-61732 https://go.dev/cl/734220 https://go.dev/issue/76697 https://groups.google.com/g/golang-announce/c/K09ubi9FQFk https://pkg.go.dev/vuln/GO-2026-4433 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61732.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bUleeXyDhPPtw2/S2E8kiw==&#34;: {&#xA;      &#34;id&#34;: &#34;bUleeXyDhPPtw2/S2E8kiw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T17:48:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68121 https://bugzilla.redhat.com/show_bug.cgi?id=2437111 https://www.cve.org/CVERecord?id=CVE-2025-68121 https://nvd.nist.gov/vuln/detail/CVE-2025-68121 https://go.dev/cl/737700 https://go.dev/issue/77217 https://groups.google.com/g/golang-announce/c/K09ubi9FQFk https://pkg.go.dev/vuln/GO-2026-4337 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68121.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bVLJeNp3UltT+T1xu6C55A==&#34;: {&#xA;      &#34;id&#34;: &#34;bVLJeNp3UltT+T1xu6C55A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bZGx+ktPNqzyr9hXBoIOTA==&#34;: {&#xA;      &#34;id&#34;: &#34;bZGx+ktPNqzyr9hXBoIOTA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bb9X6domCAmA+m40PgE/jg==&#34;: {&#xA;      &#34;id&#34;: &#34;bb9X6domCAmA+m40PgE/jg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21896&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a buffer, the implementation uses Buffer.from() to obtain a buffer from the result of path.resolve(). By monkey-patching buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21896 https://bugzilla.redhat.com/show_bug.cgi?id=2265717 https://www.cve.org/CVERecord?id=CVE-2024-21896 https://nvd.nist.gov/vuln/detail/CVE-2024-21896 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21896.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;be+F+Fkt9wYh4z6YwfNqdw==&#34;: {&#xA;      &#34;id&#34;: &#34;be+F+Fkt9wYh4z6YwfNqdw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-35252&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability found in curl. This security flaw happens when curl is used to retrieve and parse cookies from an HTTP(S) server, where it accepts cookies using control codes (byte values below 32), and also when cookies that contain such control codes are later sent back to an HTTP(S) server, possibly causing the server to return a 400 response. This issue effectively allows a \&#34;sister site\&#34; to deny service to siblings and cause a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-35252 https://bugzilla.redhat.com/show_bug.cgi?id=2120718 https://www.cve.org/CVERecord?id=CVE-2022-35252 https://nvd.nist.gov/vuln/detail/CVE-2022-35252 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-35252.json https://access.redhat.com/errata/RHSA-2023:2478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bf41zTvm6HAv6xdiXpwGWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;bf41zTvm6HAv6xdiXpwGWQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32728&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. In affected versions of sshd, the DisableForwarding directive does not fully adhere to the intended functionality as documented. Specifically, it fails to disable X11 and agent forwarding, which may allow unintended access under certain configurations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32728 https://bugzilla.redhat.com/show_bug.cgi?id=2358767 https://www.cve.org/CVERecord?id=CVE-2025-32728 https://nvd.nist.gov/vuln/detail/CVE-2025-32728 https://lists.mindrot.org/pipermail/openssh-unix-dev/2025-April/041879.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32728.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bfa/XbakkA2/5GrUyvwSyw==&#34;: {&#xA;      &#34;id&#34;: &#34;bfa/XbakkA2/5GrUyvwSyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52005&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git. When cloning, fetching, or pushing from a server, informational or error messages are transported from the remote Git process to the client via a sideband channel. These messages are prefixed with \&#34;remote:\&#34; and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information or to mislead the user into executing untrusted scripts.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-15T17:35:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52005 https://bugzilla.redhat.com/show_bug.cgi?id=2338289 https://www.cve.org/CVERecord?id=CVE-2024-52005 https://nvd.nist.gov/vuln/detail/CVE-2024-52005 https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329 https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52005.json https://access.redhat.com/errata/RHSA-2025:7409&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.1-2.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bgGUNdBAEokCVaY0TKwk/w==&#34;: {&#xA;      &#34;id&#34;: &#34;bgGUNdBAEokCVaY0TKwk/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6075&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in Python’s os.path.expandvars() function that can cause performance degradation. When processing specially crafted, user-controlled input with nested environment variable patterns, the function exhibits quadratic time complexity, potentially leading to excessive CPU usage and denial of service (DoS) conditions. No code execution or data exposure occurs, so the impact is limited to performance slowdown.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-31T16:41:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6075 https://bugzilla.redhat.com/show_bug.cgi?id=2408891 https://www.cve.org/CVERecord?id=CVE-2025-6075 https://nvd.nist.gov/vuln/detail/CVE-2025-6075 https://github.com/python/cpython/issues/136065 https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6075.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;: {&#xA;      &#34;id&#34;: &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libblkid&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bh7RRRlNP555+LOFASdB0w==&#34;: {&#xA;      &#34;id&#34;: &#34;bh7RRRlNP555+LOFASdB0w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2980&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference vulnerability was found in vim&#39;s do_mouse() function of the src/mouse.c file. The issue occurs with a mouse click when it is not initialized. This flaw allows an attacker to trick a user into opening a specially crafted input file, triggering the vulnerability that could cause an application to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2980 https://bugzilla.redhat.com/show_bug.cgi?id=2123709 https://www.cve.org/CVERecord?id=CVE-2022-2980 https://nvd.nist.gov/vuln/detail/CVE-2022-2980 https://huntr.dev/bounties/6e7b12a5-242c-453d-b39e-9625d563b0ea https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2980.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bhGWI9pwDmrdv65FPEeviA==&#34;: {&#xA;      &#34;id&#34;: &#34;bhGWI9pwDmrdv65FPEeviA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59466&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in Node.js error handling where \&#34;Maximum call stack size exceeded\&#34; errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(&#39;uncaughtException&#39;)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59466 https://bugzilla.redhat.com/show_bug.cgi?id=2431343 https://www.cve.org/CVERecord?id=CVE-2025-59466 https://nvd.nist.gov/vuln/detail/CVE-2025-59466 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59466.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bj9lurrpBxE/q4lRd2Wp7A==&#34;: {&#xA;      &#34;id&#34;: &#34;bj9lurrpBxE/q4lRd2Wp7A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4673&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in net/http. Handling Proxy-Authorization and Proxy-Authenticate headers during cross-origin redirects allows these headers to be inadvertently forwarded, potentially exposing sensitive authentication credentials. This flaw allows a network-based attacker to manipulate redirect responses, unintentionally exposing authentication details to unauthorized parties.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T16:42:53Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4673 https://bugzilla.redhat.com/show_bug.cgi?id=2373305 https://www.cve.org/CVERecord?id=CVE-2025-4673 https://nvd.nist.gov/vuln/detail/CVE-2025-4673 https://go.dev/cl/679257 https://go.dev/issue/73816 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A https://pkg.go.dev/vuln/GO-2025-3751 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4673.json https://access.redhat.com/errata/RHSA-2025:10676&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.4-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bjkXZ4ZTp29EFzF+wMw4xw==&#34;: {&#xA;      &#34;id&#34;: &#34;bjkXZ4ZTp29EFzF+wMw4xw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27982&#34;,&#xA;      &#34;description&#34;: &#34;An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27982 https://bugzilla.redhat.com/show_bug.cgi?id=2275392 https://www.cve.org/CVERecord?id=CVE-2024-27982 https://nvd.nist.gov/vuln/detail/CVE-2024-27982 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27982.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.2.8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;: {&#xA;      &#34;id&#34;: &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bklfMYFV2WKM17hKPU+5BA==&#34;: {&#xA;      &#34;id&#34;: &#34;bklfMYFV2WKM17hKPU+5BA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-3373&#34;,&#xA;      &#34;description&#34;: &#34;Usage of IPv6 zone IDs can bypass URI name constraints in crypto/x509&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-28T00:47:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/643099 https://go.dev/issue/71156 https://groups.google.com/g/golang-dev/c/bG8cv1muIBM/m/G461hA6lCgAJ https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.22.11&#34;&#xA;    },&#xA;    &#34;bmNjdpodhrAjmmeNv8j2ZA==&#34;: {&#xA;      &#34;id&#34;: &#34;bmNjdpodhrAjmmeNv8j2ZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30590&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30590 https://bugzilla.redhat.com/show_bug.cgi?id=2219842 https://www.cve.org/CVERecord?id=CVE-2023-30590 https://nvd.nist.gov/vuln/detail/CVE-2023-30590 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30590.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bmwYxyT6fmHIa8FODhI70w==&#34;: {&#xA;      &#34;id&#34;: &#34;bmwYxyT6fmHIa8FODhI70w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22025&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22025 https://bugzilla.redhat.com/show_bug.cgi?id=2270559 https://www.cve.org/CVERecord?id=CVE-2024-22025 https://nvd.nist.gov/vuln/detail/CVE-2024-22025 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22025.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bmyf3V3WjS7kQmiAcGoBiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;bmyf3V3WjS7kQmiAcGoBiQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bnbyK7dxlE/oYVQQzP4AfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;bnbyK7dxlE/oYVQQzP4AfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21715&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The Node.js Permission Model, intended to restrict filesystem access, does not properly enforce read permission checks for the `fs.realpathSync.native()` function. This vulnerability allows code operating under `--permission` with restricted `--allow-fs-read` flags to bypass security controls. Consequently, an attacker can use `fs.realpathSync.native()` to determine file existence, resolve symbolic link targets, and enumerate filesystem paths outside of permitted directories, leading to information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21715 https://bugzilla.redhat.com/show_bug.cgi?id=2453152 https://www.cve.org/CVERecord?id=CVE-2026-21715 https://nvd.nist.gov/vuln/detail/CVE-2026-21715 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21715.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bpM7BDVV04atOPduc9mI8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;bpM7BDVV04atOPduc9mI8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6232&#34;,&#xA;      &#34;description&#34;: &#34;A regular expression denial of service (ReDos) vulnerability was found in Python&#39;s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-03T13:15:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6232 https://bugzilla.redhat.com/show_bug.cgi?id=2309426 https://www.cve.org/CVERecord?id=CVE-2024-6232 https://nvd.nist.gov/vuln/detail/CVE-2024-6232 https://github.com/python/cpython/issues/121285 https://github.com/python/cpython/pull/121286 https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6232.json https://access.redhat.com/errata/RHSA-2024:9468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.19-8.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bpwdCug2xQZhmaazCqwIew==&#34;: {&#xA;      &#34;id&#34;: &#34;bpwdCug2xQZhmaazCqwIew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-51767&#34;,&#xA;      &#34;description&#34;: &#34;An authentication bypass vulnerability was found in a modified version of OpenSSH. When common types of DRAM memory are used, it might allow row hammer attacks because the integer value of authenticated authpassword does not resist flips of a single bit. Exploiting a Rowhammer-style attack to flip bits in memory, forces successful authentication by setting the return code to 0.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-51767 https://bugzilla.redhat.com/show_bug.cgi?id=2255850 https://www.cve.org/CVERecord?id=CVE-2023-51767 https://nvd.nist.gov/vuln/detail/CVE-2023-51767 https://arxiv.org/abs/2309.02545 https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77 https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-51767.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bqEGDVpuXY3j7Kr18B5E4w==&#34;: {&#xA;      &#34;id&#34;: &#34;bqEGDVpuXY3j7Kr18B5E4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;brTmpkOORx2yJvCnkPzYRw==&#34;: {&#xA;      &#34;id&#34;: &#34;brTmpkOORx2yJvCnkPzYRw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-70873&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in SQLite. This information disclosure vulnerability exists within the zipfile extension, specifically in the zipfileInflate function. A remote attacker could exploit this by providing a specially crafted ZIP file. Successful exploitation could lead to the disclosure of sensitive heap memory information.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-70873 https://bugzilla.redhat.com/show_bug.cgi?id=2447086 https://www.cve.org/CVERecord?id=CVE-2025-70873 https://nvd.nist.gov/vuln/detail/CVE-2025-70873 https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054 https://sqlite.org/forum/forumpost/761eac3c82 https://sqlite.org/src/info/3d459f1fb1bd1b5e https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-70873.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;by+PAyhAcd2LS2O/tZxbRQ==&#34;: {&#xA;      &#34;id&#34;: &#34;by+PAyhAcd2LS2O/tZxbRQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5245&#34;,&#xA;      &#34;description&#34;: &#34;A denial-of-service vulnerability has been identified in GNU Binutils, affecting versions up to 2.44. The flaw resides within the debug_type_samep function in the /binutils/debug.c file of the objdump component. An attacker with local access can trigger a program crash by manipulating input data, leading to a denial of service for the objdump utility.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-27T14:31:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5245 https://bugzilla.redhat.com/show_bug.cgi?id=2368771 https://www.cve.org/CVERecord?id=CVE-2025-5245 https://nvd.nist.gov/vuln/detail/CVE-2025-5245 https://sourceware.org/bugzilla/attachment.cgi?id=16004 https://sourceware.org/bugzilla/show_bug.cgi?id=32829 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a https://vuldb.com/?ctiid.310347 https://vuldb.com/?id.310347 https://vuldb.com/?submit.584635 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5245.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;by27tPFgbmYSIGNVHDyy/w==&#34;: {&#xA;      &#34;id&#34;: &#34;by27tPFgbmYSIGNVHDyy/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;by4qEj8r2+yQ8xw2ZHB4/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;by4qEj8r2+yQ8xw2ZHB4/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-7425&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7425 https://bugzilla.redhat.com/show_bug.cgi?id=2379274 https://www.cve.org/CVERecord?id=CVE-2025-7425 https://nvd.nist.gov/vuln/detail/CVE-2025-7425 https://gitlab.gnome.org/GNOME/libxslt/-/issues/140 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7425.json https://access.redhat.com/errata/RHSA-2025:12447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-11.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bytYw82gsP7fmiiqIEcGNw==&#34;: {&#xA;      &#34;id&#34;: &#34;bytYw82gsP7fmiiqIEcGNw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30588&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30588 https://bugzilla.redhat.com/show_bug.cgi?id=2219838 https://www.cve.org/CVERecord?id=CVE-2023-30588 https://nvd.nist.gov/vuln/detail/CVE-2023-30588 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30588.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bzewxC8waOXL414yMxKcqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;bzewxC8waOXL414yMxKcqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;c+walK0V+dA1g3qnPME4Ow==&#34;: {&#xA;      &#34;id&#34;: &#34;c+walK0V+dA1g3qnPME4Ow==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32006&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32006 https://bugzilla.redhat.com/show_bug.cgi?id=2230955 https://www.cve.org/CVERecord?id=CVE-2023-32006 https://nvd.nist.gov/vuln/detail/CVE-2023-32006 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32006.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.17.1-1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;c/+IhJOZwrUFnxH/AA8NiA==&#34;: {&#xA;      &#34;id&#34;: &#34;c/+IhJOZwrUFnxH/AA8NiA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;c/EuG5G0xeL87UQs3yxxqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;c/EuG5G0xeL87UQs3yxxqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3899&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-22T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3899 https://bugzilla.redhat.com/show_bug.cgi?id=2225407 https://www.cve.org/CVERecord?id=CVE-2023-3899 https://nvd.nist.gov/vuln/detail/CVE-2023-3899 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3899.json https://access.redhat.com/errata/RHSA-2023:4708&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;subscription-manager&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.29.33.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;c/TMKje5Txl9grWesV+S0A==&#34;: {&#xA;      &#34;id&#34;: &#34;c/TMKje5Txl9grWesV+S0A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45288&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45288 https://bugzilla.redhat.com/show_bug.cgi?id=2268273 https://www.cve.org/CVERecord?id=CVE-2023-45288 https://nvd.nist.gov/vuln/detail/CVE-2023-45288 https://nowotarski.info/http2-continuation-flood/ https://pkg.go.dev/vuln/GO-2024-2687 https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45288.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;c0R7sQMFyTIRhp8ZTCTmlw==&#34;: {&#xA;      &#34;id&#34;: &#34;c0R7sQMFyTIRhp8ZTCTmlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29499&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29499 https://bugzilla.redhat.com/show_bug.cgi?id=2211828 https://www.cve.org/CVERecord?id=CVE-2023-29499 https://nvd.nist.gov/vuln/detail/CVE-2023-29499 https://gitlab.gnome.org/GNOME/glib/-/issues/2794 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29499.json https://access.redhat.com/errata/RHSA-2023:6631&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;c1lEpxuKpeMWatR0F4jVaw==&#34;: {&#xA;      &#34;id&#34;: &#34;c1lEpxuKpeMWatR0F4jVaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25547&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-04T21:51:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25547 https://bugzilla.redhat.com/show_bug.cgi?id=2436942 https://www.cve.org/CVERecord?id=CVE-2026-25547 https://nvd.nist.gov/vuln/detail/CVE-2026-25547 https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25547.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;c3NVrHAJ0F90wrDIEwTmUw==&#34;: {&#xA;      &#34;id&#34;: &#34;c3NVrHAJ0F90wrDIEwTmUw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.20.0.1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;c3PMMUG7qpg+sSIEQy9R+g==&#34;: {&#xA;      &#34;id&#34;: &#34;c3PMMUG7qpg+sSIEQy9R+g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55131&#34;,&#xA;      &#34;description&#34;: &#34;A memory exposure flaw has been discovered in Node.js. A flaw in Node.js&#39;s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55131 https://bugzilla.redhat.com/show_bug.cgi?id=2431350 https://www.cve.org/CVERecord?id=CVE-2025-55131 https://nvd.nist.gov/vuln/detail/CVE-2025-55131 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55131.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;c3eMx85yv79gfxNsxZXPHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;c3eMx85yv79gfxNsxZXPHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-41175&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-41175 https://bugzilla.redhat.com/show_bug.cgi?id=2235264 https://www.cve.org/CVERecord?id=CVE-2023-41175 https://nvd.nist.gov/vuln/detail/CVE-2023-41175 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-41175.json https://access.redhat.com/errata/RHSA-2024:2289&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-12.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;c4b8AyMPp1ls7ClKiTCbAg==&#34;: {&#xA;      &#34;id&#34;: &#34;c4b8AyMPp1ls7ClKiTCbAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-36137&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. The Node.js Permission Model does not operate on file descriptors. However, operations such as fs.fchown or fs.fchmod can use a \&#34;read-only\&#34; file descriptor to change the owner and permissions of a file.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-36137 https://bugzilla.redhat.com/show_bug.cgi?id=2299281 https://www.cve.org/CVERecord?id=CVE-2024-36137 https://nvd.nist.gov/vuln/detail/CVE-2024-36137 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-36137.json https://access.redhat.com/errata/RHSA-2024:5815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;c95Jb/MAeM4/Wnq2jSIopg==&#34;: {&#xA;      &#34;id&#34;: &#34;c95Jb/MAeM4/Wnq2jSIopg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25883&#34;,&#xA;      &#34;description&#34;: &#34;A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the &#39;new Range&#39; function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25883 https://bugzilla.redhat.com/show_bug.cgi?id=2216475 https://www.cve.org/CVERecord?id=CVE-2022-25883 https://nvd.nist.gov/vuln/detail/CVE-2022-25883 https://github.com/advisories/GHSA-c2qf-rxjj-qqgw https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25883.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;c9kKQdmqE31JfE8hW1jBfg==&#34;: {&#xA;      &#34;id&#34;: &#34;c9kKQdmqE31JfE8hW1jBfg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cBmZwV0l/QLSSsoNwTuUWA==&#34;: {&#xA;      &#34;id&#34;: &#34;cBmZwV0l/QLSSsoNwTuUWA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25883&#34;,&#xA;      &#34;description&#34;: &#34;A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the &#39;new Range&#39; function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25883 https://bugzilla.redhat.com/show_bug.cgi?id=2216475 https://www.cve.org/CVERecord?id=CVE-2022-25883 https://nvd.nist.gov/vuln/detail/CVE-2022-25883 https://github.com/advisories/GHSA-c2qf-rxjj-qqgw https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25883.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.17.1-1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cC3lPQDv1QQiffpXJ4JvcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;cC3lPQDv1QQiffpXJ4JvcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cD+9p+2eb4ubWbn/ynDqrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;cD+9p+2eb4ubWbn/ynDqrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-vars&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.05-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cH2BKUm0Ri3t0Dex4X9yvQ==&#34;: {&#xA;      &#34;id&#34;: &#34;cH2BKUm0Ri3t0Dex4X9yvQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmount-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cHe6S9cCUDaq9usM0j2CnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;cHe6S9cCUDaq9usM0j2CnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6069&#34;,&#xA;      &#34;description&#34;: &#34;A denial-of-service (DoS) vulnerability has been discovered in Python&#39;s html.parser.HTMLParser class. When processing specially malformed HTML input, the parsing runtime can become quadratic with respect to the input size. This significantly increased processing time can lead to excessive resource consumption, ultimately causing a denial-of-service condition in applications that rely on this parser.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-17T13:39:46Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6069 https://bugzilla.redhat.com/show_bug.cgi?id=2373234 https://www.cve.org/CVERecord?id=CVE-2025-6069 https://nvd.nist.gov/vuln/detail/CVE-2025-6069 https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949 https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41 https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b https://github.com/python/cpython/issues/135462 https://github.com/python/cpython/pull/135464 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6069.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cKtHM3xMrk1VjV0S8Zl4qQ==&#34;: {&#xA;      &#34;id&#34;: &#34;cKtHM3xMrk1VjV0S8Zl4qQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cLetPtVgm731iRPvGEIeyw==&#34;: {&#xA;      &#34;id&#34;: &#34;cLetPtVgm731iRPvGEIeyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39333&#34;,&#xA;      &#34;description&#34;: &#34;Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39333 https://bugzilla.redhat.com/show_bug.cgi?id=2244418 https://www.cve.org/CVERecord?id=CVE-2023-39333 https://nvd.nist.gov/vuln/detail/CVE-2023-39333 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39333.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cMY+6QfPqyOZE380Mf5rIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;cMY+6QfPqyOZE380Mf5rIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-0351&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim. The vulnerability occurs due to too many recursions, which can lead to a segmentation fault. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-01-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-0351 https://bugzilla.redhat.com/show_bug.cgi?id=2046436 https://www.cve.org/CVERecord?id=CVE-2022-0351 https://nvd.nist.gov/vuln/detail/CVE-2022-0351 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-0351.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cNsQU/uNFf7PsCWqaKxjAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;cNsQU/uNFf7PsCWqaKxjAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30588&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30588 https://bugzilla.redhat.com/show_bug.cgi?id=2219838 https://www.cve.org/CVERecord?id=CVE-2023-30588 https://nvd.nist.gov/vuln/detail/CVE-2023-30588 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30588.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.1.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cS/0ymtIhJJUkn3i2OVYww==&#34;: {&#xA;      &#34;id&#34;: &#34;cS/0ymtIhJJUkn3i2OVYww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26996&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-20T03:05:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26996 https://bugzilla.redhat.com/show_bug.cgi?id=2441268 https://www.cve.org/CVERecord?id=CVE-2026-26996 https://nvd.nist.gov/vuln/detail/CVE-2026-26996 https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26996.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cS8BJbrTN4Z2MOJCTGMR8w==&#34;: {&#xA;      &#34;id&#34;: &#34;cS8BJbrTN4Z2MOJCTGMR8w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-48795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the SSH channel integrity. By manipulating sequence numbers during the handshake, an attacker can remove the initial messages on the secure channel without causing a MAC failure. For example, an attacker could disable the ping extension and thus disable the new countermeasure in OpenSSH 9.5 against keystroke timing attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-48795 https://bugzilla.redhat.com/show_bug.cgi?id=2254210 https://www.cve.org/CVERecord?id=CVE-2023-48795 https://nvd.nist.gov/vuln/detail/CVE-2023-48795 https://access.redhat.com/solutions/7071748 https://terrapin-attack.com/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48795.json https://access.redhat.com/errata/RHSA-2024:1130&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-34.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cSPoRTB3BjDaa16wszdN3g==&#34;: {&#xA;      &#34;id&#34;: &#34;cSPoRTB3BjDaa16wszdN3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25193&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found HarfBuzz. This flaw allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25193 https://bugzilla.redhat.com/show_bug.cgi?id=2167254 https://www.cve.org/CVERecord?id=CVE-2023-25193 https://nvd.nist.gov/vuln/detail/CVE-2023-25193 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25193.json https://access.redhat.com/errata/RHSA-2024:2410&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;harfbuzz-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.7.4-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cUH9U4T8Wpzm/UIIektEAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;cUH9U4T8Wpzm/UIIektEAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cWbhx4ozV3Pkh4rK/phNRA==&#34;: {&#xA;      &#34;id&#34;: &#34;cWbhx4ozV3Pkh4rK/phNRA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-3420&#34;,&#xA;      &#34;description&#34;: &#34;Sensitive headers incorrectly sent after cross-domain redirect in net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-28T00:47:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/643100 https://go.dev/issue/70530 https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ https://groups.google.com/g/golang-dev/c/bG8cv1muIBM/m/G461hA6lCgAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.22.11&#34;&#xA;    },&#xA;    &#34;ca+BSCGp5tEYAgJqvm8GFw==&#34;: {&#xA;      &#34;id&#34;: &#34;ca+BSCGp5tEYAgJqvm8GFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6237&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When the EVP_PKEY_public_check() function is called in RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is a large prime, this computation takes a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6237 https://bugzilla.redhat.com/show_bug.cgi?id=2258502 https://www.cve.org/CVERecord?id=CVE-2023-6237 https://nvd.nist.gov/vuln/detail/CVE-2023-6237 https://www.openssl.org/news/secadv/20240115.txt https://www.openwall.com/lists/oss-security/2024/01/15/2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6237.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cbNKZbfbJhPfPLHi6va27w==&#34;: {&#xA;      &#34;id&#34;: &#34;cbNKZbfbJhPfPLHi6va27w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3555&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libX11 package in the_XFreeX11XCBStructure function of the xcb_disp.c file. The manipulation of the argument dpy may lead to a memory leak, resulting in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3555 https://bugzilla.redhat.com/show_bug.cgi?id=2136412 https://www.cve.org/CVERecord?id=CVE-2022-3555 https://nvd.nist.gov/vuln/detail/CVE-2022-3555 https://ubuntu.com/security/CVE-2022-3555 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3555.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cbSiFirRdrVkpUeOLy/CjA==&#34;: {&#xA;      &#34;id&#34;: &#34;cbSiFirRdrVkpUeOLy/CjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9900&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Libtiff. This vulnerability is a \&#34;write-what-where\&#34; condition, triggered when the library processes a specially crafted TIFF image file.\n\nBy providing an abnormally large image height value in the file&#39;s metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-22T14:29:35Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9900 https://bugzilla.redhat.com/show_bug.cgi?id=2392784 https://www.cve.org/CVERecord?id=CVE-2025-9900 https://nvd.nist.gov/vuln/detail/CVE-2025-9900 https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file https://gitlab.com/libtiff/libtiff/-/issues/704 https://gitlab.com/libtiff/libtiff/-/merge_requests/732 https://libtiff.gitlab.io/libtiff/releases/v4.7.1.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9900.json https://access.redhat.com/errata/RHSA-2025:20956&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-15.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cex7jEfdv/MaWi3px1ZgxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;cex7jEfdv/MaWi3px1ZgxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This issue occurs when hashing empty strings which aren&#39;t null-terminated, xmlDictComputeFastKey could produce inconsistent results, which may lead to various logic or memory errors, including double free errors.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29469 https://bugzilla.redhat.com/show_bug.cgi?id=2185984 https://www.cve.org/CVERecord?id=CVE-2023-29469 https://nvd.nist.gov/vuln/detail/CVE-2023-29469 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29469.json https://access.redhat.com/errata/RHSA-2023:4349&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-3.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cgUuYY1sKP0jeDPr/wEn4w==&#34;: {&#xA;      &#34;id&#34;: &#34;cgUuYY1sKP0jeDPr/wEn4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24789&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. The ZIP implementation of the Go language archive/zip library behaves differently than the rest of the ZIP file format implementations. When handling ZIP files with a corrupted central directory record, the library skips over the invalid record and processes the next valid one. This flaw allows a malicious user to access hidden information or files inside maliciously crafted ZIP files.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24789 https://bugzilla.redhat.com/show_bug.cgi?id=2292668 https://www.cve.org/CVERecord?id=CVE-2024-24789 https://nvd.nist.gov/vuln/detail/CVE-2024-24789 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24789.json https://access.redhat.com/errata/RHSA-2024:4212&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.11-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;chAsSpcJWTbOWxYZ5RrJ4A==&#34;: {&#xA;      &#34;id&#34;: &#34;chAsSpcJWTbOWxYZ5RrJ4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cjoCrbQlAeGxtTPUlcMPuA==&#34;: {&#xA;      &#34;id&#34;: &#34;cjoCrbQlAeGxtTPUlcMPuA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-26603&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim&#39;s :redir command. This vulnerability allows a use-after-free condition via redirecting the :display command to a clipboard register (* or +), which allows access to freed memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T19:04:24Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-26603 https://bugzilla.redhat.com/show_bug.cgi?id=2346346 https://www.cve.org/CVERecord?id=CVE-2025-26603 https://nvd.nist.gov/vuln/detail/CVE-2025-26603 https://github.com/vim/vim/commit/c0f0e2380e5954f4a52a131bf6b8 https://github.com/vim/vim/security/advisories/GHSA-63p5-mwg2-787v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-26603.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ckmL8g+r8c1O3UTEaVeJgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ckmL8g+r8c1O3UTEaVeJgQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25547&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-04T21:51:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25547 https://bugzilla.redhat.com/show_bug.cgi?id=2436942 https://www.cve.org/CVERecord?id=CVE-2026-25547 https://nvd.nist.gov/vuln/detail/CVE-2026-25547 https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25547.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cly/G/AvUZQM2J1YMymkpQ==&#34;: {&#xA;      &#34;id&#34;: &#34;cly/G/AvUZQM2J1YMymkpQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66866&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in BinUtils. An attacker can exploit a vulnerability in the `d_abi_tags` function within the `cp-demangle.c` file by providing a specially crafted Portable Executable (PE) file. This can lead to a Denial of Service (DoS), making the affected application unavailable to legitimate users.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66866 https://bugzilla.redhat.com/show_bug.cgi?id=2425830 https://www.cve.org/CVERecord?id=CVE-2025-66866 https://nvd.nist.gov/vuln/detail/CVE-2025-66866 https://github.com/caozhzh/CRGF-Vul/blob/main/cxxfilt/crash6.md https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66866.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cm/gvI0AVbEJW8SbZVw6fw==&#34;: {&#xA;      &#34;id&#34;: &#34;cm/gvI0AVbEJW8SbZVw6fw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cm3OVRYaWfpGnoqokxyhvA==&#34;: {&#xA;      &#34;id&#34;: &#34;cm3OVRYaWfpGnoqokxyhvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. This vulnerability allows a remote attacker to inject malicious data into HTTP headers or prematurely end HTTP requests by sending specially crafted input to the `upgrade` option of `client.request()`. This is possible because undici does not properly validate input for invalid header characters, which could lead to unauthorized information disclosure or bypassing of security controls.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:17:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1527 https://bugzilla.redhat.com/show_bug.cgi?id=2447141 https://www.cve.org/CVERecord?id=CVE-2026-1527 https://nvd.nist.gov/vuln/detail/CVE-2026-1527 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq https://hackerone.com/reports/3487198 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1527.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;coZUZkSgAUHkgS8Joj97mg==&#34;: {&#xA;      &#34;id&#34;: &#34;coZUZkSgAUHkgS8Joj97mg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bsdtar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cpPUNXFgwF2pB9MJlxFOqg==&#34;: {&#xA;      &#34;id&#34;: &#34;cpPUNXFgwF2pB9MJlxFOqg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26996&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-20T03:05:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26996 https://bugzilla.redhat.com/show_bug.cgi?id=2441268 https://www.cve.org/CVERecord?id=CVE-2026-26996 https://nvd.nist.gov/vuln/detail/CVE-2026-26996 https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26996.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cpsr/YFJ0iUNtv72fOtdjw==&#34;: {&#xA;      &#34;id&#34;: &#34;cpsr/YFJ0iUNtv72fOtdjw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4340&#34;,&#xA;      &#34;description&#34;: &#34;Handshake messages may be processed at the incorrect encryption level in crypto/tls&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:08:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/724120 https://go.dev/issue/76443 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.12&#34;&#xA;    },&#xA;    &#34;cr4RGJYSJM2QUssm6cAQ4w==&#34;: {&#xA;      &#34;id&#34;: &#34;cr4RGJYSJM2QUssm6cAQ4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4863&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer flaw was found in the way libwebp, a library used to process \&#34;WebP\&#34; image format data, processes certain specially formatted WebP images. An attacker could use this flaw to crash or execute remotely arbitrary code in an application such as a web browser compiled with this library.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4863 https://bugzilla.redhat.com/show_bug.cgi?id=2238431 https://www.cve.org/CVERecord?id=CVE-2023-4863 https://nvd.nist.gov/vuln/detail/CVE-2023-4863 https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/ https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4863.json https://access.redhat.com/errata/RHSA-2023:5214&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libwebp&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.2.0-7.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cv/HKlhaI7EJMBLIaTimwg==&#34;: {&#xA;      &#34;id&#34;: &#34;cv/HKlhaI7EJMBLIaTimwg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23920&#34;,&#xA;      &#34;description&#34;: &#34;An untrusted search path vulnerability exists in Node.js. \u003c19.6.1, \u003c18.14.1, \u003c16.19.1, and \u003c14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23920 https://bugzilla.redhat.com/show_bug.cgi?id=2172217 https://www.cve.org/CVERecord?id=CVE-2023-23920 https://nvd.nist.gov/vuln/detail/CVE-2023-23920 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23920.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cw4W3PskPKPJZy+QzFk5bA==&#34;: {&#xA;      &#34;id&#34;: &#34;cw4W3PskPKPJZy+QzFk5bA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0801&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds write in the _TIFFmemcpy function in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c, resulting in a Denial of Service and limited data modification.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0801 https://bugzilla.redhat.com/show_bug.cgi?id=2170172 https://www.cve.org/CVERecord?id=CVE-2023-0801 https://nvd.nist.gov/vuln/detail/CVE-2023-0801 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0801.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cwXdqs9AFOcThYn4e8y3yw==&#34;: {&#xA;      &#34;id&#34;: &#34;cwXdqs9AFOcThYn4e8y3yw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-35195&#34;,&#xA;      &#34;description&#34;: &#34;An incorrect control flow implementation vulnerability was found in Requests. If the first request in a session is made with verify=False, all subsequent requests to the same host will continue to ignore cert verification.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-35195 https://bugzilla.redhat.com/show_bug.cgi?id=2282114 https://www.cve.org/CVERecord?id=CVE-2024-35195 https://nvd.nist.gov/vuln/detail/CVE-2024-35195 https://github.com/psf/requests/security/advisories/GHSA-9wx4-h78v-vm56 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-35195.json https://access.redhat.com/errata/RHSA-2025:7049&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-requests&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.25.1-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;cxMZ2TEnkk6RdtuU9fDThg==&#34;: {&#xA;      &#34;id&#34;: &#34;cxMZ2TEnkk6RdtuU9fDThg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3927&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-10-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3927 https://bugzilla.redhat.com/show_bug.cgi?id=2021290 https://www.cve.org/CVERecord?id=CVE-2021-3927 https://nvd.nist.gov/vuln/detail/CVE-2021-3927 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3927.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d/522T+B/ARMNSG+3QfAWA==&#34;: {&#xA;      &#34;id&#34;: &#34;d/522T+B/ARMNSG+3QfAWA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22185&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenLDAP Lightning Memory-Mapped Database (LMDB) mdb_load. When processing malformed input, a local attacker can exploit a heap buffer underflow vulnerability in the readline() function. This can lead to an out-of-bounds read, potentially causing a denial of service (DoS) and limited disclosure of heap memory contents.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T20:26:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22185 https://bugzilla.redhat.com/show_bug.cgi?id=2427679 https://www.cve.org/CVERecord?id=CVE-2026-22185 https://nvd.nist.gov/vuln/detail/CVE-2026-22185 https://seclists.org/fulldisclosure/2026/Jan/5 https://seclists.org/fulldisclosure/2026/Jan/8 https://www.openldap.org/ https://www.vulncheck.com/advisories/openldap-lmdb-mdb-load-heap-buffer-underflow-in-readline https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22185.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openldap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d0TdbMsURHlCTk8d2vGLjQ==&#34;: {&#xA;      &#34;id&#34;: &#34;d0TdbMsURHlCTk8d2vGLjQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55131&#34;,&#xA;      &#34;description&#34;: &#34;A memory exposure flaw has been discovered in Node.js. A flaw in Node.js&#39;s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55131 https://bugzilla.redhat.com/show_bug.cgi?id=2431350 https://www.cve.org/CVERecord?id=CVE-2025-55131 https://nvd.nist.gov/vuln/detail/CVE-2025-55131 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55131.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.20.0.1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;d0nPfXoEZybRuV9TMDY3YQ==&#34;: {&#xA;      &#34;id&#34;: &#34;d0nPfXoEZybRuV9TMDY3YQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6253&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When curl is configured to use distinct proxies for different URL schemes, a redirect from a URL using an authenticated proxy to one using an unauthenticated proxy can inadvertently expose the initial proxy&#39;s credentials. This improper credential management (CWE-522) may allow an attacker to gain unauthorized access or information by intercepting these disclosed credentials.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6253 https://bugzilla.redhat.com/show_bug.cgi?id=2461202 https://www.cve.org/CVERecord?id=CVE-2026-6253 https://nvd.nist.gov/vuln/detail/CVE-2026-6253 https://curl.se/docs/CVE-2026-6253.html https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6253.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d1j+WeBwgxUY2DD8tjQwMA==&#34;: {&#xA;      &#34;id&#34;: &#34;d1j+WeBwgxUY2DD8tjQwMA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24537&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24537 https://bugzilla.redhat.com/show_bug.cgi?id=2184484 https://www.cve.org/CVERecord?id=CVE-2023-24537 https://nvd.nist.gov/vuln/detail/CVE-2023-24537 https://github.com/golang/go/issues/59180 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24537.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;d2mdhZ97rWRfD+pslcl6uw==&#34;: {&#xA;      &#34;id&#34;: &#34;d2mdhZ97rWRfD+pslcl6uw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30590&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30590 https://bugzilla.redhat.com/show_bug.cgi?id=2219842 https://www.cve.org/CVERecord?id=CVE-2023-30590 https://nvd.nist.gov/vuln/detail/CVE-2023-30590 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30590.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.16.1-1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;d8O/Pp2nkWZxFhUyXQucZg==&#34;: {&#xA;      &#34;id&#34;: &#34;d8O/Pp2nkWZxFhUyXQucZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1094&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in PostgreSQL. Due to improper neutralization of quoting syntax, affected versions potentially allow a database input provider to achieve SQL injection in certain usage patterns. Specifically, SQL injection requires the application to use the affected function&#39;s result to construct input to psql, the PostgreSQL interactive terminal. Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when `client_encoding` is `BIG5` and `server_encoding` is one of `EUC_TW` or `MULE_INTERNAL`.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-13T13:00:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1094 https://bugzilla.redhat.com/show_bug.cgi?id=2345548 https://www.cve.org/CVERecord?id=CVE-2025-1094 https://nvd.nist.gov/vuln/detail/CVE-2025-1094 https://attackerkb.com/topics/G5s8ZWAbYH/cve-2024-12356/rapid7-analysis https://www.postgresql.org/support/security/CVE-2025-1094/ https://www.rapid7.com/blog/post/2025/02/13/cve-2025-1094-postgresql-psql-sql-injection-fixed/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1094.json https://access.redhat.com/errata/RHSA-2025:1738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpq&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:13.20-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;d9oy2JiAKtie2N1lu2J6ew==&#34;: {&#xA;      &#34;id&#34;: &#34;d9oy2JiAKtie2N1lu2J6ew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4224&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in the python pyexpat module. When an Expat parser with a registered ElementDeclHandler parses an inline document type definition containing a deeply nested content model a C stack overflow occurs. This will result in a program crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T17:52:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4224 https://bugzilla.redhat.com/show_bug.cgi?id=2448181 https://www.cve.org/CVERecord?id=CVE-2026-4224 https://nvd.nist.gov/vuln/detail/CVE-2026-4224 https://github.com/python/cpython/commit/196edfb06a7458377d4d0f4b3cd41724c1f3bd4a https://github.com/python/cpython/commit/e0a8a6da90597a924b300debe045cdb4628ee1f3 https://github.com/python/cpython/commit/eb0e8be3a7e11b87d198a2c3af1ed0eccf532768 https://github.com/python/cpython/issues/145986 https://github.com/python/cpython/pull/145987 https://mail.python.org/archives/list/security-announce@python.org/thread/5M7CGUW3XBRY7II4DK43KF7NQQ3TPZ6R/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4224.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d9qJI4TyihrqXixZ+S73jg==&#34;: {&#xA;      &#34;id&#34;: &#34;d9qJI4TyihrqXixZ+S73jg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27538&#34;,&#xA;      &#34;description&#34;: &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27538 https://bugzilla.redhat.com/show_bug.cgi?id=2179103 https://www.cve.org/CVERecord?id=CVE-2023-27538 https://nvd.nist.gov/vuln/detail/CVE-2023-27538 https://curl.se/docs/CVE-2023-27538.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27538.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dJvtOf1rRIWFniMT4IOhrw==&#34;: {&#xA;      &#34;id&#34;: &#34;dJvtOf1rRIWFniMT4IOhrw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59466&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in Node.js error handling where \&#34;Maximum call stack size exceeded\&#34; errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(&#39;uncaughtException&#39;)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59466 https://bugzilla.redhat.com/show_bug.cgi?id=2431343 https://www.cve.org/CVERecord?id=CVE-2025-59466 https://nvd.nist.gov/vuln/detail/CVE-2025-59466 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59466.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dKzgwwkG/spsYd8PVvrk6A==&#34;: {&#xA;      &#34;id&#34;: &#34;dKzgwwkG/spsYd8PVvrk6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39804&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tar. This issue occurs when extended attributes are processed in PAX archives, and could allow an attacker to cause an application crash, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39804 https://bugzilla.redhat.com/show_bug.cgi?id=2254067 https://www.cve.org/CVERecord?id=CVE-2023-39804 https://nvd.nist.gov/vuln/detail/CVE-2023-39804 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39804.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dMO4fX/IkQ2bi0ds65uBZA==&#34;: {&#xA;      &#34;id&#34;: &#34;dMO4fX/IkQ2bi0ds65uBZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-53905&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T20:48:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-53905 https://bugzilla.redhat.com/show_bug.cgi?id=2380362 https://www.cve.org/CVERecord?id=CVE-2025-53905 https://nvd.nist.gov/vuln/detail/CVE-2025-53905 https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239 https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-53905.json https://access.redhat.com/errata/RHSA-2025:20945&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dN3ZkuuHRauklH+tfqwFYA==&#34;: {&#xA;      &#34;id&#34;: &#34;dN3ZkuuHRauklH+tfqwFYA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38546&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. This flaw allows an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38546 https://bugzilla.redhat.com/show_bug.cgi?id=2241938 https://access.redhat.com/errata/RHSA-2024:2101 https://www.cve.org/CVERecord?id=CVE-2023-38546 https://nvd.nist.gov/vuln/detail/CVE-2023-38546 https://curl.se/docs/CVE-2023-38546.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38546.json https://access.redhat.com/errata/RHSA-2023:5763&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dNHj9TUgbfnbgJUCEellCw==&#34;: {&#xA;      &#34;id&#34;: &#34;dNHj9TUgbfnbgJUCEellCw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33671&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Picomatch, a JavaScript glob matcher. This Regular Expression Denial of Service (ReDoS) vulnerability allows a remote attacker to cause excessive CPU consumption and block the Node.js event loop, leading to a denial of service. This occurs when untrusted users supply crafted extglob patterns, specifically those using quantifiers like `+()` and `*()` combined with overlapping alternatives or nested extglobs, which can trigger catastrophic backtracking in the compiled regular expressions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-26T21:20:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33671 https://bugzilla.redhat.com/show_bug.cgi?id=2451986 https://www.cve.org/CVERecord?id=CVE-2026-33671 https://nvd.nist.gov/vuln/detail/CVE-2026-33671 https://github.com/micromatch/picomatch/commit/5eceecd27543b8e056b9307d69e105ea03618a7d https://github.com/micromatch/picomatch/security/advisories/GHSA-c2c7-rcm5-vvqj https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33671.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dO/rj/SVo/ZlfJAB2ajOEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dO/rj/SVo/ZlfJAB2ajOEQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5535&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow vulnerability was found in some affected packages of Vim. This flaw allows an attacker to send a specially crafted file that could lead to a complete system compromise when opened by a victim.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5535 https://bugzilla.redhat.com/show_bug.cgi?id=2244101 https://www.cve.org/CVERecord?id=CVE-2023-5535 https://nvd.nist.gov/vuln/detail/CVE-2023-5535 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5535.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dT4TBdsMnRpAlGfPboRcFg==&#34;: {&#xA;      &#34;id&#34;: &#34;dT4TBdsMnRpAlGfPboRcFg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34158&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the go/build/constraint package of the Golang standard library. Calling Parse on a \&#34;// +build\&#34; build tag line with deeply nested expressions can cause a panic due to stack exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34158 https://bugzilla.redhat.com/show_bug.cgi?id=2310529 https://www.cve.org/CVERecord?id=CVE-2024-34158 https://nvd.nist.gov/vuln/detail/CVE-2024-34158 https://go.dev/cl/611240 https://go.dev/issue/69141 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3107 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34158.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dWdVOD7SorvI9CNble8XGw==&#34;: {&#xA;      &#34;id&#34;: &#34;dWdVOD7SorvI9CNble8XGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-46835&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the git GUI package. When a user clones an untrusted repository and edits a file located in a maliciously named directory, git GUI may end up creating or overwriting arbitrary files for the running user has written permission. This flaw allows an attacker to modify the content of target files without the affected user&#39;s intent, resulting in a data integrity issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T15:09:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-46835 https://bugzilla.redhat.com/show_bug.cgi?id=2379326 https://www.cve.org/CVERecord?id=CVE-2025-46835 https://nvd.nist.gov/vuln/detail/CVE-2025-46835 https://github.com/j6t/git-gui/compare/dcda716dbc9c90bcac4611bd1076747671ee0906..a437f5bc93330a70b42a230e52f3bd036ca1b1da https://github.com/j6t/git-gui/security/advisories/GHSA-xfx7-68v4-v8fg https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-46835.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dWyG19OuEG5lNCJXvpjTag==&#34;: {&#xA;      &#34;id&#34;: &#34;dWyG19OuEG5lNCJXvpjTag==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15367&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the poplib module in the Python standard library. The poplib module does not reject control characters, such as newlines, in user-controlled input passed to POP3 commands. This issue allows an attacker to inject additional commands to be executed in the POP3 server.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:47:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15367 https://bugzilla.redhat.com/show_bug.cgi?id=2431373 https://www.cve.org/CVERecord?id=CVE-2025-15367 https://nvd.nist.gov/vuln/detail/CVE-2025-15367 https://github.com/python/cpython/issues/143923 https://github.com/python/cpython/pull/143924 https://mail.python.org/archives/list/security-announce@python.org/thread/CBFBOWVGGUJFSGITQCCBZS4GEYYZ7ZNE/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15367.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dXgWtIQra5a7FOM/lmTQMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dXgWtIQra5a7FOM/lmTQMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-35252&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability found in curl. This security flaw happens when curl is used to retrieve and parse cookies from an HTTP(S) server, where it accepts cookies using control codes (byte values below 32), and also when cookies that contain such control codes are later sent back to an HTTP(S) server, possibly causing the server to return a 400 response. This issue effectively allows a \&#34;sister site\&#34; to deny service to siblings and cause a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-35252 https://bugzilla.redhat.com/show_bug.cgi?id=2120718 https://www.cve.org/CVERecord?id=CVE-2022-35252 https://nvd.nist.gov/vuln/detail/CVE-2022-35252 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-35252.json https://access.redhat.com/errata/RHSA-2023:2478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dZ7ryQ0b1w50+eNxXX/Jcg==&#34;: {&#xA;      &#34;id&#34;: &#34;dZ7ryQ0b1w50+eNxXX/Jcg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json https://access.redhat.com/errata/RHSA-2026:13677&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dZdW43K/PTswO8gz0zCkYQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dZdW43K/PTswO8gz0zCkYQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1525&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \&#34;Content-Length\&#34; and \&#34;content-length\&#34;). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T19:56:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1525 https://bugzilla.redhat.com/show_bug.cgi?id=2447144 https://www.cve.org/CVERecord?id=CVE-2026-1525 https://nvd.nist.gov/vuln/detail/CVE-2026-1525 https://cna.openjsf.org/security-advisories.html https://cwe.mitre.org/data/definitions/444.html https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm https://hackerone.com/reports/3556037 https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1525.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dc0xpXbQDi3upLAUXz65ZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dc0xpXbQDi3upLAUXz65ZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55132&#34;,&#xA;      &#34;description&#34;: &#34;A file access flaw has been discovered in NodeJS. A file&#39;s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55132 https://bugzilla.redhat.com/show_bug.cgi?id=2431338 https://www.cve.org/CVERecord?id=CVE-2025-55132 https://nvd.nist.gov/vuln/detail/CVE-2025-55132 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55132.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dcH4AHY4X+K0bO3O9nqJrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dcH4AHY4X+K0bO3O9nqJrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69652&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted ELF binary file containing malformed DWARF abbrev or debug information with the readelf program using the -w abbrev command line option can trigger an abort, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69652 https://bugzilla.redhat.com/show_bug.cgi?id=2445296 https://www.cve.org/CVERecord?id=CVE-2025-69652 https://nvd.nist.gov/vuln/detail/CVE-2025-69652 https://sourceware.org/bugzilla/show_bug.cgi?id=33701 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=44b79abd0fa12e7947252eb4c6e5d16ed6033e01 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69652.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dd3EQsCq/udXJ3yVefT72Q==&#34;: {&#xA;      &#34;id&#34;: &#34;dd3EQsCq/udXJ3yVefT72Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21716&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. An incomplete security fix allows code operating under restricted file system write permissions to bypass these limitations. This vulnerability enables the modification of file permissions and ownership on already-open files, even when explicit write access is denied. Such a bypass could lead to unauthorized changes to system files.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21716 https://bugzilla.redhat.com/show_bug.cgi?id=2453157 https://www.cve.org/CVERecord?id=CVE-2026-21716 https://nvd.nist.gov/vuln/detail/CVE-2026-21716 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21716.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;de6Wm8GcUOvZ/vqX7ogEtQ==&#34;: {&#xA;      &#34;id&#34;: &#34;de6Wm8GcUOvZ/vqX7ogEtQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3903&#34;,&#xA;      &#34;description&#34;: &#34;vim is vulnerable to Heap-based Buffer Overflow&#34;,&#xA;      &#34;issued&#34;: &#34;2021-10-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3903 https://bugzilla.redhat.com/show_bug.cgi?id=2018558 https://www.cve.org/CVERecord?id=CVE-2021-3903 https://nvd.nist.gov/vuln/detail/CVE-2021-3903 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3903.json https://access.redhat.com/errata/RHSA-2024:9405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-21.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dgb3Uq6TqRF91f0NcIu0Uw==&#34;: {&#xA;      &#34;id&#34;: &#34;dgb3Uq6TqRF91f0NcIu0Uw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6100&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s decompression modules, including `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile`. This vulnerability, a use-after-free, can occur if a program attempts to re-use a decompression object after a memory allocation error, especially when the system is experiencing high memory usage. Exploitation of this flaw could potentially allow an attacker to execute arbitrary code or access sensitive data. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T17:15:47Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6100 https://bugzilla.redhat.com/show_bug.cgi?id=2457932 https://www.cve.org/CVERecord?id=CVE-2026-6100 https://nvd.nist.gov/vuln/detail/CVE-2026-6100 https://github.com/python/cpython/commit/6a5f79c8d7bbf22b083b240910c7a8781a59437d https://github.com/python/cpython/commit/8fc66aef6d7b3ae58f43f5c66f9366cc8cbbfcd2 https://github.com/python/cpython/commit/c3cf71c3366fe49acb776a639405c0eea6169c20 https://github.com/python/cpython/issues/148395 https://github.com/python/cpython/pull/148396 https://mail.python.org/archives/list/security-announce@python.org/thread/HTWB2Z6KT5QQX4RYEZAFININDHNOSIF3/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6100.json https://access.redhat.com/errata/RHSA-2026:10949&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dgwlwyboh6/BQfJsyoE8Eg==&#34;: {&#xA;      &#34;id&#34;: &#34;dgwlwyboh6/BQfJsyoE8Eg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23166&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, specifically in the C++ method SignTraits::DeriveBits(). This vulnerability can allow a remote attacker to crash the Node.js runtime via untrusted input, triggering an exception in a background thread.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23166 https://bugzilla.redhat.com/show_bug.cgi?id=2367163 https://www.cve.org/CVERecord?id=CVE-2025-23166 https://nvd.nist.gov/vuln/detail/CVE-2025-23166 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23166.json https://access.redhat.com/errata/RHSA-2025:8468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.19.2-1.module+el9.6.0+23146+be9976bd&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dhk9SR7XgMlUT1SwbOzs0A==&#34;: {&#xA;      &#34;id&#34;: &#34;dhk9SR7XgMlUT1SwbOzs0A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30581&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been discovered in Node.js,  where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30581 https://bugzilla.redhat.com/show_bug.cgi?id=2219824 https://www.cve.org/CVERecord?id=CVE-2023-30581 https://nvd.nist.gov/vuln/detail/CVE-2023-30581 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30581.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;djVJ3xutTQUXY8g8Nh3rxg==&#34;: {&#xA;      &#34;id&#34;: &#34;djVJ3xutTQUXY8g8Nh3rxg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json https://access.redhat.com/errata/RHSA-2026:13677&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dkGOl+YKkRksmyjmvQ3FsA==&#34;: {&#xA;      &#34;id&#34;: &#34;dkGOl+YKkRksmyjmvQ3FsA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3446&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security flaw occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3446 https://bugzilla.redhat.com/show_bug.cgi?id=2224962 https://www.cve.org/CVERecord?id=CVE-2023-3446 https://nvd.nist.gov/vuln/detail/CVE-2023-3446 https://www.openssl.org/news/secadv/20230719.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3446.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dkVrajFcsmFenGJa2HiWQg==&#34;: {&#xA;      &#34;id&#34;: &#34;dkVrajFcsmFenGJa2HiWQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json https://access.redhat.com/errata/RHSA-2026:13677&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dkvelc7KXIcNmlVEKWwOSg==&#34;: {&#xA;      &#34;id&#34;: &#34;dkvelc7KXIcNmlVEKWwOSg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39975&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in MIT krb5, where an authenticated attacker can cause a KDC to free the same pointer twice if it can induce a failure in authorization data handling.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39975 https://bugzilla.redhat.com/show_bug.cgi?id=2232682 https://www.cve.org/CVERecord?id=CVE-2023-39975 https://nvd.nist.gov/vuln/detail/CVE-2023-39975 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39975.json https://access.redhat.com/errata/RHSA-2023:6699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dpCbBO9jgzvekz9nKJpSRA==&#34;: {&#xA;      &#34;id&#34;: &#34;dpCbBO9jgzvekz9nKJpSRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30588&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30588 https://bugzilla.redhat.com/show_bug.cgi?id=2219838 https://www.cve.org/CVERecord?id=CVE-2023-30588 https://nvd.nist.gov/vuln/detail/CVE-2023-30588 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30588.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dqYoyBWLAQszVE/IX85oqg==&#34;: {&#xA;      &#34;id&#34;: &#34;dqYoyBWLAQszVE/IX85oqg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27533&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27533 https://bugzilla.redhat.com/show_bug.cgi?id=2179062 https://www.cve.org/CVERecord?id=CVE-2023-27533 https://nvd.nist.gov/vuln/detail/CVE-2023-27533 https://curl.se/docs/CVE-2023-27533.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27533.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dr+z30s3mVMvpF2iMBJ7YA==&#34;: {&#xA;      &#34;id&#34;: &#34;dr+z30s3mVMvpF2iMBJ7YA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-24928&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a stack-based buffer overflow via DTD validation of an untrusted document or untrusted DTD.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-24928 https://bugzilla.redhat.com/show_bug.cgi?id=2346421 https://www.cve.org/CVERecord?id=CVE-2025-24928 https://nvd.nist.gov/vuln/detail/CVE-2025-24928 https://gitlab.gnome.org/GNOME/libxml2/-/issues/847 https://issues.oss-fuzz.com/issues/392687022 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-24928.json https://access.redhat.com/errata/RHSA-2025:2679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_5.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dtQx2uUyC6Kj72i0o1bELQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dtQx2uUyC6Kj72i0o1bELQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35414&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability arises from the incorrect handling of the authorized_keys principals option in uncommon scenarios. Specifically, when a principals list is used with a Certificate Authority that includes comma characters, OpenSSH may misinterpret the input. This could lead to security bypasses, potentially allowing unintended access or information disclosure in specific authentication contexts.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T17:08:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35414 https://bugzilla.redhat.com/show_bug.cgi?id=2454490 https://www.cve.org/CVERecord?id=CVE-2026-35414 https://nvd.nist.gov/vuln/detail/CVE-2026-35414 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35414.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;du8AOXnNlQgdqsSZceyiaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;du8AOXnNlQgdqsSZceyiaQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24790&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Go language standard library net/netip. The method Is*() (IsPrivate(), IsPublic(), etc) doesn&#39;t behave properly when working with IPv6 mapped to IPv4 addresses. The unexpected behavior can lead to integrity and confidentiality issues, specifically when these methods are used to control access to resources or data.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24790 https://bugzilla.redhat.com/show_bug.cgi?id=2292787 https://www.cve.org/CVERecord?id=CVE-2024-24790 https://nvd.nist.gov/vuln/detail/CVE-2024-24790 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24790.json https://access.redhat.com/errata/RHSA-2024:4212&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.11-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dwNH2KaulTKNFX+9quNpvw==&#34;: {&#xA;      &#34;id&#34;: &#34;dwNH2KaulTKNFX+9quNpvw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35937&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35937 https://bugzilla.redhat.com/show_bug.cgi?id=1964125 https://www.cve.org/CVERecord?id=CVE-2021-35937 https://nvd.nist.gov/vuln/detail/CVE-2021-35937 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35937.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;dxRzT6G0UObuWf8SWujnng==&#34;: {&#xA;      &#34;id&#34;: &#34;dxRzT6G0UObuWf8SWujnng==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45289&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s net/http/cookiejar standard library package. When following an HTTP redirect to a domain that is not a subdomain match or an exact match of the initial domain, an http.Client does not forward sensitive headers such as \&#34;Authorization\&#34; or \&#34;Cookie\&#34;. For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45289 https://bugzilla.redhat.com/show_bug.cgi?id=2268018 https://www.cve.org/CVERecord?id=CVE-2023-45289 https://nvd.nist.gov/vuln/detail/CVE-2023-45289 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45289.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;e+8uKOviBSOTR4ltKl/Y5Q==&#34;: {&#xA;      &#34;id&#34;: &#34;e+8uKOviBSOTR4ltKl/Y5Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;e+z5vuxLZ95xajn1dSffxw==&#34;: {&#xA;      &#34;id&#34;: &#34;e+z5vuxLZ95xajn1dSffxw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59466&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in Node.js error handling where \&#34;Maximum call stack size exceeded\&#34; errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(&#39;uncaughtException&#39;)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59466 https://bugzilla.redhat.com/show_bug.cgi?id=2431343 https://www.cve.org/CVERecord?id=CVE-2025-59466 https://nvd.nist.gov/vuln/detail/CVE-2025-59466 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59466.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;: {&#xA;      &#34;id&#34;: &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;e/bnYsWq3UNe4TO8qzzb8A==&#34;: {&#xA;      &#34;id&#34;: &#34;e/bnYsWq3UNe4TO8qzzb8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-47010&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in binutils in the pr_function_type function. This flaw allows an attacker to use a set of steps to trigger a memory leak and perform a denial of service, resulting in a loss of the system&#39;s availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-47010 https://bugzilla.redhat.com/show_bug.cgi?id=2233988 https://www.cve.org/CVERecord?id=CVE-2022-47010 https://nvd.nist.gov/vuln/detail/CVE-2022-47010 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47010.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27456&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. When an /etc/fstab entry is configured with the user,loop options, the `mount` program checks the file path with user permissions but later opens it with root privileges. This creates a brief Time-of-Check-Time-of-Use (TOCTOU) window where an attacker can substitute the intended file with a malicious symbolic link. This allows a local unprivileged user to mount any root-owned file or block device that contains a valid filesystem, gaining full read access to its contents.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:23:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27456 https://bugzilla.redhat.com/show_bug.cgi?id=2454956 https://www.cve.org/CVERecord?id=CVE-2026-27456 https://nvd.nist.gov/vuln/detail/CVE-2026-27456 https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4 https://github.com/util-linux/util-linux/releases/tag/v2.41.4 https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27456.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;e0VfCD1REapdkagkByCnXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;e0VfCD1REapdkagkByCnXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3360&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3360 https://bugzilla.redhat.com/show_bug.cgi?id=2357754 https://www.cve.org/CVERecord?id=CVE-2025-3360 https://nvd.nist.gov/vuln/detail/CVE-2025-3360 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3360.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;e1tWGyUIVU1QafO75am9CA==&#34;: {&#xA;      &#34;id&#34;: &#34;e1tWGyUIVU1QafO75am9CA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64756&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glob. This vulnerability allows arbitrary command execution via processing files with malicious names when the glob command-line interface (CLI) is used with the -c/--cmd option, enabling shell metacharacters to trigger command injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-17T17:29:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64756 https://bugzilla.redhat.com/show_bug.cgi?id=2415451 https://www.cve.org/CVERecord?id=CVE-2025-64756 https://nvd.nist.gov/vuln/detail/CVE-2025-64756 https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146 https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64756.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;e2U3+rnCE0yJbEhq/B49zQ==&#34;: {&#xA;      &#34;id&#34;: &#34;e2U3+rnCE0yJbEhq/B49zQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27982&#34;,&#xA;      &#34;description&#34;: &#34;An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27982 https://bugzilla.redhat.com/show_bug.cgi?id=2275392 https://www.cve.org/CVERecord?id=CVE-2024-27982 https://nvd.nist.gov/vuln/detail/CVE-2024-27982 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27982.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;e37CxvNgywelF2ouwzqL2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;e37CxvNgywelF2ouwzqL2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22025&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22025 https://bugzilla.redhat.com/show_bug.cgi?id=2270559 https://www.cve.org/CVERecord?id=CVE-2024-22025 https://nvd.nist.gov/vuln/detail/CVE-2024-22025 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22025.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;e3z/W9uylzA9XCJCS6Je3A==&#34;: {&#xA;      &#34;id&#34;: &#34;e3z/W9uylzA9XCJCS6Je3A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6176&#34;,&#xA;      &#34;description&#34;: &#34;Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-31T00:00:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6176 https://bugzilla.redhat.com/show_bug.cgi?id=2408762 https://www.cve.org/CVERecord?id=CVE-2025-6176 https://nvd.nist.gov/vuln/detail/CVE-2025-6176 https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6176.json https://access.redhat.com/errata/RHSA-2026:2042&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;brotli&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.0.9-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;e5qPgcasC/ZE1MEWSxEewQ==&#34;: {&#xA;      &#34;id&#34;: &#34;e5qPgcasC/ZE1MEWSxEewQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12133&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12133 https://bugzilla.redhat.com/show_bug.cgi?id=2344611 https://www.cve.org/CVERecord?id=CVE-2024-12133 https://nvd.nist.gov/vuln/detail/CVE-2024-12133 https://gitlab.com/gnutls/libtasn1/-/blob/master/doc/security/CVE-2024-12133.md https://gitlab.com/gnutls/libtasn1/-/issues/52 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12133.json https://access.redhat.com/errata/RHSA-2025:7077&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;e67z2nzRKHIRzFxg25zTcA==&#34;: {&#xA;      &#34;id&#34;: &#34;e67z2nzRKHIRzFxg25zTcA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59465&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been discovered in NodeJS. A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59465 https://bugzilla.redhat.com/show_bug.cgi?id=2431349 https://www.cve.org/CVERecord?id=CVE-2025-59465 https://nvd.nist.gov/vuln/detail/CVE-2025-59465 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59465.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;e7h3lwyDkLbzwbeza9/TWw==&#34;: {&#xA;      &#34;id&#34;: &#34;e7h3lwyDkLbzwbeza9/TWw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4293&#34;,&#xA;      &#34;description&#34;: &#34;A floating point exception flaw was found in Vim&#39;s num_divide() function of the eval.c file. This issue occurs when dividing the largest negative number by -1. This could allow an attacker to trick a user into opening a specially crafted file, triggering an application to crash and leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4293 https://bugzilla.redhat.com/show_bug.cgi?id=2151566 https://www.cve.org/CVERecord?id=CVE-2022-4293 https://nvd.nist.gov/vuln/detail/CVE-2022-4293 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4293.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;e8Ba4iAzVtDvrookiM9XAg==&#34;: {&#xA;      &#34;id&#34;: &#34;e8Ba4iAzVtDvrookiM9XAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32665&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32665 https://bugzilla.redhat.com/show_bug.cgi?id=2211827 https://www.cve.org/CVERecord?id=CVE-2023-32665 https://nvd.nist.gov/vuln/detail/CVE-2023-32665 https://gitlab.gnome.org/GNOME/glib/-/issues/2121 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32665.json https://access.redhat.com/errata/RHSA-2023:6631&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;e91QDoc1m7i0h9Urg1XIuQ==&#34;: {&#xA;      &#34;id&#34;: &#34;e91QDoc1m7i0h9Urg1XIuQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39319&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of \&#34;\u003cscript\&#34;, \&#34;\u003c!--\&#34;, and \&#34;\u003c/script\&#34; within JS literals in \u003cscript\u003e contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39319 https://bugzilla.redhat.com/show_bug.cgi?id=2237773 https://www.cve.org/CVERecord?id=CVE-2023-39319 https://nvd.nist.gov/vuln/detail/CVE-2023-39319 https://go.dev/cl/526157 https://go.dev/issue/62197 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2043.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39319.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eDxAdI0cgddAZnBSd4FI0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;eDxAdI0cgddAZnBSd4FI0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libstdc++&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eERb0a2u5NJoo8XHmwI23A==&#34;: {&#xA;      &#34;id&#34;: &#34;eERb0a2u5NJoo8XHmwI23A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-subs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.03-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eFT7gARF6nhlfhMNp4LgNA==&#34;: {&#xA;      &#34;id&#34;: &#34;eFT7gARF6nhlfhMNp4LgNA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69645&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils, specifically in the `objdump` utility. A local attacker can exploit this vulnerability by providing a specially crafted binary file containing malformed DWARF (Debugging With Attributed Record Formats) debug information. This can lead to a logic error during the processing of DWARF compilation units, causing the `objdump` utility to crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69645 https://bugzilla.redhat.com/show_bug.cgi?id=2445261 https://www.cve.org/CVERecord?id=CVE-2025-69645 https://nvd.nist.gov/vuln/detail/CVE-2025-69645 https://sourceware.org/bugzilla/show_bug.cgi?id=33637 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cdb728d4da6184631989b192f1022c219dea7677 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69645.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eKKwwoH894W3Vae5kYCKtA==&#34;: {&#xA;      &#34;id&#34;: &#34;eKKwwoH894W3Vae5kYCKtA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-56171&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a use-after-free via a crafted XML document validated against an XML schema with certain identity constraints or a crafted XML schema.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-56171 https://bugzilla.redhat.com/show_bug.cgi?id=2346416 https://www.cve.org/CVERecord?id=CVE-2024-56171 https://nvd.nist.gov/vuln/detail/CVE-2024-56171 https://gitlab.gnome.org/GNOME/libxml2/-/issues/828 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-56171.json https://access.redhat.com/errata/RHSA-2025:2679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_5.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eKvGCJDf1Iytf5g2d8kaFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;eKvGCJDf1Iytf5g2d8kaFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eMVMlNYLRzjk+Xt/peAYqg==&#34;: {&#xA;      &#34;id&#34;: &#34;eMVMlNYLRzjk+Xt/peAYqg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eNUwUuL3W5wSpnxJfClXhg==&#34;: {&#xA;      &#34;id&#34;: &#34;eNUwUuL3W5wSpnxJfClXhg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27043&#34;,&#xA;      &#34;description&#34;: &#34;The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27043 https://bugzilla.redhat.com/show_bug.cgi?id=2196183 https://www.cve.org/CVERecord?id=CVE-2023-27043 https://nvd.nist.gov/vuln/detail/CVE-2023-27043 https://access.redhat.com/articles/7051467 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27043.json https://access.redhat.com/errata/RHSA-2024:0466&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-1.el9_3.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eOOfcRLf3CHL5spaYEPovQ==&#34;: {&#xA;      &#34;id&#34;: &#34;eOOfcRLf3CHL5spaYEPovQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eT0Z6G4b2zSUUUSLlyL8Tg==&#34;: {&#xA;      &#34;id&#34;: &#34;eT0Z6G4b2zSUUUSLlyL8Tg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4285&#34;,&#xA;      &#34;description&#34;: &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4285 https://bugzilla.redhat.com/show_bug.cgi?id=2150768 https://www.cve.org/CVERecord?id=CVE-2022-4285 https://nvd.nist.gov/vuln/detail/CVE-2022-4285 https://sourceware.org/bugzilla/show_bug.cgi?id=29699 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5c831a3c7f3ca98d6aba1200353311e1a1f84c70 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4285.json https://access.redhat.com/errata/RHSA-2023:6593&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils-gold&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.35.2-42.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eTM7aUBt48fzJjd2YY1Kaw==&#34;: {&#xA;      &#34;id&#34;: &#34;eTM7aUBt48fzJjd2YY1Kaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35938&#34;,&#xA;      &#34;description&#34;: &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35938 https://bugzilla.redhat.com/show_bug.cgi?id=1964114 https://www.cve.org/CVERecord?id=CVE-2021-35938 https://nvd.nist.gov/vuln/detail/CVE-2021-35938 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35938.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;: {&#xA;      &#34;id&#34;: &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eUkddiaCaFnfKmT+Sa6bPg==&#34;: {&#xA;      &#34;id&#34;: &#34;eUkddiaCaFnfKmT+Sa6bPg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eXNCnm2O3ulyDBrjgqgngA==&#34;: {&#xA;      &#34;id&#34;: &#34;eXNCnm2O3ulyDBrjgqgngA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52533&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Glib library. A buffer overflow condition can be triggered in certain conditions due to an off-by-one error in SOCKS4_CONN_MSG_LEN. This issue may lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52533 https://bugzilla.redhat.com/show_bug.cgi?id=2325340 https://www.cve.org/CVERecord?id=CVE-2024-52533 https://nvd.nist.gov/vuln/detail/CVE-2024-52533 https://gitlab.gnome.org/GNOME/glib/-/issues/3461 https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1 https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52533.json https://access.redhat.com/errata/RHSA-2025:11140&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-16.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eZ2tz3j+u7GWuS6rb2RB7g==&#34;: {&#xA;      &#34;id&#34;: &#34;eZ2tz3j+u7GWuS6rb2RB7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27982&#34;,&#xA;      &#34;description&#34;: &#34;An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27982 https://bugzilla.redhat.com/show_bug.cgi?id=2275392 https://www.cve.org/CVERecord?id=CVE-2024-27982 https://nvd.nist.gov/vuln/detail/CVE-2024-27982 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27982.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eZDuJI6jaohxUM7fcdYEYA==&#34;: {&#xA;      &#34;id&#34;: &#34;eZDuJI6jaohxUM7fcdYEYA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eaW+XnaOzUpP/JmOZv+wCg==&#34;: {&#xA;      &#34;id&#34;: &#34;eaW+XnaOzUpP/JmOZv+wCg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-26965&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free vulnerability was found in LibTIFF&#39;s tiffcrop utility in the loadImage() function. This flaw allows an attacker to pass a crafted TIFF image file to the tiffcrop utility, which causes an out-of-bounds write access, resulting in an application crash, eventually leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-26965 https://bugzilla.redhat.com/show_bug.cgi?id=2215206 https://www.cve.org/CVERecord?id=CVE-2023-26965 https://nvd.nist.gov/vuln/detail/CVE-2023-26965 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-26965.json https://access.redhat.com/errata/RHSA-2023:6575&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ecYseAb1rFmqPx4kHRWeQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ecYseAb1rFmqPx4kHRWeQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;edf9qrl//4hhbTQ8nlVN7g==&#34;: {&#xA;      &#34;id&#34;: &#34;edf9qrl//4hhbTQ8nlVN7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eeetX6Vv3iXNMfmjNIPkQg==&#34;: {&#xA;      &#34;id&#34;: &#34;eeetX6Vv3iXNMfmjNIPkQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8176&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtiff. The `get_histogram` function in `file/tiffmedian.c` exhibits a use-after-free condition when processing a specially crafted file, allowing a local attacker to trigger memory corruption. This manipulation results in a use-after-free vulnerability, and can lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-26T03:32:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8176 https://bugzilla.redhat.com/show_bug.cgi?id=2383598 https://www.cve.org/CVERecord?id=CVE-2025-8176 https://nvd.nist.gov/vuln/detail/CVE-2025-8176 http://www.libtiff.org/ https://gitlab.com/libtiff/libtiff/-/commit/fe10872e53efba9cc36c66ac4ab3b41a839d5172 https://gitlab.com/libtiff/libtiff/-/issues/707 https://gitlab.com/libtiff/libtiff/-/merge_requests/727 https://vuldb.com/?ctiid.317590 https://vuldb.com/?id.317590 https://vuldb.com/?submit.621796 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8176.json https://access.redhat.com/errata/RHSA-2025:20956&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-15.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eejojwYHRaSarkdAMLD2OA==&#34;: {&#xA;      &#34;id&#34;: &#34;eejojwYHRaSarkdAMLD2OA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31130&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs in the ares_inet_net_pton() function, which is vulnerable to a buffer underflow for certain ipv6 addresses. \&#34;0::00:00:00/2\&#34; in particular was found to cause an issue. C-ares only uses this function internally for configuration purposes, which would require an administrator to configure such an address via ares_set_sortlist().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31130 https://bugzilla.redhat.com/show_bug.cgi?id=2209497 https://www.cve.org/CVERecord?id=CVE-2023-31130 https://nvd.nist.gov/vuln/detail/CVE-2023-31130 https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31130.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eekbTUpqIafepE8Hfmhn6g==&#34;: {&#xA;      &#34;id&#34;: &#34;eekbTUpqIafepE8Hfmhn6g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-4187&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim. A possible use after free vulnerability could allow an attacker to input a specially crafted file leading to a crash or code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-12-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-4187 https://bugzilla.redhat.com/show_bug.cgi?id=2036129 https://www.cve.org/CVERecord?id=CVE-2021-4187 https://nvd.nist.gov/vuln/detail/CVE-2021-4187 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-4187.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;effBIHrddz1MPHYj0XdN+A==&#34;: {&#xA;      &#34;id&#34;: &#34;effBIHrddz1MPHYj0XdN+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eh1RT9v3ol1cjACTvuohFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;eh1RT9v3ol1cjACTvuohFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22018&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js package. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files they do not have explicit read access to.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22018 https://bugzilla.redhat.com/show_bug.cgi?id=2296990 https://www.cve.org/CVERecord?id=CVE-2024-22018 https://nvd.nist.gov/vuln/detail/CVE-2024-22018 https://hackerone.com/reports/2145862 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22018.json https://access.redhat.com/errata/RHSA-2024:5815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eh73UwgswuQUUBPGmZNxLg==&#34;: {&#xA;      &#34;id&#34;: &#34;eh73UwgswuQUUBPGmZNxLg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32067&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32067 https://bugzilla.redhat.com/show_bug.cgi?id=2209502 https://www.cve.org/CVERecord?id=CVE-2023-32067 https://nvd.nist.gov/vuln/detail/CVE-2023-32067 https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32067.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eiMh0pZiJlWSr3FHHfVKhg==&#34;: {&#xA;      &#34;id&#34;: &#34;eiMh0pZiJlWSr3FHHfVKhg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11083&#34;,&#xA;      &#34;description&#34;: &#34;A head based buffer overflow flaw has been discovered in GNU bin utilities. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-27T23:02:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11083 https://bugzilla.redhat.com/show_bug.cgi?id=2399948 https://www.cve.org/CVERecord?id=CVE-2025-11083 https://nvd.nist.gov/vuln/detail/CVE-2025-11083 https://sourceware.org/bugzilla/attachment.cgi?id=16353 https://sourceware.org/bugzilla/show_bug.cgi?id=33457 https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490 https://vuldb.com/?ctiid.326124 https://vuldb.com/?id.326124 https://vuldb.com/?submit.661277 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11083.json https://access.redhat.com/errata/RHSA-2025:23343&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils-gold&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.35.2-67.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ekipReKDch8nQkv6wLHVww==&#34;: {&#xA;      &#34;id&#34;: &#34;ekipReKDch8nQkv6wLHVww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23165&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ReadFileUtf8 internal binding of Node.js. This vulnerability can allow an attacker to cause an application denial of service via repeated file read operations that trigger an unrecoverable memory leak due to a corrupted pointer in the underlying file system binding.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23165 https://bugzilla.redhat.com/show_bug.cgi?id=2367162 https://www.cve.org/CVERecord?id=CVE-2025-23165 https://nvd.nist.gov/vuln/detail/CVE-2025-23165 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23165.json https://access.redhat.com/errata/RHSA-2025:8467&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.16.0-1.module+el9.6.0+23151+b1496e9d&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eoZiXVXIYF5HZwY9O+NvfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;eoZiXVXIYF5HZwY9O+NvfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;eqZVUGTs5pHRR/tV2jQA/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;eqZVUGTs5pHRR/tV2jQA/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;esWNnTXfVcQMP31EwLadpw==&#34;: {&#xA;      &#34;id&#34;: &#34;esWNnTXfVcQMP31EwLadpw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25629&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25629 https://bugzilla.redhat.com/show_bug.cgi?id=2265713 https://www.cve.org/CVERecord?id=CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629 https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25629.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ewA3f3GyFBJhwPX+CvDYtg==&#34;: {&#xA;      &#34;id&#34;: &#34;ewA3f3GyFBJhwPX+CvDYtg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ezIkXhK2r/dRH2KmSwBPeA==&#34;: {&#xA;      &#34;id&#34;: &#34;ezIkXhK2r/dRH2KmSwBPeA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55130&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55130 https://bugzilla.redhat.com/show_bug.cgi?id=2431352 https://www.cve.org/CVERecord?id=CVE-2025-55130 https://nvd.nist.gov/vuln/detail/CVE-2025-55130 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55130.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ezX9kOOahP0wfe4oJbRg6A==&#34;: {&#xA;      &#34;id&#34;: &#34;ezX9kOOahP0wfe4oJbRg6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61985&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH where the SSH client accepted \\0 (null) characters in ssh:// URIs. When a ProxyCommand is configured, these characters could alter how the command is parsed, potentially leading to code execution depending on how the proxy is set up.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61985 https://bugzilla.redhat.com/show_bug.cgi?id=2401962 https://www.cve.org/CVERecord?id=CVE-2025-61985 https://nvd.nist.gov/vuln/detail/CVE-2025-61985 https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2 https://www.openssh.com/releasenotes.html#10.1p1 https://www.openwall.com/lists/oss-security/2025/10/06/1 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61985.json https://access.redhat.com/errata/RHSA-2025:23480&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-47.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;f+wdQFOhBCEFYs6UTbgVcw==&#34;: {&#xA;      &#34;id&#34;: &#34;f+wdQFOhBCEFYs6UTbgVcw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5678&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL, which caused the generation or checking of long X9.42 DH keys or parameters to be much slower than expected. This issue could lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5678 https://bugzilla.redhat.com/show_bug.cgi?id=2248616 https://www.cve.org/CVERecord?id=CVE-2023-5678 https://nvd.nist.gov/vuln/detail/CVE-2023-5678 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6 https://www.openssl.org/news/secadv/20231106.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5678.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;f5rDGDIgGLk7iLvtlKjm1w==&#34;: {&#xA;      &#34;id&#34;: &#34;f5rDGDIgGLk7iLvtlKjm1w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;f6S0OqBhSEfNFL2mdF01Og==&#34;: {&#xA;      &#34;id&#34;: &#34;f6S0OqBhSEfNFL2mdF01Og==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25679&#34;,&#xA;      &#34;description&#34;: &#34;The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:28:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25679 https://bugzilla.redhat.com/show_bug.cgi?id=2445356 https://www.cve.org/CVERecord?id=CVE-2026-25679 https://nvd.nist.gov/vuln/detail/CVE-2026-25679 https://go.dev/cl/752180 https://go.dev/issue/77578 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://pkg.go.dev/vuln/GO-2026-4601 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25679.json https://access.redhat.com/errata/RHSA-2026:5942&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.8-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;f6muqKqBGKMbn75htgvMLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;f6muqKqBGKMbn75htgvMLQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-50602&#34;,&#xA;      &#34;description&#34;: &#34;A security issue was found in Expat (libexpat). A crash can be triggered in the XML_ResumeParser function due to XML_StopParser&#39;s ability to stop or suspend an unstarted parser, which can lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-10-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-50602 https://bugzilla.redhat.com/show_bug.cgi?id=2321987 https://www.cve.org/CVERecord?id=CVE-2024-50602 https://nvd.nist.gov/vuln/detail/CVE-2024-50602 https://github.com/libexpat/libexpat/pull/915 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-50602.json https://access.redhat.com/errata/RHSA-2024:9541&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-3.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;f6oGdnhZomBa/bs3snB3kA==&#34;: {&#xA;      &#34;id&#34;: &#34;f6oGdnhZomBa/bs3snB3kA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-09T14:26:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14831 https://bugzilla.redhat.com/show_bug.cgi?id=2423177 https://www.cve.org/CVERecord?id=CVE-2025-14831 https://nvd.nist.gov/vuln/detail/CVE-2025-14831 https://gitlab.com/gnutls/gnutls/-/issues/1773 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14831.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;f8I+U+fazHHULdzT2Vp7cA==&#34;: {&#xA;      &#34;id&#34;: &#34;f8I+U+fazHHULdzT2Vp7cA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21713&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The HMAC (Hash-based Message Authentication Code) verification process uses a comparison method that does not take a constant amount of time. This non-constant-time comparison can leak timing information, which, under specific conditions where precise timing measurements are possible, could be exploited by a remote attacker. This allows the attacker to infer sensitive HMAC values, leading to information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21713 https://bugzilla.redhat.com/show_bug.cgi?id=2453160 https://www.cve.org/CVERecord?id=CVE-2026-21713 https://nvd.nist.gov/vuln/detail/CVE-2026-21713 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21713.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;f8p5x6K3g1RRQ6ZIljxpeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;f8p5x6K3g1RRQ6ZIljxpeQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability in Node.js HTTP/2 servers by sending specially crafted WINDOW_UPDATE frames on stream 0 (connection-level). These frames can cause the flow control window to exceed its maximum value, leading to a memory leak as Http2Session objects are not properly cleaned up. This can result in resource exhaustion and a Denial of Service (DoS) condition for the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21714 https://bugzilla.redhat.com/show_bug.cgi?id=2453161 https://www.cve.org/CVERecord?id=CVE-2026-21714 https://nvd.nist.gov/vuln/detail/CVE-2026-21714 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21714.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;f9AAdWBkmOO1/+acrJji3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;f9AAdWBkmOO1/+acrJji3Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12718&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython&#39;s tarfile module. This vulnerability allows modification of file metadata, such as timestamps or permissions, outside the intended extraction directory via maliciously crafted tar archives using the filter=\&#34;data\&#34; or filter=\&#34;tar\&#34; extraction filters.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:59:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12718 https://bugzilla.redhat.com/show_bug.cgi?id=2370013 https://www.cve.org/CVERecord?id=CVE-2024-12718 https://nvd.nist.gov/vuln/detail/CVE-2024-12718 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/127987 https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12718.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fBIyxzoMf4PtxmiD953WFg==&#34;: {&#xA;      &#34;id&#34;: &#34;fBIyxzoMf4PtxmiD953WFg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-55549&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxslt. This vulnerability allows an attacker to trigger a use-after-free issue by excluding result prefixes.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-55549 https://bugzilla.redhat.com/show_bug.cgi?id=2352484 https://www.cve.org/CVERecord?id=CVE-2024-55549 https://nvd.nist.gov/vuln/detail/CVE-2024-55549 https://gitlab.gnome.org/GNOME/libxslt/-/issues/127 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-55549.json https://access.redhat.com/errata/RHSA-2025:7410&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxslt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.1.34-13.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fBicZck0jWBRn2U4JNy52w==&#34;: {&#xA;      &#34;id&#34;: &#34;fBicZck0jWBRn2U4JNy52w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.2-1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fCueh1dJqv6EGaBRtXT/Xw==&#34;: {&#xA;      &#34;id&#34;: &#34;fCueh1dJqv6EGaBRtXT/Xw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2229&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client&#39;s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:27:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2229 https://bugzilla.redhat.com/show_bug.cgi?id=2447143 https://www.cve.org/CVERecord?id=CVE-2026-2229 https://nvd.nist.gov/vuln/detail/CVE-2026-2229 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8 https://hackerone.com/reports/3487486 https://nodejs.org/api/zlib.html#class-zlibinflateraw https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2229.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fD8Z9mQCc8h27ZwElVMLmA==&#34;: {&#xA;      &#34;id&#34;: &#34;fD8Z9mQCc8h27ZwElVMLmA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-24765&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw occurs due to Git not checking the ownership of directories in a local multi-user system when running commands specified in the local repository configuration.  This allows the owner of the repository to cause arbitrary commands to be executed by other users who access the repository.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-04-12T10:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-24765 https://bugzilla.redhat.com/show_bug.cgi?id=2073414 https://www.cve.org/CVERecord?id=CVE-2022-24765 https://nvd.nist.gov/vuln/detail/CVE-2022-24765 https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-24765.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fEW9HCDGh5vauL1jhvKpFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;fEW9HCDGh5vauL1jhvKpFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27536&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. Libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, the GSS delegation setting was left out from the configuration match checks, making them match too easily, affecting krb5/kerberos/negotiate/GSSAPI transfers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27536 https://bugzilla.redhat.com/show_bug.cgi?id=2179092 https://www.cve.org/CVERecord?id=CVE-2023-27536 https://nvd.nist.gov/vuln/detail/CVE-2023-27536 https://curl.se/docs/CVE-2023-27536.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27536.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;: {&#xA;      &#34;id&#34;: &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fHxgcXxpn2MkgE/aUd2Vkw==&#34;: {&#xA;      &#34;id&#34;: &#34;fHxgcXxpn2MkgE/aUd2Vkw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-29390&#34;,&#xA;      &#34;description&#34;: &#34;A heap buffer over-read flaw was found in libjpeg-turbo. For certain types of smoothed jpeg images, the decompress_smooth_data() function may improperly enter a condition statement that leads to heap memory read of uninitialized data, which may cause an application crash or loss of confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-29390 https://bugzilla.redhat.com/show_bug.cgi?id=2235521 https://www.cve.org/CVERecord?id=CVE-2021-29390 https://nvd.nist.gov/vuln/detail/CVE-2021-29390 https://github.com/libjpeg-turbo/libjpeg-turbo/commit/ccaba5d7894ecfb5a8f11e48d3f86e1f14d5a469 https://github.com/libjpeg-turbo/libjpeg-turbo/issues/459#issuecomment-733720010 https://github.com/libjpeg-turbo/libjpeg-turbo/pull/476 https://github.com/libjpeg-turbo/libjpeg-turbo/pull/724 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-29390.json https://access.redhat.com/errata/RHSA-2024:2295&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libjpeg-turbo&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.0.90-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fI1ruEtJ325PbGUQKXuiVA==&#34;: {&#xA;      &#34;id&#34;: &#34;fI1ruEtJ325PbGUQKXuiVA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-39260&#34;,&#xA;      &#34;description&#34;: &#34;Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git&#39;s push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-39260 https://bugzilla.redhat.com/show_bug.cgi?id=2137423 https://www.cve.org/CVERecord?id=CVE-2022-39260 https://nvd.nist.gov/vuln/detail/CVE-2022-39260 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-39260.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fJ9ZvBhuvQVNdsen0XKxfw==&#34;: {&#xA;      &#34;id&#34;: &#34;fJ9ZvBhuvQVNdsen0XKxfw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21710&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21710 https://bugzilla.redhat.com/show_bug.cgi?id=2453151 https://www.cve.org/CVERecord?id=CVE-2026-21710 https://nvd.nist.gov/vuln/detail/CVE-2026-21710 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21710.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.20.2.1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fKSzg5ZVW35n1QRKSQYbUA==&#34;: {&#xA;      &#34;id&#34;: &#34;fKSzg5ZVW35n1QRKSQYbUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12085&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T15:06:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12085 https://bugzilla.redhat.com/show_bug.cgi?id=2330539 https://www.cve.org/CVERecord?id=CVE-2024-12085 https://nvd.nist.gov/vuln/detail/CVE-2024-12085 https://kb.cert.org/vuls/id/952657 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12085.json https://access.redhat.com/errata/RHSA-2025:0324&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.2.3-20.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fLX8W8dMekP7EyhcY34ZKg==&#34;: {&#xA;      &#34;id&#34;: &#34;fLX8W8dMekP7EyhcY34ZKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26996&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-20T03:05:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26996 https://bugzilla.redhat.com/show_bug.cgi?id=2441268 https://www.cve.org/CVERecord?id=CVE-2026-26996 https://nvd.nist.gov/vuln/detail/CVE-2026-26996 https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26996.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fLtdaHqvu72qO520MbPg/A==&#34;: {&#xA;      &#34;id&#34;: &#34;fLtdaHqvu72qO520MbPg/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fM+r7qYMTXMx81IJhr45YA==&#34;: {&#xA;      &#34;id&#34;: &#34;fM+r7qYMTXMx81IJhr45YA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32559&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(&#39;spawn_sync&#39;) to run arbitrary code outside of the limits defined in a policy.json file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32559 https://bugzilla.redhat.com/show_bug.cgi?id=2230956 https://www.cve.org/CVERecord?id=CVE-2023-32559 https://nvd.nist.gov/vuln/detail/CVE-2023-32559 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32559.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.17.1-1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fMAAjFKUhFra8hfsyV6M/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;fMAAjFKUhFra8hfsyV6M/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21712&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. This vulnerability allows an attacker to cause a Denial of Service (DoS) by providing a malformed Internationalized Domain Name (IDN) to the `url.format()` function. When processed, this malformed input triggers an internal error, causing the Node.js application to crash. This can disrupt services and make them unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T15:13:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21712 https://bugzilla.redhat.com/show_bug.cgi?id=2453037 https://www.cve.org/CVERecord?id=CVE-2026-21712 https://nvd.nist.gov/vuln/detail/CVE-2026-21712 https://hackerone.com/reports/3546390 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21712.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fMQ6kctftYthbGvZli2/sg==&#34;: {&#xA;      &#34;id&#34;: &#34;fMQ6kctftYthbGvZli2/sg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27043&#34;,&#xA;      &#34;description&#34;: &#34;The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27043 https://bugzilla.redhat.com/show_bug.cgi?id=2196183 https://www.cve.org/CVERecord?id=CVE-2023-27043 https://nvd.nist.gov/vuln/detail/CVE-2023-27043 https://access.redhat.com/articles/7051467 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27043.json https://access.redhat.com/errata/RHSA-2024:0466&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-1.el9_3.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fSeU4QTAs+fY+ihLpgdM9A==&#34;: {&#xA;      &#34;id&#34;: &#34;fSeU4QTAs+fY+ihLpgdM9A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1377&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU elfutils. This vulnerability allows denial of service via manipulation of the gelf_getsymshndx function in strip.c.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-17T05:00:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1377 https://bugzilla.redhat.com/show_bug.cgi?id=2346066 https://www.cve.org/CVERecord?id=CVE-2025-1377 https://nvd.nist.gov/vuln/detail/CVE-2025-1377 https://sourceware.org/bugzilla/attachment.cgi?id=15941 https://sourceware.org/bugzilla/show_bug.cgi?id=32673 https://sourceware.org/bugzilla/show_bug.cgi?id=32673#c2 https://vuldb.com/?ctiid.295985 https://vuldb.com/?id.295985 https://vuldb.com/?submit.497539 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1377.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;elfutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fT2bR3Pvvu+yOGDatxsWcw==&#34;: {&#xA;      &#34;id&#34;: &#34;fT2bR3Pvvu+yOGDatxsWcw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35938&#34;,&#xA;      &#34;description&#34;: &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35938 https://bugzilla.redhat.com/show_bug.cgi?id=1964114 https://www.cve.org/CVERecord?id=CVE-2021-35938 https://nvd.nist.gov/vuln/detail/CVE-2021-35938 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35938.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fUkL/QrHEZtoCydnxvHQYQ==&#34;: {&#xA;      &#34;id&#34;: &#34;fUkL/QrHEZtoCydnxvHQYQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23083&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js diagnostics_channel. This vulnerability allows an attacker to reinstate and misuse worker constructors, potentially bypassing the Permission Model via hooking into events when a worker thread is created.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T01:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23083 https://bugzilla.redhat.com/show_bug.cgi?id=2339392 https://www.cve.org/CVERecord?id=CVE-2025-23083 https://nvd.nist.gov/vuln/detail/CVE-2025-23083 https://nodejs.org/en/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23083.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.13.1-1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fUlz8/rwVV2PbflGdFYCdw==&#34;: {&#xA;      &#34;id&#34;: &#34;fUlz8/rwVV2PbflGdFYCdw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-26965&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free vulnerability was found in LibTIFF&#39;s tiffcrop utility in the loadImage() function. This flaw allows an attacker to pass a crafted TIFF image file to the tiffcrop utility, which causes an out-of-bounds write access, resulting in an application crash, eventually leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-26965 https://bugzilla.redhat.com/show_bug.cgi?id=2215206 https://www.cve.org/CVERecord?id=CVE-2023-26965 https://nvd.nist.gov/vuln/detail/CVE-2023-26965 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-26965.json https://access.redhat.com/errata/RHSA-2023:6575&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fVObUUKRXAwXLBcuBzgu5g==&#34;: {&#xA;      &#34;id&#34;: &#34;fVObUUKRXAwXLBcuBzgu5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59466&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in Node.js error handling where \&#34;Maximum call stack size exceeded\&#34; errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(&#39;uncaughtException&#39;)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59466 https://bugzilla.redhat.com/show_bug.cgi?id=2431343 https://www.cve.org/CVERecord?id=CVE-2025-59466 https://nvd.nist.gov/vuln/detail/CVE-2025-59466 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59466.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fVstMFtDcM3yfjjb8mKxrg==&#34;: {&#xA;      &#34;id&#34;: &#34;fVstMFtDcM3yfjjb8mKxrg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fZX9tMkRg8Ij95v2HLw9Ew==&#34;: {&#xA;      &#34;id&#34;: &#34;fZX9tMkRg8Ij95v2HLw9Ew==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-3750&#34;,&#xA;      &#34;description&#34;: &#34;Inconsistent handling of O_CREATE|O_EXCL on Unix and Windows in os in syscall&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T16:59:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/672396 https://go.dev/issue/73702 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.23.10&#34;&#xA;    },&#xA;    &#34;fZosNTVXWxoMJAWhA315xQ==&#34;: {&#xA;      &#34;id&#34;: &#34;fZosNTVXWxoMJAWhA315xQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35388&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability allows for a low integrity impact due to the omission of connection multiplexing confirmation for proxy-mode multiplexing sessions. A local user, under specific and complex conditions requiring user interaction, could potentially establish a multiplexed session without explicit confirmation, leading to unintended data handling.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:57:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35388 https://bugzilla.redhat.com/show_bug.cgi?id=2454500 https://www.cve.org/CVERecord?id=CVE-2026-35388 https://nvd.nist.gov/vuln/detail/CVE-2026-35388 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35388.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fZr2KjiaLrxmLBepxX+epw==&#34;: {&#xA;      &#34;id&#34;: &#34;fZr2KjiaLrxmLBepxX+epw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55131&#34;,&#xA;      &#34;description&#34;: &#34;A memory exposure flaw has been discovered in Node.js. A flaw in Node.js&#39;s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55131 https://bugzilla.redhat.com/show_bug.cgi?id=2431350 https://www.cve.org/CVERecord?id=CVE-2025-55131 https://nvd.nist.gov/vuln/detail/CVE-2025-55131 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55131.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fbRJLkkKyAqhMbdbbcLwwg==&#34;: {&#xA;      &#34;id&#34;: &#34;fbRJLkkKyAqhMbdbbcLwwg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4207&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in PostgreSQL. A buffer over-read in PostgreSQL GB18030 encoding validation allows a database input provider to achieve temporary denial of service on platforms where a 1-byte over-read can lead to process termination.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-08T14:22:45Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4207 https://bugzilla.redhat.com/show_bug.cgi?id=2365111 https://www.cve.org/CVERecord?id=CVE-2025-4207 https://nvd.nist.gov/vuln/detail/CVE-2025-4207 https://www.postgresql.org/support/security/CVE-2025-4207/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4207.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpq&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fcEhBEQT+7+nxaOwZEIInQ==&#34;: {&#xA;      &#34;id&#34;: &#34;fcEhBEQT+7+nxaOwZEIInQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-36227&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. A missing check of the return value of the calloc function can cause a NULL pointer dereference in an out-of-memory condition or when a memory allocation limit is reached, resulting in the program linked with libarchive to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-36227 https://bugzilla.redhat.com/show_bug.cgi?id=2144972 https://www.cve.org/CVERecord?id=CVE-2022-36227 https://nvd.nist.gov/vuln/detail/CVE-2022-36227 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-36227.json https://access.redhat.com/errata/RHSA-2023:2532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-4.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fcJXnA1/CqZDeUcxpMPyzg==&#34;: {&#xA;      &#34;id&#34;: &#34;fcJXnA1/CqZDeUcxpMPyzg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fdpDWwmwFLyFeyU+CnbxxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;fdpDWwmwFLyFeyU+CnbxxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32002&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32002 https://bugzilla.redhat.com/show_bug.cgi?id=2230948 https://www.cve.org/CVERecord?id=CVE-2023-32002 https://nvd.nist.gov/vuln/detail/CVE-2023-32002 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32002.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.17.1-1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fezwmAwUNAjVNYh+YY0Wrw==&#34;: {&#xA;      &#34;id&#34;: &#34;fezwmAwUNAjVNYh+YY0Wrw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31147&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs when /dev/urandom or RtlGenRandom() are unavailable, c-ares will use rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand(), so it will generate predictable output.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31147 https://bugzilla.redhat.com/show_bug.cgi?id=2209501 https://www.cve.org/CVERecord?id=CVE-2023-31147 https://nvd.nist.gov/vuln/detail/CVE-2023-31147 https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31147.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ff3woW6bpDBZXooXnBPlNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ff3woW6bpDBZXooXnBPlNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23916&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. A malicious server can insert an unlimited number of compression steps. This decompression chain could result in out-of-memory errors.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23916 https://bugzilla.redhat.com/show_bug.cgi?id=2167815 https://www.cve.org/CVERecord?id=CVE-2023-23916 https://nvd.nist.gov/vuln/detail/CVE-2023-23916 https://curl.se/docs/CVE-2023-23916.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23916.json https://access.redhat.com/errata/RHSA-2023:1701&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-19.el9_1.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fjsXh+vV+qSWYTJhGoqerg==&#34;: {&#xA;      &#34;id&#34;: &#34;fjsXh+vV+qSWYTJhGoqerg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-24528&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in krb5. With incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file. This issue can trigger a process crash and lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-24528 https://bugzilla.redhat.com/show_bug.cgi?id=2342796 https://www.cve.org/CVERecord?id=CVE-2025-24528 https://nvd.nist.gov/vuln/detail/CVE-2025-24528 https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-24528.json https://access.redhat.com/errata/RHSA-2025:7067&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-6.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;flC/+W9ll6TqBKBRm/YUiA==&#34;: {&#xA;      &#34;id&#34;: &#34;flC/+W9ll6TqBKBRm/YUiA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29406&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang, where it is vulnerable to HTTP header injection caused by improper content validation of the Host header by the HTTP/1 client. A remote attacker can inject arbitrary HTTP headers by persuading a victim to visit a specially crafted Web page. This flaw allows the attacker to conduct various attacks against the vulnerable system, including Cross-site scripting, cache poisoning, or session hijacking.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29406 https://bugzilla.redhat.com/show_bug.cgi?id=2222167 https://www.cve.org/CVERecord?id=CVE-2023-29406 https://nvd.nist.gov/vuln/detail/CVE-2023-29406 https://groups.google.com/g/golang-announce/c/2q13H6LEEx0 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29406.json https://access.redhat.com/errata/RHSA-2023:5738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.13-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;flk8YBa9lwv0ud+syzocqA==&#34;: {&#xA;      &#34;id&#34;: &#34;flk8YBa9lwv0ud+syzocqA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11839&#34;,&#xA;      &#34;description&#34;: &#34;An uncheck return value flaw has been discovered in the GNU binutils program. This flaw exists in the `tg_tag_type` function of the file prdbg.c and exploitation of this flaw may lead to a program crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-16T14:02:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11839 https://bugzilla.redhat.com/show_bug.cgi?id=2404439 https://www.cve.org/CVERecord?id=CVE-2025-11839 https://nvd.nist.gov/vuln/detail/CVE-2025-11839 https://sourceware.org/bugzilla/attachment.cgi?id=16344 https://sourceware.org/bugzilla/show_bug.cgi?id=33448 https://vuldb.com/?ctiid.328774 https://vuldb.com/?id.328774 https://vuldb.com/?submit.661279 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11839.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ftPQfiVA8qRKJwxT2xcXRw==&#34;: {&#xA;      &#34;id&#34;: &#34;ftPQfiVA8qRKJwxT2xcXRw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27983&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27983 https://bugzilla.redhat.com/show_bug.cgi?id=2272764 https://www.cve.org/CVERecord?id=CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27983.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fu2viInfwA1Zq9LmALUkzg==&#34;: {&#xA;      &#34;id&#34;: &#34;fu2viInfwA1Zq9LmALUkzg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2650&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL resulting in a possible denial of service while translating ASN.1 object identifiers. Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience long delays when processing messages, which may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2650 https://bugzilla.redhat.com/show_bug.cgi?id=2207947 https://www.cve.org/CVERecord?id=CVE-2023-2650 https://nvd.nist.gov/vuln/detail/CVE-2023-2650 https://www.openssl.org/news/secadv/20230530.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2650.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fuOmX+MQWgJjrWZ2kXbtlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;fuOmX+MQWgJjrWZ2kXbtlQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0672&#34;,&#xA;      &#34;description&#34;: &#34;An injection flaw has been discovered in Python. When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:52:33Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0672 https://bugzilla.redhat.com/show_bug.cgi?id=2431374 https://www.cve.org/CVERecord?id=CVE-2026-0672 https://nvd.nist.gov/vuln/detail/CVE-2026-0672 https://github.com/python/cpython/issues/143919 https://github.com/python/cpython/pull/143920 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0672.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fwXkQZwZsVuPtoAZBIG06w==&#34;: {&#xA;      &#34;id&#34;: &#34;fwXkQZwZsVuPtoAZBIG06w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-17049&#34;,&#xA;      &#34;description&#34;: &#34;It was found that the Kerberos Key Distribution Center (KDC) delegation feature, Service for User (S4U), did not sufficiently protect the tickets it&#39;s providing from tempering. A malicious, authenticated service principal allowed to delegate could use this flaw to impersonate a non-forwardable user.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-11-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-17049 https://bugzilla.redhat.com/show_bug.cgi?id=2025721 https://www.cve.org/CVERecord?id=CVE-2020-17049 https://nvd.nist.gov/vuln/detail/CVE-2020-17049 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-17049.json https://access.redhat.com/errata/RHSA-2023:2570&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.1-8.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fxc/de3PyQgiwjyykMQ4ow==&#34;: {&#xA;      &#34;id&#34;: &#34;fxc/de3PyQgiwjyykMQ4ow==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fyE+IA6J77V4hC6QL4QCJQ==&#34;: {&#xA;      &#34;id&#34;: &#34;fyE+IA6J77V4hC6QL4QCJQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45285&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Golang package cmd/go. This issue permits the fallback to insecure \&#34;git://\&#34; if trying to fetch a .git module that has no \&#34;https://\&#34; or \&#34;git+ssh://\&#34; available.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45285 https://bugzilla.redhat.com/show_bug.cgi?id=2253323 https://www.cve.org/CVERecord?id=CVE-2023-45285 https://nvd.nist.gov/vuln/detail/CVE-2023-45285 https://pkg.go.dev/vuln/GO-2023-2383 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45285.json https://access.redhat.com/errata/RHSA-2024:1131&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;g0XDRtU68aJjKkBv7OKREA==&#34;: {&#xA;      &#34;id&#34;: &#34;g0XDRtU68aJjKkBv7OKREA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11082&#34;,&#xA;      &#34;description&#34;: &#34;A head based buffer overflow flaw has been discovered in GNU bin utilities. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-27T22:32:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11082 https://bugzilla.redhat.com/show_bug.cgi?id=2399943 https://www.cve.org/CVERecord?id=CVE-2025-11082 https://nvd.nist.gov/vuln/detail/CVE-2025-11082 https://sourceware.org/bugzilla/attachment.cgi?id=16358 https://sourceware.org/bugzilla/show_bug.cgi?id=33464 https://sourceware.org/bugzilla/show_bug.cgi?id=33464#c2 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8 https://vuldb.com/?ctiid.326123 https://vuldb.com/?id.326123 https://vuldb.com/?submit.661276 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11082.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;g2+VTeiFdddqhRpToXK2Vw==&#34;: {&#xA;      &#34;id&#34;: &#34;g2+VTeiFdddqhRpToXK2Vw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29404&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. The go command may execute arbitrary code at build time when using cgo. This can occur when running \&#34;go get\&#34; on a malicious module, or when running any other command which builds untrusted code. This can be triggered by linker flags, specified via a \&#34;#cgo LDFLAGS\&#34; directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29404 https://bugzilla.redhat.com/show_bug.cgi?id=2217565 https://www.cve.org/CVERecord?id=CVE-2023-29404 https://nvd.nist.gov/vuln/detail/CVE-2023-29404 https://go.dev/cl/501225 https://go.dev/issue/60305 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29404.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;g29pa0L/tOFblhQQDFeJbA==&#34;: {&#xA;      &#34;id&#34;: &#34;g29pa0L/tOFblhQQDFeJbA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0533&#34;,&#xA;      &#34;description&#34;: &#34;Path traversal via Clean on Windows in path/filepath&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-28T17:25:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/401595 https://go.googlesource.com/go/+/9cd1818a7d019c02fa4898b3e45a323e35033290 https://go.dev/issue/52476 https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3&#34;&#xA;    },&#xA;    &#34;g3/sX4CO9sGFGMvToQ+how==&#34;: {&#xA;      &#34;id&#34;: &#34;g3/sX4CO9sGFGMvToQ+how==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;: {&#xA;      &#34;id&#34;: &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;g6spFzT6DoopzuQCE0pjRg==&#34;: {&#xA;      &#34;id&#34;: &#34;g6spFzT6DoopzuQCE0pjRg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2285&#34;,&#xA;      &#34;description&#34;: &#34;Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2285 https://bugzilla.redhat.com/show_bug.cgi?id=2103874 https://www.cve.org/CVERecord?id=CVE-2022-2285 https://nvd.nist.gov/vuln/detail/CVE-2022-2285 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2285.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;g8hJlpBfWMarbfdU+OkQdw==&#34;: {&#xA;      &#34;id&#34;: &#34;g8hJlpBfWMarbfdU+OkQdw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-10524&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Wget package. Wget might issue an FTP request to a different host in configurations where the HTTP shorthand format is used with user-provided input. An attacker may be able to use specially crafted input to cause Wget to access an arbitrary host.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-19T14:23:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-10524 https://bugzilla.redhat.com/show_bug.cgi?id=2327303 https://www.cve.org/CVERecord?id=CVE-2024-10524 https://nvd.nist.gov/vuln/detail/CVE-2024-10524 https://git.savannah.gnu.org/cgit/wget.git/commit/?id=c419542d956a2607bbce5df64b9d378a8588d778 https://jfrog.com/blog/cve-2024-10524-wget-zero-day-vulnerability/ https://seclists.org/oss-sec/2024/q4/107 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-10524.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;wget&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;g9gU2/SbcO/F9X65zpT4Uw==&#34;: {&#xA;      &#34;id&#34;: &#34;g9gU2/SbcO/F9X65zpT4Uw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0727&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The optional ContentInfo fields can be set to null, even if the \&#34;type\&#34; is a valid value, which can lead to a null dereference error that may cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0727 https://bugzilla.redhat.com/show_bug.cgi?id=2259944 https://www.cve.org/CVERecord?id=CVE-2024-0727 https://nvd.nist.gov/vuln/detail/CVE-2024-0727 https://github.com/openssl/openssl/pull/23362 https://www.openssl.org/news/secadv/20240125.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0727.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gC8lb/CZmVxLK6PkYWC9cw==&#34;: {&#xA;      &#34;id&#34;: &#34;gC8lb/CZmVxLK6PkYWC9cw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5363&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL in how it processes key and initialization vector (IV) lengths. This issue can lead to potential truncation or overruns during the initialization of some symmetric ciphers. A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. Both truncations and overruns of the key and the IV will produce incorrect results and could, in some cases, trigger a memory exception.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-24T15:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5363 https://bugzilla.redhat.com/show_bug.cgi?id=2243839 https://www.cve.org/CVERecord?id=CVE-2023-5363 https://nvd.nist.gov/vuln/detail/CVE-2023-5363 https://www.openssl.org/news/secadv/20231024.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5363.json https://access.redhat.com/errata/RHSA-2024:0310&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-25.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gCKIolAPxKn/MwnZqQ5viA==&#34;: {&#xA;      &#34;id&#34;: &#34;gCKIolAPxKn/MwnZqQ5viA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22025&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22025 https://bugzilla.redhat.com/show_bug.cgi?id=2270559 https://www.cve.org/CVERecord?id=CVE-2024-22025 https://nvd.nist.gov/vuln/detail/CVE-2024-22025 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22025.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gFgnmTqhW1tr7jmOrXQQQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;gFgnmTqhW1tr7jmOrXQQQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21715&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The Node.js Permission Model, intended to restrict filesystem access, does not properly enforce read permission checks for the `fs.realpathSync.native()` function. This vulnerability allows code operating under `--permission` with restricted `--allow-fs-read` flags to bypass security controls. Consequently, an attacker can use `fs.realpathSync.native()` to determine file existence, resolve symbolic link targets, and enumerate filesystem paths outside of permitted directories, leading to information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21715 https://bugzilla.redhat.com/show_bug.cgi?id=2453152 https://www.cve.org/CVERecord?id=CVE-2026-21715 https://nvd.nist.gov/vuln/detail/CVE-2026-21715 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21715.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gGrGej/Pj6/poAgebFb+dg==&#34;: {&#xA;      &#34;id&#34;: &#34;gGrGej/Pj6/poAgebFb+dg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3352&#34;,&#xA;      &#34;description&#34;: &#34;Use After Free in GitHub repository vim/vim prior to 9.0.0614.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3352 https://bugzilla.redhat.com/show_bug.cgi?id=2131087 https://www.cve.org/CVERecord?id=CVE-2022-3352 https://nvd.nist.gov/vuln/detail/CVE-2022-3352 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3352.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gH8HDGn0WlFpVq75mRFmZA==&#34;: {&#xA;      &#34;id&#34;: &#34;gH8HDGn0WlFpVq75mRFmZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2581&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Undici. When the `interceptors.deduplicate()` feature is enabled, response data for deduplicated requests can accumulate in memory. A remote attacker, by sending large or chunked responses and concurrent identical requests from an untrusted endpoint, can exploit this uncontrolled resource consumption. This leads to high memory usage and potential Out-Of-Memory (OOM) process termination, resulting in a Denial of Service (DoS) for the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:13:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2581 https://bugzilla.redhat.com/show_bug.cgi?id=2447140 https://www.cve.org/CVERecord?id=CVE-2026-2581 https://nvd.nist.gov/vuln/detail/CVE-2026-2581 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h https://hackerone.com/reports/3513473 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2581.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gIt1VKjk5s7zkgD1H7aLmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;gIt1VKjk5s7zkgD1H7aLmQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38408&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in OpenSSH has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system (the code in /usr/lib is not necessarily safe for loading into ssh-agent). This flaw allows an attacker with control of the forwarded agent-socket on the server and the ability to write to the filesystem of the client host to execute arbitrary code with the privileges of the user running the ssh-agent.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38408 https://bugzilla.redhat.com/show_bug.cgi?id=2224173 https://www.cve.org/CVERecord?id=CVE-2023-38408 https://nvd.nist.gov/vuln/detail/CVE-2023-38408 https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38408.json https://access.redhat.com/errata/RHSA-2023:4412&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-30.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gJ/fF2D4AXb0sjRGNWgixw==&#34;: {&#xA;      &#34;id&#34;: &#34;gJ/fF2D4AXb0sjRGNWgixw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gNGv6C2nj/tHk2ntVJUOWw==&#34;: {&#xA;      &#34;id&#34;: &#34;gNGv6C2nj/tHk2ntVJUOWw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-47011&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in binutils. This flaw allows an attacker to use a set of steps to trigger a memory leak and perform a denial of service, resulting in a loss of the system&#39;s availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-47011 https://bugzilla.redhat.com/show_bug.cgi?id=2233992 https://www.cve.org/CVERecord?id=CVE-2022-47011 https://nvd.nist.gov/vuln/detail/CVE-2022-47011 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47011.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gNlF6/GdqE8VbQCfjdB0tg==&#34;: {&#xA;      &#34;id&#34;: &#34;gNlF6/GdqE8VbQCfjdB0tg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45336&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45336 https://bugzilla.redhat.com/show_bug.cgi?id=2341751 https://www.cve.org/CVERecord?id=CVE-2024-45336 https://nvd.nist.gov/vuln/detail/CVE-2024-45336 https://github.com/golang/go/issues/70530 https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45336.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gOogxiWB/WP4jrEWNQnPXA==&#34;: {&#xA;      &#34;id&#34;: &#34;gOogxiWB/WP4jrEWNQnPXA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41035&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in rsync. When rsync is configured to handle extended attributes (using the -X or --xattrs option), a remote attacker can exploit a use-after-free vulnerability. This occurs because the receive_xattr function incorrectly processes an untrusted length value during a sorting operation, leading to memory corruption. Successful exploitation can result in a denial of service, causing the rsync process to crash, and may potentially allow for arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-16T06:53:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-41035 https://bugzilla.redhat.com/show_bug.cgi?id=2458898 https://www.cve.org/CVERecord?id=CVE-2026-41035 https://nvd.nist.gov/vuln/detail/CVE-2026-41035 https://github.com/RsyncProject/rsync/issues/871 https://github.com/RsyncProject/rsync/releases https://www.openwall.com/lists/oss-security/2026/04/16/2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-41035.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gPjSjC7XxsCvs5w6EQPViQ==&#34;: {&#xA;      &#34;id&#34;: &#34;gPjSjC7XxsCvs5w6EQPViQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gR+h15dyWueqbKII4cPOWg==&#34;: {&#xA;      &#34;id&#34;: &#34;gR+h15dyWueqbKII4cPOWg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27536&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. Libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, the GSS delegation setting was left out from the configuration match checks, making them match too easily, affecting krb5/kerberos/negotiate/GSSAPI transfers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27536 https://bugzilla.redhat.com/show_bug.cgi?id=2179092 https://www.cve.org/CVERecord?id=CVE-2023-27536 https://nvd.nist.gov/vuln/detail/CVE-2023-27536 https://curl.se/docs/CVE-2023-27536.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27536.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gZKcOjx7BKTLxDMH6ZvfGw==&#34;: {&#xA;      &#34;id&#34;: &#34;gZKcOjx7BKTLxDMH6ZvfGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4330&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython&#39;s tarfile module. This vulnerability allows bypassing of extraction filters, enabling symlink traversal outside the intended extraction directory and potential modification of file metadata via malicious tar archives using TarFile.extractall() or TarFile.extract() with the filter=\&#34;data\&#34; or filter=\&#34;tar\&#34; parameters. This issue leads to potentially overwriting or modifying system files and metadata.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:58:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4330 https://bugzilla.redhat.com/show_bug.cgi?id=2370014 https://www.cve.org/CVERecord?id=CVE-2025-4330 https://nvd.nist.gov/vuln/detail/CVE-2025-4330 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4330.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gZW7OlWAfe3YqvPh9YUqJA==&#34;: {&#xA;      &#34;id&#34;: &#34;gZW7OlWAfe3YqvPh9YUqJA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6119&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6119 https://bugzilla.redhat.com/show_bug.cgi?id=2306158 https://www.cve.org/CVERecord?id=CVE-2024-6119 https://nvd.nist.gov/vuln/detail/CVE-2024-6119 https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6119.json https://access.redhat.com/errata/RHSA-2024:6783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-28.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gaDJ+6UMi8jegvsDECsoeg==&#34;: {&#xA;      &#34;id&#34;: &#34;gaDJ+6UMi8jegvsDECsoeg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4603&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use the EVP_PKEY_param_check() or EVP_PKEY_public_check() function to check a DSA public key or DSA parameters may experience long delays when checking excessively long DSA keys or parameters.  In applications that allow untrusted sources to provide the key or parameters that are checked, an attacker may be able to cause a denial of service. These functions are not called by OpenSSL on untrusted DSA keys. The applications that directly call these functions are the ones that may be vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4603 https://bugzilla.redhat.com/show_bug.cgi?id=2281029 https://www.cve.org/CVERecord?id=CVE-2024-4603 https://nvd.nist.gov/vuln/detail/CVE-2024-4603 https://www.openssl.org/news/secadv/20240516.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4603.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gchW+O287jwZk0Cnma5sKw==&#34;: {&#xA;      &#34;id&#34;: &#34;gchW+O287jwZk0Cnma5sKw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-51385&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. In certain circumstances, a remote attacker may be able to execute arbitrary OS commands by using expansion tokens, such as %u or %h, with user names or host names that contain shell metacharacters.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-51385 https://bugzilla.redhat.com/show_bug.cgi?id=2255271 https://www.cve.org/CVERecord?id=CVE-2023-51385 https://nvd.nist.gov/vuln/detail/CVE-2023-51385 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-51385.json https://access.redhat.com/errata/RHSA-2024:1130&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-34.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gg092DB69lXLcZyDPZ/RtQ==&#34;: {&#xA;      &#34;id&#34;: &#34;gg092DB69lXLcZyDPZ/RtQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24788&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net package of the Go stdlib. When a malformed DNS message is received as a response to a query, the Lookup functions within the net package can get stuck in an infinite loop. This issue can lead to resource exhaustion and denial of service (DoS) conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24788 https://bugzilla.redhat.com/show_bug.cgi?id=2279814 https://www.cve.org/CVERecord?id=CVE-2024-24788 https://nvd.nist.gov/vuln/detail/CVE-2024-24788 https://pkg.go.dev/vuln/GO-2024-2824 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24788.json https://access.redhat.com/errata/RHBA-2024:3840&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.10-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gg6QYPBlPoN8zpwNyr7x6w==&#34;: {&#xA;      &#34;id&#34;: &#34;gg6QYPBlPoN8zpwNyr7x6w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json https://access.redhat.com/errata/RHSA-2026:13677&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ggJq5z8YW0kySCUAGUYdXg==&#34;: {&#xA;      &#34;id&#34;: &#34;ggJq5z8YW0kySCUAGUYdXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35937&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35937 https://bugzilla.redhat.com/show_bug.cgi?id=1964125 https://www.cve.org/CVERecord?id=CVE-2021-35937 https://nvd.nist.gov/vuln/detail/CVE-2021-35937 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35937.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ggWNBGsBWwx10iidOhjYcw==&#34;: {&#xA;      &#34;id&#34;: &#34;ggWNBGsBWwx10iidOhjYcw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1299&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the email module in the Python standard library. When serializing an email message, the BytesGenerator class fails to properly quote newline characters for email headers. This issue is exploitable when the LiteralHeader class is used as it does not respect email folding rules, allowing an attacker to inject email headers and potentially modify message recipients or the email body, and spoof sender information.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-23T16:27:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1299 https://bugzilla.redhat.com/show_bug.cgi?id=2432437 https://www.cve.org/CVERecord?id=CVE-2026-1299 https://nvd.nist.gov/vuln/detail/CVE-2026-1299 https://cve.org/CVERecord?id=CVE-2024-6923 https://github.com/python/cpython/commit/052e55e7d44718fe46cbba0ca995cb8fcc359413 https://github.com/python/cpython/issues/144125 https://github.com/python/cpython/pull/144126 https://mail.python.org/archives/list/security-announce@python.org/thread/6ZZULGALJTITEAGEXLDJE2C6FORDXPBT/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1299.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ghVsimzHhtfG91QJVkK8Jg==&#34;: {&#xA;      &#34;id&#34;: &#34;ghVsimzHhtfG91QJVkK8Jg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21713&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The HMAC (Hash-based Message Authentication Code) verification process uses a comparison method that does not take a constant amount of time. This non-constant-time comparison can leak timing information, which, under specific conditions where precise timing measurements are possible, could be exploited by a remote attacker. This allows the attacker to infer sensitive HMAC values, leading to information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21713 https://bugzilla.redhat.com/show_bug.cgi?id=2453160 https://www.cve.org/CVERecord?id=CVE-2026-21713 https://nvd.nist.gov/vuln/detail/CVE-2026-21713 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21713.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gjn1JHWHaWtPNhKrrRINWw==&#34;: {&#xA;      &#34;id&#34;: &#34;gjn1JHWHaWtPNhKrrRINWw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9355&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum.  It is also possible to force a derived key to be all zeros instead of an unpredictable value.  This may have follow-on implications for the Go TLS stack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-30T20:53:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9355 https://bugzilla.redhat.com/show_bug.cgi?id=2315719 https://www.cve.org/CVERecord?id=CVE-2024-9355 https://nvd.nist.gov/vuln/detail/CVE-2024-9355 https://github.com/golang-fips/openssl/pull/198 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9355.json https://access.redhat.com/errata/RHSA-2024:7550&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-4.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gl5O329psI82Wn7F+BP/pw==&#34;: {&#xA;      &#34;id&#34;: &#34;gl5O329psI82Wn7F+BP/pw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45143&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Undici node package due to the occurrence of Cross-origin requests, possibly leading to a cookie header leakage. By default, cookie headers are forbidden request headers, and they must be enabled. This flaw allows a malicious user to access this leaked cookie if they have control of the redirection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45143 https://bugzilla.redhat.com/show_bug.cgi?id=2244104 https://www.cve.org/CVERecord?id=CVE-2023-45143 https://nvd.nist.gov/vuln/detail/CVE-2023-45143 https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45143.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;glwEUWfaBwNPBrXUJo34tg==&#34;: {&#xA;      &#34;id&#34;: &#34;glwEUWfaBwNPBrXUJo34tg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gmo+iv72N8R3ZKjUbp9DXg==&#34;: {&#xA;      &#34;id&#34;: &#34;gmo+iv72N8R3ZKjUbp9DXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-interpreter&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;4:5.32.1-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gn3bQe/78AdzPhooNm1KQw==&#34;: {&#xA;      &#34;id&#34;: &#34;gn3bQe/78AdzPhooNm1KQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66293&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read vulnerability has been discovered in libpng. This vulnerability is in libpng&#39;s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng&#39;s internal state management.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-03T20:33:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66293 https://bugzilla.redhat.com/show_bug.cgi?id=2418711 https://www.cve.org/CVERecord?id=CVE-2025-66293 https://nvd.nist.gov/vuln/detail/CVE-2025-66293 https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1 https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a https://github.com/pnggroup/libpng/issues/764 https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66293.json https://access.redhat.com/errata/RHSA-2026:0238&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;goLAuNZUT0caQTKiv7m0Fg==&#34;: {&#xA;      &#34;id&#34;: &#34;goLAuNZUT0caQTKiv7m0Fg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32021&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw allows an unauthenticated attacker to place a repository on their target&#39;s local system that contains symlinks. During the cloning process, Git could be tricked into creating hardlinked arbitrary files into their repository&#39;s objects/ directory, impacting availability and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32021 https://bugzilla.redhat.com/show_bug.cgi?id=2280484 https://www.cve.org/CVERecord?id=CVE-2024-32021 https://nvd.nist.gov/vuln/detail/CVE-2024-32021 https://github.com/git/git/security/advisories/GHSA-mvxm-9j2h-qjx7 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32021.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gpPTgXxcA95Uk2vaf3/2dw==&#34;: {&#xA;      &#34;id&#34;: &#34;gpPTgXxcA95Uk2vaf3/2dw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45803&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn&#39;t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren&#39;t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn&#39;t exploitable.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45803 https://bugzilla.redhat.com/show_bug.cgi?id=2246840 https://www.cve.org/CVERecord?id=CVE-2023-45803 https://nvd.nist.gov/vuln/detail/CVE-2023-45803 https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9 https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4 https://www.rfc-editor.org/rfc/rfc9110.html#name-get https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45803.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gqWTMUdDL1db9YSLA4qpRQ==&#34;: {&#xA;      &#34;id&#34;: &#34;gqWTMUdDL1db9YSLA4qpRQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;grZJQsj3BT+fQns8dkci1g==&#34;: {&#xA;      &#34;id&#34;: &#34;grZJQsj3BT+fQns8dkci1g==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0520&#34;,&#xA;      &#34;description&#34;: &#34;Exposure of client IP addresses in net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-28T17:23:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/412857 https://go.googlesource.com/go/+/b2cc0fecc2ccd80e6d5d16542cc684f97b3a9c8a https://go.dev/issue/53423 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.4&#34;&#xA;    },&#xA;    &#34;gs7k9o3a1jAc/zZ5AEytpQ==&#34;: {&#xA;      &#34;id&#34;: &#34;gs7k9o3a1jAc/zZ5AEytpQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-43548&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in NodeJS. The issue occurs in the Node.js rebinding protector for --inspect that still allows invalid IP addresses, specifically, the octal format. This flaw allows an attacker to perform DNS rebinding and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-11-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-43548 https://bugzilla.redhat.com/show_bug.cgi?id=2140911 https://www.cve.org/CVERecord?id=CVE-2022-43548 https://nvd.nist.gov/vuln/detail/CVE-2022-43548 https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/#dns-rebinding-in-inspect-via-invalid-octal-ip-address-medium-cve-2022-43548 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-43548.json https://access.redhat.com/errata/RHSA-2022:8832&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.12.1-1.module+el9.1.0.z+17326+318294bb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;guG+lyS5JQIDSZS6MEfIow==&#34;: {&#xA;      &#34;id&#34;: &#34;guG+lyS5JQIDSZS6MEfIow==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11840&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in GNU binutils. The `vfinfo` function in the `ldmisc.c` file. Exploitation of this flaw requires local access and may cause a program crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-16T15:32:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11840 https://bugzilla.redhat.com/show_bug.cgi?id=2404481 https://www.cve.org/CVERecord?id=CVE-2025-11840 https://nvd.nist.gov/vuln/detail/CVE-2025-11840 https://sourceware.org/bugzilla/attachment.cgi?id=16351 https://sourceware.org/bugzilla/attachment.cgi?id=16357 https://sourceware.org/bugzilla/show_bug.cgi?id=33455 https://vuldb.com/?ctiid.328775 https://vuldb.com/?id.328775 https://vuldb.com/?submit.661281 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11840.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;guovo7cvog/lYbVq887U/w==&#34;: {&#xA;      &#34;id&#34;: &#34;guovo7cvog/lYbVq887U/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30589&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30589 https://bugzilla.redhat.com/show_bug.cgi?id=2219841 https://www.cve.org/CVERecord?id=CVE-2023-30589 https://nvd.nist.gov/vuln/detail/CVE-2023-30589 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30589.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gvOYexCvSFjRc1ovPwHsww==&#34;: {&#xA;      &#34;id&#34;: &#34;gvOYexCvSFjRc1ovPwHsww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-34410&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-34410 https://bugzilla.redhat.com/show_bug.cgi?id=2212747 https://www.cve.org/CVERecord?id=CVE-2023-34410 https://nvd.nist.gov/vuln/detail/CVE-2023-34410 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-34410.json https://access.redhat.com/errata/RHSA-2023:6369&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;qt5-srpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:5.15.9-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;gx7w+mYZCEGlSNGIkO6bLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;gx7w+mYZCEGlSNGIkO6bLQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25547&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-04T21:51:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25547 https://bugzilla.redhat.com/show_bug.cgi?id=2436942 https://www.cve.org/CVERecord?id=CVE-2026-25547 https://nvd.nist.gov/vuln/detail/CVE-2026-25547 https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25547.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gxC5QcXnizTYqfkIqc6zTA==&#34;: {&#xA;      &#34;id&#34;: &#34;gxC5QcXnizTYqfkIqc6zTA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3446&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security flaw occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3446 https://bugzilla.redhat.com/show_bug.cgi?id=2224962 https://www.cve.org/CVERecord?id=CVE-2023-3446 https://nvd.nist.gov/vuln/detail/CVE-2023-3446 https://www.openssl.org/news/secadv/20230719.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3446.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;h+nOQU6khNxAH7kkGqVqkQ==&#34;: {&#xA;      &#34;id&#34;: &#34;h+nOQU6khNxAH7kkGqVqkQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3296&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow vulnerability was found in vim&#39;s ex_finally() function of the src/ex_eval.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a bug that causes an application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3296 https://bugzilla.redhat.com/show_bug.cgi?id=2129835 https://www.cve.org/CVERecord?id=CVE-2022-3296 https://nvd.nist.gov/vuln/detail/CVE-2022-3296 https://huntr.dev/bounties/958866b8-526a-4979-9471-39392e0c9077 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3296.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;h/OVEZRz5ndHYLHsNXXXMg==&#34;: {&#xA;      &#34;id&#34;: &#34;h/OVEZRz5ndHYLHsNXXXMg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39326&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Golang net/http/internal package. This issue may allow a malicious user to send an HTTP request and cause the receiver to read more bytes from network than are in the body (up to 1GiB), causing the receiver to fail reading the response, possibly leading to a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39326 https://bugzilla.redhat.com/show_bug.cgi?id=2253330 https://www.cve.org/CVERecord?id=CVE-2023-39326 https://nvd.nist.gov/vuln/detail/CVE-2023-39326 https://pkg.go.dev/vuln/GO-2023-2382 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39326.json https://access.redhat.com/errata/RHSA-2024:1131&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;h4AMnuZWsySyrebCjsjhxA==&#34;: {&#xA;      &#34;id&#34;: &#34;h4AMnuZWsySyrebCjsjhxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.4-1.22.22.0.1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;h5U/sk69K9TcWs3P9TuKxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;h5U/sk69K9TcWs3P9TuKxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41723&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-17T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41723 https://bugzilla.redhat.com/show_bug.cgi?id=2178358 https://www.cve.org/CVERecord?id=CVE-2022-41723 https://nvd.nist.gov/vuln/detail/CVE-2022-41723 https://github.com/advisories/GHSA-vvpx-j8f3-3w6h https://go.dev/cl/468135 https://go.dev/cl/468295 https://go.dev/issue/57855 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E https://pkg.go.dev/vuln/GO-2023-1571 https://vuln.go.dev/ID/GO-2023-1571.json https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41723.json https://access.redhat.com/errata/RHBA-2023:2181&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.6-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;h7m1EaKKCwaqq30R6Q/BlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;h7m1EaKKCwaqq30R6Q/BlQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1999&#34;,&#xA;      &#34;description&#34;: &#34;The Mozilla Foundation Security Advisory describes this flaw as:\r\n\r\nA double-free in libwebp could have led to memory corruption and a potentially exploitable crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1999 https://bugzilla.redhat.com/show_bug.cgi?id=2186102 https://www.cve.org/CVERecord?id=CVE-2023-1999 https://nvd.nist.gov/vuln/detail/CVE-2023-1999 https://www.mozilla.org/en-US/security/advisories/mfsa2023-14/#CVE-2023-1999 https://www.mozilla.org/en-US/security/advisories/mfsa2023-15/#CVE-2023-1999 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1999.json https://access.redhat.com/errata/RHSA-2023:2078&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libwebp-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.2.0-6.el9_1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;h7rVfEQf7/yrRLndyq6HvA==&#34;: {&#xA;      &#34;id&#34;: &#34;h7rVfEQf7/yrRLndyq6HvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24532&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/internal/nistec golang library. The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars, such as a scalar larger than the order of the curve. This does not impact usages of crypto/ecdsa or crypto/ecdh.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24532 https://bugzilla.redhat.com/show_bug.cgi?id=2223355 https://www.cve.org/CVERecord?id=CVE-2023-24532 https://nvd.nist.gov/vuln/detail/CVE-2023-24532 https://go.dev/cl/471255 https://go.dev/issue/58647 https://groups.google.com/g/golang-announce/c/3-TpUx48iQY https://pkg.go.dev/vuln/GO-2023-1621 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24532.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;h8RB92Gx2aWFJ7WtAQ4wDA==&#34;: {&#xA;      &#34;id&#34;: &#34;h8RB92Gx2aWFJ7WtAQ4wDA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4016&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow vulnerability was found in the procps project when handling untrusted input with the -C option. This issue may allow a user with \&#34;ps\&#34; utility access to write unfiltered data into the process heap, triggering an out-of-bounds write, consuming memory and causing a crash, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4016 https://bugzilla.redhat.com/show_bug.cgi?id=2228494 https://www.cve.org/CVERecord?id=CVE-2023-4016 https://nvd.nist.gov/vuln/detail/CVE-2023-4016 https://gitlab.com/procps-ng/procps/-/commit/2c933ecba3bb1d3041a5a7a53a7b4078a6003413 https://gitlab.com/procps-ng/procps/-/issues/297 https://www.freelists.org/post/procps/ps-buffer-overflow-CVE-20234016 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4016.json https://access.redhat.com/errata/RHSA-2023:6705&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;procps-ng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.3.17-13.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;h8nlVtUPrGKdJF9xyffy7g==&#34;: {&#xA;      &#34;id&#34;: &#34;h8nlVtUPrGKdJF9xyffy7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35939&#34;,&#xA;      &#34;description&#34;: &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35939 https://bugzilla.redhat.com/show_bug.cgi?id=1964129 https://www.cve.org/CVERecord?id=CVE-2021-35939 https://nvd.nist.gov/vuln/detail/CVE-2021-35939 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35939.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hECLdfUszFQo2UbzQI3BMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;hECLdfUszFQo2UbzQI3BMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6232&#34;,&#xA;      &#34;description&#34;: &#34;A regular expression denial of service (ReDos) vulnerability was found in Python&#39;s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-03T13:15:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6232 https://bugzilla.redhat.com/show_bug.cgi?id=2309426 https://www.cve.org/CVERecord?id=CVE-2024-6232 https://nvd.nist.gov/vuln/detail/CVE-2024-6232 https://github.com/python/cpython/issues/121285 https://github.com/python/cpython/pull/121286 https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6232.json https://access.redhat.com/errata/RHSA-2024:8446&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hEt6vsfHYq4kHELEO5xWxA==&#34;: {&#xA;      &#34;id&#34;: &#34;hEt6vsfHYq4kHELEO5xWxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;: {&#xA;      &#34;id&#34;: &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7668&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.43.0-6.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hHQvhYHv8KxCCQMiFpmyWg==&#34;: {&#xA;      &#34;id&#34;: &#34;hHQvhYHv8KxCCQMiFpmyWg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12718&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython&#39;s tarfile module. This vulnerability allows modification of file metadata, such as timestamps or permissions, outside the intended extraction directory via maliciously crafted tar archives using the filter=\&#34;data\&#34; or filter=\&#34;tar\&#34; extraction filters.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:59:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12718 https://bugzilla.redhat.com/show_bug.cgi?id=2370013 https://www.cve.org/CVERecord?id=CVE-2024-12718 https://nvd.nist.gov/vuln/detail/CVE-2024-12718 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/127987 https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12718.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hIHRMVndQh85jnW2uCawbw==&#34;: {&#xA;      &#34;id&#34;: &#34;hIHRMVndQh85jnW2uCawbw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22874&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s crypto/x509 package. This vulnerability allows improper certificate validation, bypassing policy constraints via using ExtKeyUsageAny in VerifyOptions.KeyUsages.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T16:42:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22874 https://bugzilla.redhat.com/show_bug.cgi?id=2372320 https://www.cve.org/CVERecord?id=CVE-2025-22874 https://nvd.nist.gov/vuln/detail/CVE-2025-22874 https://go.dev/cl/670375 https://go.dev/issue/73612 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A https://pkg.go.dev/vuln/GO-2025-3749 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22874.json https://access.redhat.com/errata/RHSA-2025:10676&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.4-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hIP4iOnrw2sfStgfnTKJKw==&#34;: {&#xA;      &#34;id&#34;: &#34;hIP4iOnrw2sfStgfnTKJKw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30581&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been discovered in Node.js,  where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30581 https://bugzilla.redhat.com/show_bug.cgi?id=2219824 https://www.cve.org/CVERecord?id=CVE-2023-30581 https://nvd.nist.gov/vuln/detail/CVE-2023-30581 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30581.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.16.1-1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hJqH5PsFQ03HT/LzTwaCXA==&#34;: {&#xA;      &#34;id&#34;: &#34;hJqH5PsFQ03HT/LzTwaCXA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47912&#34;,&#xA;      &#34;description&#34;: &#34;The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \&#34;http://[::1]/\&#34;. IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T22:10:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47912 https://bugzilla.redhat.com/show_bug.cgi?id=2407247 https://www.cve.org/CVERecord?id=CVE-2025-47912 https://nvd.nist.gov/vuln/detail/CVE-2025-47912 https://go.dev/cl/709857 https://go.dev/issue/75678 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://pkg.go.dev/vuln/GO-2025-4010 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47912.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hK/f5zoJDHjYWcidbJwYsg==&#34;: {&#xA;      &#34;id&#34;: &#34;hK/f5zoJDHjYWcidbJwYsg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38408&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in OpenSSH has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system (the code in /usr/lib is not necessarily safe for loading into ssh-agent). This flaw allows an attacker with control of the forwarded agent-socket on the server and the ability to write to the filesystem of the client host to execute arbitrary code with the privileges of the user running the ssh-agent.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38408 https://bugzilla.redhat.com/show_bug.cgi?id=2224173 https://www.cve.org/CVERecord?id=CVE-2023-38408 https://nvd.nist.gov/vuln/detail/CVE-2023-38408 https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38408.json https://access.redhat.com/errata/RHSA-2023:4412&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-30.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hMc0MDqaKmmGxo7P4SKmKg==&#34;: {&#xA;      &#34;id&#34;: &#34;hMc0MDqaKmmGxo7P4SKmKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. This vulnerability, a heap-buffer-overflow and a segmentation fault, exists in the swap file recovery logic. A local attacker could exploit this by providing a specially crafted swap file. This could lead to a denial of service (DoS) or potentially information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-27T22:06:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28421 https://bugzilla.redhat.com/show_bug.cgi?id=2443474 https://www.cve.org/CVERecord?id=CVE-2026-28421 https://nvd.nist.gov/vuln/detail/CVE-2026-28421 https://github.com/vim/vim/commit/65c1a143c331c886dc28 https://github.com/vim/vim/releases/tag/v9.2.0077 https://github.com/vim/vim/security/advisories/GHSA-r2gw-2x48-jj5p https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28421.json https://access.redhat.com/errata/RHSA-2026:8259&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hMwTXtuK2CPZup51st8vag==&#34;: {&#xA;      &#34;id&#34;: &#34;hMwTXtuK2CPZup51st8vag==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25881&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25881 https://bugzilla.redhat.com/show_bug.cgi?id=2165824 https://www.cve.org/CVERecord?id=CVE-2022-25881 https://nvd.nist.gov/vuln/detail/CVE-2022-25881 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25881.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hRSnphgIhBaU8a2RyBPsuA==&#34;: {&#xA;      &#34;id&#34;: &#34;hRSnphgIhBaU8a2RyBPsuA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:3501&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.43.0-5.el9_4.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hUC86VV8kD262xFcev0ZiA==&#34;: {&#xA;      &#34;id&#34;: &#34;hUC86VV8kD262xFcev0ZiA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11412&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted object file with the ld linker can trigger an out-of-bounds read in the bfd_elf_gc_record_vtentry function in the bfd/elflink.c file due to a missing sanity check, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-07T22:02:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11412 https://bugzilla.redhat.com/show_bug.cgi?id=2402425 https://www.cve.org/CVERecord?id=CVE-2025-11412 https://nvd.nist.gov/vuln/detail/CVE-2025-11412 https://sourceware.org/bugzilla/show_bug.cgi?id=33452 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc https://vuldb.com/?id.327348 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11412.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hWXaFNGw43ZC0VkI4/s2Pw==&#34;: {&#xA;      &#34;id&#34;: &#34;hWXaFNGw43ZC0VkI4/s2Pw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35938&#34;,&#xA;      &#34;description&#34;: &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35938 https://bugzilla.redhat.com/show_bug.cgi?id=1964114 https://www.cve.org/CVERecord?id=CVE-2021-35938 https://nvd.nist.gov/vuln/detail/CVE-2021-35938 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35938.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-sign-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hXiyheRZcHY0l7xO8DNsTg==&#34;: {&#xA;      &#34;id&#34;: &#34;hXiyheRZcHY0l7xO8DNsTg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hYg6jGCQ5Nuq7UsitAzuiw==&#34;: {&#xA;      &#34;id&#34;: &#34;hYg6jGCQ5Nuq7UsitAzuiw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This issue occurs when hashing empty strings which aren&#39;t null-terminated, xmlDictComputeFastKey could produce inconsistent results, which may lead to various logic or memory errors, including double free errors.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29469 https://bugzilla.redhat.com/show_bug.cgi?id=2185984 https://www.cve.org/CVERecord?id=CVE-2023-29469 https://nvd.nist.gov/vuln/detail/CVE-2023-29469 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29469.json https://access.redhat.com/errata/RHSA-2023:4349&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-3.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;haYiiYG8S+76vEnaF2JX0g==&#34;: {&#xA;      &#34;id&#34;: &#34;haYiiYG8S+76vEnaF2JX0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68119&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang&#39;s cmd/go module. This vulnerability allows a local attacker to achieve local code execution by downloading and building modules with specially crafted malicious version strings. On systems with Mercurial (hg) installed, this can occur when downloading modules from non-standard sources due to how external Version Control System (VCS) commands are constructed. Additionally, on systems with Git installed, providing malicious version strings to the toolchain can enable an attacker to write to arbitrary files on the filesystem. This issue is triggered by explicitly supplying these malicious version strings.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68119 https://bugzilla.redhat.com/show_bug.cgi?id=2434438 https://www.cve.org/CVERecord?id=CVE-2025-68119 https://nvd.nist.gov/vuln/detail/CVE-2025-68119 https://go.dev/cl/736710 https://go.dev/issue/77099 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4338 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68119.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hazOAbpBSQ6ZcoEMkq6UhQ==&#34;: {&#xA;      &#34;id&#34;: &#34;hazOAbpBSQ6ZcoEMkq6UhQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5981&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5981 https://bugzilla.redhat.com/show_bug.cgi?id=2248445 https://www.cve.org/CVERecord?id=CVE-2023-5981 https://nvd.nist.gov/vuln/detail/CVE-2023-5981 https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5981.json https://access.redhat.com/errata/RHSA-2024:0533&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.7.6-23.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hcytdCNWQ/uK0EA5aDrWOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;hcytdCNWQ/uK0EA5aDrWOQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:11992&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-8.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hfVFht+buqTExOEVhwr1xQ==&#34;: {&#xA;      &#34;id&#34;: &#34;hfVFht+buqTExOEVhwr1xQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-12900&#34;,&#xA;      &#34;description&#34;: &#34;A data integrity error was found in the bzip2 (User-space package) functionality when decompressing. This issue occurs when a user decompresses a particular kind of .bz2 files. A local user could get unexpected results (or corrupted data) as result of decompressing these files.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-15T10:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-12900 https://bugzilla.redhat.com/show_bug.cgi?id=2332075 https://www.cve.org/CVERecord?id=CVE-2019-12900 https://nvd.nist.gov/vuln/detail/CVE-2019-12900 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-12900.json https://access.redhat.com/errata/RHSA-2025:0925&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.0.8-10.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hinEteXkZ2xZbWF5lSQDEw==&#34;: {&#xA;      &#34;id&#34;: &#34;hinEteXkZ2xZbWF5lSQDEw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0797&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the _TIFFmemcpy function in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c, resulting in a Denial of Service and limited information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0797 https://bugzilla.redhat.com/show_bug.cgi?id=2170151 https://www.cve.org/CVERecord?id=CVE-2023-0797 https://nvd.nist.gov/vuln/detail/CVE-2023-0797 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0797.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hizVOzI9X9GcBBCKZH/AIg==&#34;: {&#xA;      &#34;id&#34;: &#34;hizVOzI9X9GcBBCKZH/AIg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hjzu3I+m68mPWogOfZscVg==&#34;: {&#xA;      &#34;id&#34;: &#34;hjzu3I+m68mPWogOfZscVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39318&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. The html/template package did not properly handle HMTL-like \&#34;\u003c!--\&#34; and \&#34;--\u003e\&#34; comment tokens, nor hashbang \&#34;#!\&#34; comment tokens, in \u003cscript\u003e contexts. This issue may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39318 https://bugzilla.redhat.com/show_bug.cgi?id=2237776 https://www.cve.org/CVERecord?id=CVE-2023-39318 https://nvd.nist.gov/vuln/detail/CVE-2023-39318 https://go.dev/cl/526156 https://go.dev/issue/62196 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2041.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39318.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hlV8M1lvezTjDMlaNPSTvg==&#34;: {&#xA;      &#34;id&#34;: &#34;hlV8M1lvezTjDMlaNPSTvg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25629&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25629 https://bugzilla.redhat.com/show_bug.cgi?id=2265713 https://www.cve.org/CVERecord?id=CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629 https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25629.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hnVuaDEhxbGffMCkOiTy1A==&#34;: {&#xA;      &#34;id&#34;: &#34;hnVuaDEhxbGffMCkOiTy1A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3446&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security flaw occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3446 https://bugzilla.redhat.com/show_bug.cgi?id=2224962 https://www.cve.org/CVERecord?id=CVE-2023-3446 https://nvd.nist.gov/vuln/detail/CVE-2023-3446 https://www.openssl.org/news/secadv/20230719.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3446.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hqWNdyyShysFv4UI5qHkfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;hqWNdyyShysFv4UI5qHkfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;htRPPeb7P9MNS47zhEuuaw==&#34;: {&#xA;      &#34;id&#34;: &#34;htRPPeb7P9MNS47zhEuuaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24791&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go. The net/http module mishandles specific server responses from HTTP/1.1 client requests. This issue may render a connection invalid and cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24791 https://bugzilla.redhat.com/show_bug.cgi?id=2295310 https://www.cve.org/CVERecord?id=CVE-2024-24791 https://nvd.nist.gov/vuln/detail/CVE-2024-24791 https://go.dev/cl/591255 https://go.dev/issue/67555 https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24791.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;htuN+yEom1R161MtW9b2yw==&#34;: {&#xA;      &#34;id&#34;: &#34;htuN+yEom1R161MtW9b2yw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21715&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The Node.js Permission Model, intended to restrict filesystem access, does not properly enforce read permission checks for the `fs.realpathSync.native()` function. This vulnerability allows code operating under `--permission` with restricted `--allow-fs-read` flags to bypass security controls. Consequently, an attacker can use `fs.realpathSync.native()` to determine file existence, resolve symbolic link targets, and enumerate filesystem paths outside of permitted directories, leading to information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21715 https://bugzilla.redhat.com/show_bug.cgi?id=2453152 https://www.cve.org/CVERecord?id=CVE-2026-21715 https://nvd.nist.gov/vuln/detail/CVE-2026-21715 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21715.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hv1o+8ALinWTDa5cH4j3rA==&#34;: {&#xA;      &#34;id&#34;: &#34;hv1o+8ALinWTDa5cH4j3rA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4645&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcp, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the tiffcp function in tools/tiffcp.c, resulting in a denial of service and limited information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4645 https://bugzilla.redhat.com/show_bug.cgi?id=2176220 https://www.cve.org/CVERecord?id=CVE-2022-4645 https://nvd.nist.gov/vuln/detail/CVE-2022-4645 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4645.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hwn8HSXSxoAi1TYe+ACqPA==&#34;: {&#xA;      &#34;id&#34;: &#34;hwn8HSXSxoAi1TYe+ACqPA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32006&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32006 https://bugzilla.redhat.com/show_bug.cgi?id=2230955 https://www.cve.org/CVERecord?id=CVE-2023-32006 https://nvd.nist.gov/vuln/detail/CVE-2023-32006 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32006.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.17.1-1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hx3c9WG+Xum3pwxo0+FyRQ==&#34;: {&#xA;      &#34;id&#34;: &#34;hx3c9WG+Xum3pwxo0+FyRQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23919&#34;,&#xA;      &#34;description&#34;: &#34;A cryptographic vulnerability exists in Node.js \u003c19.2.0, \u003c18.14.1, \u003c16.19.1, \u003c14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23919 https://bugzilla.redhat.com/show_bug.cgi?id=2172170 https://www.cve.org/CVERecord?id=CVE-2023-23919 https://nvd.nist.gov/vuln/detail/CVE-2023-23919 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23919.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hxluEp8Si16NQcfaJDWcLg==&#34;: {&#xA;      &#34;id&#34;: &#34;hxluEp8Si16NQcfaJDWcLg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3324&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow vulnerability was found in Vim&#39;s win_redr_ruler() function of the src/drawscreen.c file. The issue occurs when using a negative array index with a negative width window. This flaw allows an attacker to trick a user into opening a specially crafted file, which triggers the bug, causing an application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3324 https://bugzilla.redhat.com/show_bug.cgi?id=2132558 https://www.cve.org/CVERecord?id=CVE-2022-3324 https://nvd.nist.gov/vuln/detail/CVE-2022-3324 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3324.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hzkoKs3QdYyXJMnifzGbxA==&#34;: {&#xA;      &#34;id&#34;: &#34;hzkoKs3QdYyXJMnifzGbxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici package for Node.js. Undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If an app has a mechanism that sends multipart requests to an attacker-controlled website, it can leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T17:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22150 https://bugzilla.redhat.com/show_bug.cgi?id=2339176 https://www.cve.org/CVERecord?id=CVE-2025-22150 https://nvd.nist.gov/vuln/detail/CVE-2025-22150 https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113 https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0 https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385 https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975 https://hackerone.com/reports/2913312 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22150.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.13.1-1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;i+IfpRQo89HWL/sPRoOFsw==&#34;: {&#xA;      &#34;id&#34;: &#34;i+IfpRQo89HWL/sPRoOFsw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0799&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to a use-after-free problem in the extractContigSamplesShifted32bits function in tools/tiffcrop.c, resulting in a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0799 https://bugzilla.redhat.com/show_bug.cgi?id=2170162 https://www.cve.org/CVERecord?id=CVE-2023-0799 https://nvd.nist.gov/vuln/detail/CVE-2023-0799 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0799.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;i1aZclSgDVfSpq3wWatknQ==&#34;: {&#xA;      &#34;id&#34;: &#34;i1aZclSgDVfSpq3wWatknQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3826&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Libiberty. A heap and stack buffer overflow found in the dlang_lname function in d-demangle.c leads to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-09-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3826 https://bugzilla.redhat.com/show_bug.cgi?id=2122627 https://www.cve.org/CVERecord?id=CVE-2021-3826 https://nvd.nist.gov/vuln/detail/CVE-2021-3826 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3826.json https://access.redhat.com/errata/RHSA-2023:6372&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:10.2-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;i1iqh+iGOleBv5v21I50xw==&#34;: {&#xA;      &#34;id&#34;: &#34;i1iqh+iGOleBv5v21I50xw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-37891&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in urllib3, an HTTP client library for Python. In certain configurations, urllib3 does not treat the `Proxy-Authorization` HTTP header as one carrying authentication material. This issue results in not stripping the header on cross-origin redirects.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-37891 https://bugzilla.redhat.com/show_bug.cgi?id=2292788 https://www.cve.org/CVERecord?id=CVE-2024-37891 https://nvd.nist.gov/vuln/detail/CVE-2024-37891 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-37891.json https://access.redhat.com/errata/RHSA-2024:6162&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-urllib3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.26.5-5.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;i2CsObRdsFCFCIvnyVzw5g==&#34;: {&#xA;      &#34;id&#34;: &#34;i2CsObRdsFCFCIvnyVzw5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66863&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in BinUtils. Attackers can exploit this vulnerability by providing a specially crafted Portable Executable (PE) file. This can lead to a denial of service, making the affected application unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66863 https://bugzilla.redhat.com/show_bug.cgi?id=2425824 https://www.cve.org/CVERecord?id=CVE-2025-66863 https://nvd.nist.gov/vuln/detail/CVE-2025-66863 https://github.com/caozhzh/CRGF-Vul/blob/main/cxxfilt/crash2.md https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66863.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;i3BrKsmhYf5wZYkQCBxUGw==&#34;: {&#xA;      &#34;id&#34;: &#34;i3BrKsmhYf5wZYkQCBxUGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-43618&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in gmp. An integer overflow vulnerability could allow an attacker to input an integer value leading to a crash. The highest threat from this vulnerability is to system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-11-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-43618 https://bugzilla.redhat.com/show_bug.cgi?id=2024904 https://www.cve.org/CVERecord?id=CVE-2021-43618 https://nvd.nist.gov/vuln/detail/CVE-2021-43618 https://bugs.debian.org/994405 https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-43618.json https://access.redhat.com/errata/RHSA-2023:6661&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gmp&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:6.2.0-13.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;i6aHe7Qjo768bvS9xSorFw==&#34;: {&#xA;      &#34;id&#34;: &#34;i6aHe7Qjo768bvS9xSorFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-40403&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxslt package. Processing web content may disclose sensitive information. This issue was addressed with improved memory handling.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-26T20:14:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-40403 https://bugzilla.redhat.com/show_bug.cgi?id=2349766 https://www.cve.org/CVERecord?id=CVE-2023-40403 https://nvd.nist.gov/vuln/detail/CVE-2023-40403 http://seclists.org/fulldisclosure/2023/Oct/10 http://seclists.org/fulldisclosure/2023/Oct/3 http://seclists.org/fulldisclosure/2023/Oct/4 http://seclists.org/fulldisclosure/2023/Oct/5 http://seclists.org/fulldisclosure/2023/Oct/6 http://seclists.org/fulldisclosure/2023/Oct/8 http://seclists.org/fulldisclosure/2023/Oct/9 https://bugs.chromium.org/p/chromium/issues/detail?id=1356211 https://bugzilla.gnome.org/show_bug.cgi?id=751621 https://gitlab.gnome.org/GNOME/libxslt/-/issues/94 https://support.apple.com/en-us/HT213927 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-40403.json https://access.redhat.com/errata/RHSA-2026:6266&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxslt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.1.34-14.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;i8zmTjiP3YXXew6ZKB2Ogg==&#34;: {&#xA;      &#34;id&#34;: &#34;i8zmTjiP3YXXew6ZKB2Ogg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21710&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21710 https://bugzilla.redhat.com/show_bug.cgi?id=2453151 https://www.cve.org/CVERecord?id=CVE-2026-21710 https://nvd.nist.gov/vuln/detail/CVE-2026-21710 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21710.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iA/QQjWhvxyNLUaetWDlcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;iA/QQjWhvxyNLUaetWDlcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0727&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The optional ContentInfo fields can be set to null, even if the \&#34;type\&#34; is a valid value, which can lead to a null dereference error that may cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0727 https://bugzilla.redhat.com/show_bug.cgi?id=2259944 https://www.cve.org/CVERecord?id=CVE-2024-0727 https://nvd.nist.gov/vuln/detail/CVE-2024-0727 https://github.com/openssl/openssl/pull/23362 https://www.openssl.org/news/secadv/20240125.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0727.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iACEEOg8p4u2oul22eTv+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;iACEEOg8p4u2oul22eTv+Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3358&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL, where it incorrectly handles legacy custom ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other similarly named encryption and decryption initialization functions). Instead of using the custom cipher directly, it incorrectly tries to fetch an equivalent cipher from the available providers. An equivalent cipher is found based on the NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a given cipher. However, it is possible for an application to incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef is used this way, the OpenSSL encryption/decryption initialization function will match the NULL cipher as equivalent and fetch this from the available providers. This is successful if the default provider has been loaded (or if a third-party provider has been loaded that offers this cipher). Using the NULL cipher means that the plaintext is emitted as the ciphertext.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3358 https://bugzilla.redhat.com/show_bug.cgi?id=2134740 https://www.cve.org/CVERecord?id=CVE-2022-3358 https://nvd.nist.gov/vuln/detail/CVE-2022-3358 https://www.openssl.org/news/secadv/20221011.txt https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3358.json https://access.redhat.com/errata/RHSA-2023:2523&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-6.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iAZzrtYDqIG5uluq/FjhDA==&#34;: {&#xA;      &#34;id&#34;: &#34;iAZzrtYDqIG5uluq/FjhDA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-26465&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client&#39;s memory resource first, turning the attack complexity high.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-26465 https://bugzilla.redhat.com/show_bug.cgi?id=2344780 https://www.cve.org/CVERecord?id=CVE-2025-26465 https://nvd.nist.gov/vuln/detail/CVE-2025-26465 https://access.redhat.com/solutions/7109879 https://seclists.org/oss-sec/2025/q1/144 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-26465.json https://access.redhat.com/errata/RHSA-2025:6993&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-45.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iE+bfILM7uszXcxvEd6gYA==&#34;: {&#xA;      &#34;id&#34;: &#34;iE+bfILM7uszXcxvEd6gYA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23165&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ReadFileUtf8 internal binding of Node.js. This vulnerability can allow an attacker to cause an application denial of service via repeated file read operations that trigger an unrecoverable memory leak due to a corrupted pointer in the underlying file system binding.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23165 https://bugzilla.redhat.com/show_bug.cgi?id=2367162 https://www.cve.org/CVERecord?id=CVE-2025-23165 https://nvd.nist.gov/vuln/detail/CVE-2025-23165 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23165.json https://access.redhat.com/errata/RHSA-2025:8467&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.16.0-1.module+el9.6.0+23151+b1496e9d&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iEtbVUUM9WmTLHwIzUrGAw==&#34;: {&#xA;      &#34;id&#34;: &#34;iEtbVUUM9WmTLHwIzUrGAw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;: {&#xA;      &#34;id&#34;: &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68972&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. An adversary can exploit this vulnerability by crafting a signed message that includes a form feed character (\\f) at the end of a plaintext line. This allows the adversary to append additional, unsigned text to the message while the signature verification still reports success. This issue leads to an integrity bypass, potentially enabling the spoofing of signed communications.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-27T22:52:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68972 https://bugzilla.redhat.com/show_bug.cgi?id=2425646 https://www.cve.org/CVERecord?id=CVE-2025-68972 https://nvd.nist.gov/vuln/detail/CVE-2025-68972 https://gpg.fail/formfeed https://news.ycombinator.com/item?id=46404339 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68972.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iFYspvRjIYFKUw7Fpj3PSg==&#34;: {&#xA;      &#34;id&#34;: &#34;iFYspvRjIYFKUw7Fpj3PSg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34982&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. A modeline is used to set specific editor options directly from a text file. However, the `complete`, `guitabtooltip`, `printheader` options and the `mapset` function lack proper security checks, allowing an attacker to bypass restrictions and cause arbitrary OS command execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T15:16:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34982 https://bugzilla.redhat.com/show_bug.cgi?id=2455400 https://www.cve.org/CVERecord?id=CVE-2026-34982 https://nvd.nist.gov/vuln/detail/CVE-2026-34982 http://www.openwall.com/lists/oss-security/2026/04/01/1 https://github.com/vim/vim/commit/75661a66a1db1e1f3f1245c615 https://github.com/vim/vim/releases/tag/v9.2.0276 https://github.com/vim/vim/security/advisories/GHSA-8h6p-m6gr-mpw9 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34982.json https://access.redhat.com/errata/RHSA-2026:11510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iJ/65EjB0RUIoiFFN5HgAw==&#34;: {&#xA;      &#34;id&#34;: &#34;iJ/65EjB0RUIoiFFN5HgAw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0800&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds write in the extractContigSamplesShifted16bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited data modification.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0800 https://bugzilla.redhat.com/show_bug.cgi?id=2170167 https://www.cve.org/CVERecord?id=CVE-2023-0800 https://nvd.nist.gov/vuln/detail/CVE-2023-0800 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0800.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iK/w4oP0ry88Fhi1iG/FpA==&#34;: {&#xA;      &#34;id&#34;: &#34;iK/w4oP0ry88Fhi1iG/FpA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-SelectSaver&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.02-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iKVtZrDNXfISjmDp1xYKBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;iKVtZrDNXfISjmDp1xYKBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39322&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39322 https://bugzilla.redhat.com/show_bug.cgi?id=2237778 https://www.cve.org/CVERecord?id=CVE-2023-39322 https://nvd.nist.gov/vuln/detail/CVE-2023-39322 https://go.dev/cl/523039 https://go.dev/issue/62266 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2045.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39322.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iL/VOECJBzyFgTCwWDppVw==&#34;: {&#xA;      &#34;id&#34;: &#34;iL/VOECJBzyFgTCwWDppVw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22025&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22025 https://bugzilla.redhat.com/show_bug.cgi?id=2270559 https://www.cve.org/CVERecord?id=CVE-2024-22025 https://nvd.nist.gov/vuln/detail/CVE-2024-22025 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22025.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iMwaCmNtKHrK2+scb+hkxw==&#34;: {&#xA;      &#34;id&#34;: &#34;iMwaCmNtKHrK2+scb+hkxw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27982&#34;,&#xA;      &#34;description&#34;: &#34;An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27982 https://bugzilla.redhat.com/show_bug.cgi?id=2275392 https://www.cve.org/CVERecord?id=CVE-2024-27982 https://nvd.nist.gov/vuln/detail/CVE-2024-27982 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27982.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iQtqv3HeCGvWBf2ImnFK1w==&#34;: {&#xA;      &#34;id&#34;: &#34;iQtqv3HeCGvWBf2ImnFK1w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8941&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a \&#34;complete\&#34; fix for CVE-2025-6020.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8941 https://bugzilla.redhat.com/show_bug.cgi?id=2388220 https://www.cve.org/CVERecord?id=CVE-2025-8941 https://nvd.nist.gov/vuln/detail/CVE-2025-8941 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8941.json https://access.redhat.com/errata/RHSA-2025:15099&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.5.1-26.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iRRK+UGfH5YqM+4LOHExpQ==&#34;: {&#xA;      &#34;id&#34;: &#34;iRRK+UGfH5YqM+4LOHExpQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45492&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat&#39;s internal nextScaffoldPart function in xmlparse.c. It can have an integer overflow for m_groupSize on 32-bit platforms where UINT_MAX equals SIZE_MAX.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-30T03:15:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45492 https://bugzilla.redhat.com/show_bug.cgi?id=2308617 https://www.cve.org/CVERecord?id=CVE-2024-45492 https://nvd.nist.gov/vuln/detail/CVE-2024-45492 https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes https://github.com/libexpat/libexpat/issues/889 https://github.com/libexpat/libexpat/pull/892 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45492.json https://access.redhat.com/errata/RHSA-2024:6754&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-2.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iRvSvKSGVLHqIXREJ4Ht/w==&#34;: {&#xA;      &#34;id&#34;: &#34;iRvSvKSGVLHqIXREJ4Ht/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0464&#34;,&#xA;      &#34;description&#34;: &#34;A security vulnerability has been identified in all supported OpenSSL versions related to verifying X.509 certificate chains that include policy constraints. This flaw allows attackers to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial of service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the -policy&#39; argument to the command line utilities or calling the X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0464 https://bugzilla.redhat.com/show_bug.cgi?id=2181082 https://www.cve.org/CVERecord?id=CVE-2023-0464 https://nvd.nist.gov/vuln/detail/CVE-2023-0464 https://www.openssl.org/news/secadv/20230322.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0464.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iSsTR9jTS/494HfIgB9pGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;iSsTR9jTS/494HfIgB9pGQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25815&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security flaw occurs when Git compiles with runtime prefix support and runs without translated messages, and it still uses the gettext machinery to display messages, which subsequently looks for translated messages in unexpected places. This flaw allows the malicious placement of crafted messages.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25815 https://bugzilla.redhat.com/show_bug.cgi?id=2188337 https://www.cve.org/CVERecord?id=CVE-2023-25815 https://nvd.nist.gov/vuln/detail/CVE-2023-25815 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25815.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iSzOvPxPGZr2PfJTBTQBCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;iSzOvPxPGZr2PfJTBTQBCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-29040&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the tpm2-tss package, where it was not checked to see if the magic number in the attest is equal to the TPM2_GENERATED_VALUE. This flaw allows an attacker to generate arbitrary quote data, which may not be detected by Fapi_VerifyQuote.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-29040 https://bugzilla.redhat.com/show_bug.cgi?id=2278077 https://www.cve.org/CVERecord?id=CVE-2024-29040 https://nvd.nist.gov/vuln/detail/CVE-2024-29040 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-29040.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tpm2-tss&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iTrL6dXRPICy+0Wmi1qlPw==&#34;: {&#xA;      &#34;id&#34;: &#34;iTrL6dXRPICy+0Wmi1qlPw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23085&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23085 https://bugzilla.redhat.com/show_bug.cgi?id=2342618 https://www.cve.org/CVERecord?id=CVE-2025-23085 https://nvd.nist.gov/vuln/detail/CVE-2025-23085 https://nodejs.org/pt/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23085.json https://access.redhat.com/errata/RHSA-2025:1443&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.18.2-1.module+el9.5.0+22758+4ad2c198&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iUURXijANkMZIH/VbXWyYQ==&#34;: {&#xA;      &#34;id&#34;: &#34;iUURXijANkMZIH/VbXWyYQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23918&#34;,&#xA;      &#34;description&#34;: &#34;A privilege escalation vulnerability exists in Node.js \u003c19.6.1, \u003c18.14.1, \u003c16.19.1 and \u003c14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23918 https://bugzilla.redhat.com/show_bug.cgi?id=2171935 https://www.cve.org/CVERecord?id=CVE-2023-23918 https://nvd.nist.gov/vuln/detail/CVE-2023-23918 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23918.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iWIsGkw9mQk/URE9m7xoVA==&#34;: {&#xA;      &#34;id&#34;: &#34;iWIsGkw9mQk/URE9m7xoVA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59465&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been discovered in NodeJS. A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59465 https://bugzilla.redhat.com/show_bug.cgi?id=2431349 https://www.cve.org/CVERecord?id=CVE-2025-59465 https://nvd.nist.gov/vuln/detail/CVE-2025-59465 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59465.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iYahLjRBvYk4Zq4Nz9JtHg==&#34;: {&#xA;      &#34;id&#34;: &#34;iYahLjRBvYk4Zq4Nz9JtHg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66382&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. This vulnerability allows a denial of service (DoS) by processing a crafted file with an approximate size of 2 MiB, leading to dozens of seconds of processing time.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66382 https://bugzilla.redhat.com/show_bug.cgi?id=2417661 https://www.cve.org/CVERecord?id=CVE-2025-66382 https://nvd.nist.gov/vuln/detail/CVE-2025-66382 https://github.com/libexpat/libexpat/issues/1076 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66382.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ibGOv13N1m/577Kb32wGxw==&#34;: {&#xA;      &#34;id&#34;: &#34;ibGOv13N1m/577Kb32wGxw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34156&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34156 https://bugzilla.redhat.com/show_bug.cgi?id=2310528 https://www.cve.org/CVERecord?id=CVE-2024-34156 https://nvd.nist.gov/vuln/detail/CVE-2024-34156 https://go.dev/cl/611239 https://go.dev/issue/69139 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3106 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34156.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;icr9XD5DN3YDWvP3naYL+g==&#34;: {&#xA;      &#34;id&#34;: &#34;icr9XD5DN3YDWvP3naYL+g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5450&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc (GNU C Library). This vulnerability occurs when an application uses the `scanf` family of functions with a `%mc` format specifier, which is used for dynamically allocating memory for character input, and provides an explicit width greater than 1024. This specific combination can lead to a one-byte heap buffer overflow, potentially allowing an attacker to corrupt memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-20T20:55:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5450 https://bugzilla.redhat.com/show_bug.cgi?id=2459853 https://www.cve.org/CVERecord?id=CVE-2026-5450 https://nvd.nist.gov/vuln/detail/CVE-2026-5450 https://inbox.sourceware.org/libc-announce/b11f0003-6ec1-4bd6-b9de-9e38a4efeca3@redhat.com/T/#u https://nvd.nist.gov/vuln/detail/CVE-2026-5450#range-21286997 https://sourceware.org/bugzilla/show_bug.cgi?id=CVE-2026-5450 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5450.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ifl87FYu8EGpCz9Lakl+qg==&#34;: {&#xA;      &#34;id&#34;: &#34;ifl87FYu8EGpCz9Lakl+qg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55132&#34;,&#xA;      &#34;description&#34;: &#34;A file access flaw has been discovered in NodeJS. A file&#39;s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55132 https://bugzilla.redhat.com/show_bug.cgi?id=2431338 https://www.cve.org/CVERecord?id=CVE-2025-55132 https://nvd.nist.gov/vuln/detail/CVE-2025-55132 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55132.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iguNGuUCiP6eJSJt14Jo4g==&#34;: {&#xA;      &#34;id&#34;: &#34;iguNGuUCiP6eJSJt14Jo4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1526&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \&#34;decompression bomb,\&#34; during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:08:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1526 https://bugzilla.redhat.com/show_bug.cgi?id=2447142 https://www.cve.org/CVERecord?id=CVE-2026-1526 https://nvd.nist.gov/vuln/detail/CVE-2026-1526 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q https://hackerone.com/reports/3481206 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1526.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ihcyIiYlnktNuXSrEgrQjg==&#34;: {&#xA;      &#34;id&#34;: &#34;ihcyIiYlnktNuXSrEgrQjg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ijNNBHI8o+gObvRZ97LRdA==&#34;: {&#xA;      &#34;id&#34;: &#34;ijNNBHI8o+gObvRZ97LRdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35937&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35937 https://bugzilla.redhat.com/show_bug.cgi?id=1964125 https://www.cve.org/CVERecord?id=CVE-2021-35937 https://nvd.nist.gov/vuln/detail/CVE-2021-35937 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35937.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-build-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ija3h8P09PxwjEuLSUS2HA==&#34;: {&#xA;      &#34;id&#34;: &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4438&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C library (glibc). When applications use the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, the library may return an invalid DNS hostname. This violates the DNS specification and could lead to applications receiving incorrect hostname information, potentially impacting network operations or security decisions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T19:59:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4438 https://bugzilla.redhat.com/show_bug.cgi?id=2449783 https://www.cve.org/CVERecord?id=CVE-2026-4438 https://nvd.nist.gov/vuln/detail/CVE-2026-4438 https://sourceware.org/bugzilla/show_bug.cgi?id=34015 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4438.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ikYp9FVR/trdSFxeYpqAcA==&#34;: {&#xA;      &#34;id&#34;: &#34;ikYp9FVR/trdSFxeYpqAcA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38408&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in OpenSSH has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system (the code in /usr/lib is not necessarily safe for loading into ssh-agent). This flaw allows an attacker with control of the forwarded agent-socket on the server and the ability to write to the filesystem of the client host to execute arbitrary code with the privileges of the user running the ssh-agent.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38408 https://bugzilla.redhat.com/show_bug.cgi?id=2224173 https://www.cve.org/CVERecord?id=CVE-2023-38408 https://nvd.nist.gov/vuln/detail/CVE-2023-38408 https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38408.json https://access.redhat.com/errata/RHSA-2023:4412&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-30.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;injDY40WUdFqTiXseelJog==&#34;: {&#xA;      &#34;id&#34;: &#34;injDY40WUdFqTiXseelJog==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26996&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-20T03:05:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26996 https://bugzilla.redhat.com/show_bug.cgi?id=2441268 https://www.cve.org/CVERecord?id=CVE-2026-26996 https://nvd.nist.gov/vuln/detail/CVE-2026-26996 https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26996.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.20.2.1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;isT7miwloz6n/DNr9N8lHA==&#34;: {&#xA;      &#34;id&#34;: &#34;isT7miwloz6n/DNr9N8lHA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61732&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s &#39;cgo tool&#39;. This vulnerability arises from a discrepancy in how Go and C/C++ comments are parsed, which allows for malicious code to be hidden within comments and then \&#34;smuggled\&#34; into the compiled `cgo` binary. An attacker could exploit this to embed and execute arbitrary code, potentially leading to significant system compromise.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T03:42:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61732 https://bugzilla.redhat.com/show_bug.cgi?id=2437016 https://www.cve.org/CVERecord?id=CVE-2025-61732 https://nvd.nist.gov/vuln/detail/CVE-2025-61732 https://go.dev/cl/734220 https://go.dev/issue/76697 https://groups.google.com/g/golang-announce/c/K09ubi9FQFk https://pkg.go.dev/vuln/GO-2026-4433 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61732.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iveVedfC78Qk/6ltHJ21kQ==&#34;: {&#xA;      &#34;id&#34;: &#34;iveVedfC78Qk/6ltHJ21kQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34397&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNOME GLib. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This issue could lead to the GDBus-based client behaving incorrectly with an application-dependent impact.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34397 https://bugzilla.redhat.com/show_bug.cgi?id=2279632 https://www.cve.org/CVERecord?id=CVE-2024-34397 https://nvd.nist.gov/vuln/detail/CVE-2024-34397 https://gitlab.gnome.org/GNOME/glib/-/issues/3268 https://www.openwall.com/lists/oss-security/2024/05/07/5 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34397.json https://access.redhat.com/errata/RHSA-2024:6464&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-14.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ixD2h349uZz3eCy55KxIlw==&#34;: {&#xA;      &#34;id&#34;: &#34;ixD2h349uZz3eCy55KxIlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;: {&#xA;      &#34;id&#34;: &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32636&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32636 https://bugzilla.redhat.com/show_bug.cgi?id=2211833 https://www.cve.org/CVERecord?id=CVE-2023-32636 https://nvd.nist.gov/vuln/detail/CVE-2023-32636 https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835 https://gitlab.gnome.org/GNOME/glib/-/issues/2841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32636.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ixlSuy1zsWjDOO7lFuUNAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ixlSuy1zsWjDOO7lFuUNAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;izYg2kL7sTEI8ASmlxRCdA==&#34;: {&#xA;      &#34;id&#34;: &#34;izYg2kL7sTEI8ASmlxRCdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24785&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s html/template standard library package. If errors returned from MarshalJSON methods contain user-controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing subsequent actions to inject unexpected content into templates.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24785 https://bugzilla.redhat.com/show_bug.cgi?id=2268022 https://www.cve.org/CVERecord?id=CVE-2024-24785 https://nvd.nist.gov/vuln/detail/CVE-2024-24785 https://go.dev/cl/564196 https://go.dev/issue/65697 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg https://vuln.go.dev/ID/GO-2024-2610.json https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24785.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;j/6W06GHqfn2irJJ7LDKTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;j/6W06GHqfn2irJJ7LDKTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1255&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security flaw occurs because the AES-XTS cipher decryption implementation for the 64-bit ARM platform contains an issue that could cause it to read past the input buffer, leading to a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1255 https://bugzilla.redhat.com/show_bug.cgi?id=2188461 https://www.cve.org/CVERecord?id=CVE-2023-1255 https://nvd.nist.gov/vuln/detail/CVE-2023-1255 https://www.openssl.org/news/secadv/20230420.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1255.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;j/Ffe29Pz7uoI3ROVu3/hw==&#34;: {&#xA;      &#34;id&#34;: &#34;j/Ffe29Pz7uoI3ROVu3/hw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29458&#34;,&#xA;      &#34;description&#34;: &#34;A segmentation fault vulnerability was found in ncurses&#39;s convert_strings() function of tinfo/read_entry.c file. This flaw occurs due to corrupted terminfo data, triggering an out-of-bounds read error.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-04-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-29458 https://bugzilla.redhat.com/show_bug.cgi?id=2076483 https://www.cve.org/CVERecord?id=CVE-2022-29458 https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-29458.json https://access.redhat.com/errata/RHSA-2025:12876&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:6.2-10.20210508.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;: {&#xA;      &#34;id&#34;: &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;j2qyk9XQmGp7ssMhZKM8jg==&#34;: {&#xA;      &#34;id&#34;: &#34;j2qyk9XQmGp7ssMhZKM8jg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25749&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, an open source, command line text editor. This heap buffer overflow vulnerability exists in the tag file resolution logic when processing the &#39;helpfile&#39; option. A local user could exploit this by providing a specially crafted &#39;helpfile&#39; option value, leading to a heap buffer overflow. This could result in arbitrary code execution or a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-06T22:43:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25749 https://bugzilla.redhat.com/show_bug.cgi?id=2437843 https://www.cve.org/CVERecord?id=CVE-2026-25749 https://nvd.nist.gov/vuln/detail/CVE-2026-25749 https://github.com/vim/vim/commit/0714b15940b245108e6e9d7aa2260dd849a26fa9 https://github.com/vim/vim/releases/tag/v9.1.2132 https://github.com/vim/vim/security/advisories/GHSA-5w93-4g67-mm43 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25749.json https://access.redhat.com/errata/RHSA-2026:5602&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;j3PAipb/hCxnbdoUmJvkNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;j3PAipb/hCxnbdoUmJvkNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61984&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH where control characters in usernames were not properly validated when sourced from untrusted inputs like the command line or configuration expansion. If a ProxyCommand is used, these control characters could modify command behavior, potentially leading to code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61984 https://bugzilla.redhat.com/show_bug.cgi?id=2401960 https://www.cve.org/CVERecord?id=CVE-2025-61984 https://nvd.nist.gov/vuln/detail/CVE-2025-61984 https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2 https://www.openssh.com/releasenotes.html#10.1p1 https://www.openwall.com/lists/oss-security/2025/10/06/1 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61984.json https://access.redhat.com/errata/RHSA-2025:23480&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-47.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;j7HjBQaZ5PNpv7JydPZ8OQ==&#34;: {&#xA;      &#34;id&#34;: &#34;j7HjBQaZ5PNpv7JydPZ8OQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23166&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, specifically in the C++ method SignTraits::DeriveBits(). This vulnerability can allow a remote attacker to crash the Node.js runtime via untrusted input, triggering an exception in a background thread.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23166 https://bugzilla.redhat.com/show_bug.cgi?id=2367163 https://www.cve.org/CVERecord?id=CVE-2025-23166 https://nvd.nist.gov/vuln/detail/CVE-2025-23166 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23166.json https://access.redhat.com/errata/RHSA-2025:8468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.19.2.1.module+el9.6.0+23146+be9976bd&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;j7ssITCzXW4N87uje7nkZg==&#34;: {&#xA;      &#34;id&#34;: &#34;j7ssITCzXW4N87uje7nkZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61731&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in cmd/go. An attacker can exploit this by building a malicious Go source file that uses the &#39;#cgo pkg-config:&#39; directive. This allows the attacker to write to an arbitrary file with partial control over its content, by providing a &#39;--log-file&#39; argument to the pkg-config command. This vulnerability can lead to arbitrary file write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61731 https://bugzilla.redhat.com/show_bug.cgi?id=2434433 https://www.cve.org/CVERecord?id=CVE-2025-61731 https://nvd.nist.gov/vuln/detail/CVE-2025-61731 https://go.dev/cl/736711 https://go.dev/issue/77100 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4339 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61731.json https://access.redhat.com/errata/RHSA-2026:5942&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.8-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;j7yoSCks+i8LevHtgFwCwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;j7yoSCks+i8LevHtgFwCwQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24056&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in pkgconf, where a variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c:pkgconf_tuple_parse. This issue may lead to a buffer overflow, which can crash the software.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24056 https://bugzilla.redhat.com/show_bug.cgi?id=2165034 https://www.cve.org/CVERecord?id=CVE-2023-24056 https://nvd.nist.gov/vuln/detail/CVE-2023-24056 https://nullprogram.com/blog/2023/01/18/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24056.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pkgconf&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;j8SFSR8BZ09zBKgRkzC7Jg==&#34;: {&#xA;      &#34;id&#34;: &#34;j8SFSR8BZ09zBKgRkzC7Jg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61985&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH where the SSH client accepted \\0 (null) characters in ssh:// URIs. When a ProxyCommand is configured, these characters could alter how the command is parsed, potentially leading to code execution depending on how the proxy is set up.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61985 https://bugzilla.redhat.com/show_bug.cgi?id=2401962 https://www.cve.org/CVERecord?id=CVE-2025-61985 https://nvd.nist.gov/vuln/detail/CVE-2025-61985 https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2 https://www.openssh.com/releasenotes.html#10.1p1 https://www.openwall.com/lists/oss-security/2025/10/06/1 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61985.json https://access.redhat.com/errata/RHSA-2025:23480&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-47.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;j8vL1GycOevI00+qC9aKmw==&#34;: {&#xA;      &#34;id&#34;: &#34;j8vL1GycOevI00+qC9aKmw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35939&#34;,&#xA;      &#34;description&#34;: &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35939 https://bugzilla.redhat.com/show_bug.cgi?id=1964129 https://www.cve.org/CVERecord?id=CVE-2021-35939 https://nvd.nist.gov/vuln/detail/CVE-2021-35939 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35939.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jDj44frt+6TCj0cwExt14w==&#34;: {&#xA;      &#34;id&#34;: &#34;jDj44frt+6TCj0cwExt14w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25062&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free flaw was found in libxml2. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25062 https://bugzilla.redhat.com/show_bug.cgi?id=2262726 https://www.cve.org/CVERecord?id=CVE-2024-25062 https://nvd.nist.gov/vuln/detail/CVE-2024-25062 https://gitlab.gnome.org/GNOME/libxml2/-/issues/604 https://gitlab.gnome.org/GNOME/libxml2/-/tags https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25062.json https://access.redhat.com/errata/RHSA-2024:2679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jGwIyHTli8TFB8vvlYRLgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;jGwIyHTli8TFB8vvlYRLgQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32284&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the msgpack decoder. A remote attacker could send specially crafted, truncated fixext data to an application using the msgpack library. This improper input validation can lead to an out-of-bounds read and a runtime panic, resulting in a denial of service (DoS) attack against the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-26T19:40:51Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32284 https://bugzilla.redhat.com/show_bug.cgi?id=2451851 https://www.cve.org/CVERecord?id=CVE-2026-32284 https://nvd.nist.gov/vuln/detail/CVE-2026-32284 https://github.com/golang/vulndb/issues/4513 https://github.com/shamaton/msgpack/issues/59 https://pkg.go.dev/vuln/GO-2026-4513 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32284.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jL7k69KOM8ZjTH+gwznwQg==&#34;: {&#xA;      &#34;id&#34;: &#34;jL7k69KOM8ZjTH+gwznwQg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-1039&#34;,&#xA;      &#34;description&#34;: &#34;Memory exhaustion when compiling regular expressions in regexp/syntax&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-06T16:42:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/55949 https://go.dev/cl/439356 https://groups.google.com/g/golang-announce/c/xtuG5faxtaU&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.7&#34;&#xA;    },&#xA;    &#34;jM18i6BgFcWSycW3ixuZHw==&#34;: {&#xA;      &#34;id&#34;: &#34;jM18i6BgFcWSycW3ixuZHw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61729&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-02T18:54:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61729 https://bugzilla.redhat.com/show_bug.cgi?id=2418462 https://www.cve.org/CVERecord?id=CVE-2025-61729 https://nvd.nist.gov/vuln/detail/CVE-2025-61729 https://go.dev/cl/725920 https://go.dev/issue/76445 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 https://pkg.go.dev/vuln/GO-2025-4155 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61729.json https://access.redhat.com/errata/RHSA-2026:0923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.5-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jVeIQzIm92EdkbCIlGT1qA==&#34;: {&#xA;      &#34;id&#34;: &#34;jVeIQzIm92EdkbCIlGT1qA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3153&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim, where it is vulnerable to a null-pointer-dereference in the vim_regcomp() function. This flaw allows a specially crafted file to crash a program or execute code.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3153 https://bugzilla.redhat.com/show_bug.cgi?id=2126401 https://www.cve.org/CVERecord?id=CVE-2022-3153 https://nvd.nist.gov/vuln/detail/CVE-2022-3153 https://huntr.dev/bounties/68331124-620d-48bc-a8fa-cd947b26270a/ https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3153.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jY7qsjEMOfcaNJkgI4dijw==&#34;: {&#xA;      &#34;id&#34;: &#34;jY7qsjEMOfcaNJkgI4dijw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-26966&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to an out-of-bounds read in the uv_encode function in libtiff/tif_luv.c, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-26966 https://bugzilla.redhat.com/show_bug.cgi?id=2218749 https://www.cve.org/CVERecord?id=CVE-2023-26966 https://nvd.nist.gov/vuln/detail/CVE-2023-26966 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-26966.json https://access.redhat.com/errata/RHSA-2023:6575&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jYkhobM1mHtLOwQie8WeWA==&#34;: {&#xA;      &#34;id&#34;: &#34;jYkhobM1mHtLOwQie8WeWA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27982&#34;,&#xA;      &#34;description&#34;: &#34;An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27982 https://bugzilla.redhat.com/show_bug.cgi?id=2275392 https://www.cve.org/CVERecord?id=CVE-2024-27982 https://nvd.nist.gov/vuln/detail/CVE-2024-27982 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27982.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jYmxPZjDM/CNw9uJ4rnMHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;jYmxPZjDM/CNw9uJ4rnMHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jZXEa4mdIQd85t4aOIhsfA==&#34;: {&#xA;      &#34;id&#34;: &#34;jZXEa4mdIQd85t4aOIhsfA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12087&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client&#39;s intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T15:06:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12087 https://bugzilla.redhat.com/show_bug.cgi?id=2330672 https://www.cve.org/CVERecord?id=CVE-2024-12087 https://nvd.nist.gov/vuln/detail/CVE-2024-12087 https://kb.cert.org/vuls/id/952657 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12087.json https://access.redhat.com/errata/RHSA-2025:7050&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.2.5-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jZq7+x+5y+AXKvl07ivVBg==&#34;: {&#xA;      &#34;id&#34;: &#34;jZq7+x+5y+AXKvl07ivVBg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1525&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \&#34;Content-Length\&#34; and \&#34;content-length\&#34;). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T19:56:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1525 https://bugzilla.redhat.com/show_bug.cgi?id=2447144 https://www.cve.org/CVERecord?id=CVE-2026-1525 https://nvd.nist.gov/vuln/detail/CVE-2026-1525 https://cna.openjsf.org/security-advisories.html https://cwe.mitre.org/data/definitions/444.html https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm https://hackerone.com/reports/3556037 https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1525.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jbS9IFs59O0uPYg9IZeksQ==&#34;: {&#xA;      &#34;id&#34;: &#34;jbS9IFs59O0uPYg9IZeksQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-11168&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The `urllib.parse.urlsplit()` and `urlparse()` functions improperly validated bracketed hosts (`[]`), allowing hosts that weren&#39;t IPv6 or IPvFuture compliant. This behavior was not conformant to RFC 3986 and was potentially vulnerable to server-side request forgery (SSRF) if a URL is processed by more than one URL parser.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-12T21:22:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-11168 https://bugzilla.redhat.com/show_bug.cgi?id=2325776 https://www.cve.org/CVERecord?id=CVE-2024-11168 https://nvd.nist.gov/vuln/detail/CVE-2024-11168 https://github.com/python/cpython/commit/29f348e232e82938ba2165843c448c2b291504c5 https://github.com/python/cpython/commit/b2171a2fd41416cf68afd67460578631d755a550 https://github.com/python/cpython/issues/103848 https://github.com/python/cpython/pull/103849 https://mail.python.org/archives/list/security-announce@python.org/thread/XPWB6XVZ5G5KGEI63M4AWLIEUF5BPH4T/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11168.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jcBNjU0VQp8W5rs9GaZnrw==&#34;: {&#xA;      &#34;id&#34;: &#34;jcBNjU0VQp8W5rs9GaZnrw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4904 https://bugzilla.redhat.com/show_bug.cgi?id=2168631 https://www.cve.org/CVERecord?id=CVE-2022-4904 https://nvd.nist.gov/vuln/detail/CVE-2022-4904 https://github.com/c-ares/c-ares/issues/496 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4904.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jcRqiXZ9kQjBDkPtzEXksQ==&#34;: {&#xA;      &#34;id&#34;: &#34;jcRqiXZ9kQjBDkPtzEXksQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55132&#34;,&#xA;      &#34;description&#34;: &#34;A file access flaw has been discovered in NodeJS. A file&#39;s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55132 https://bugzilla.redhat.com/show_bug.cgi?id=2431338 https://www.cve.org/CVERecord?id=CVE-2025-55132 https://nvd.nist.gov/vuln/detail/CVE-2025-55132 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55132.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jecTmyeay6DKd/7zioYjow==&#34;: {&#xA;      &#34;id&#34;: &#34;jecTmyeay6DKd/7zioYjow==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3277&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in SQLite’s `concat_ws()` function, where an integer overflow can be triggered. The resulting truncated integer can allocate a buffer. When SQLite writes the resulting string to the buffer, it uses the original, untruncated size, and a wild heap buffer overflow size of around 4GB can occur. This issue can result in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-14T16:50:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3277 https://bugzilla.redhat.com/show_bug.cgi?id=2359553 https://www.cve.org/CVERecord?id=CVE-2025-3277 https://nvd.nist.gov/vuln/detail/CVE-2025-3277 https://sqlite.org/src/info/498e3f1cf57f164f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3277.json https://access.redhat.com/errata/RHSA-2025:7433&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.2-1.22.15.0.1.module+el9.6.0+23062+9e7801b9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jh1Mqm3BaTYV6MdA+4D74g==&#34;: {&#xA;      &#34;id&#34;: &#34;jh1Mqm3BaTYV6MdA+4D74g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32559&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(&#39;spawn_sync&#39;) to run arbitrary code outside of the limits defined in a policy.json file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32559 https://bugzilla.redhat.com/show_bug.cgi?id=2230956 https://www.cve.org/CVERecord?id=CVE-2023-32559 https://nvd.nist.gov/vuln/detail/CVE-2023-32559 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32559.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27113&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a NULL pointer dereference, leading to a potential crash or denial of service via a crafted XML pattern.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27113 https://bugzilla.redhat.com/show_bug.cgi?id=2346410 https://www.cve.org/CVERecord?id=CVE-2025-27113 https://nvd.nist.gov/vuln/detail/CVE-2025-27113 https://gitlab.gnome.org/GNOME/libxml2/-/issues/861 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27113.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jlQB8YKpspXbBoHQT0JY7A==&#34;: {&#xA;      &#34;id&#34;: &#34;jlQB8YKpspXbBoHQT0JY7A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35937&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35937 https://bugzilla.redhat.com/show_bug.cgi?id=1964125 https://www.cve.org/CVERecord?id=CVE-2021-35937 https://nvd.nist.gov/vuln/detail/CVE-2021-35937 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35937.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-sign-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jlm8MnE+Ua07hmnpXd564A==&#34;: {&#xA;      &#34;id&#34;: &#34;jlm8MnE+Ua07hmnpXd564A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6237&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When the EVP_PKEY_public_check() function is called in RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is a large prime, this computation takes a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6237 https://bugzilla.redhat.com/show_bug.cgi?id=2258502 https://www.cve.org/CVERecord?id=CVE-2023-6237 https://nvd.nist.gov/vuln/detail/CVE-2023-6237 https://www.openssl.org/news/secadv/20240115.txt https://www.openwall.com/lists/oss-security/2024/01/15/2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6237.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jmCYpsGWnnwiehZQL2tyGg==&#34;: {&#xA;      &#34;id&#34;: &#34;jmCYpsGWnnwiehZQL2tyGg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jtuaBa5xeKFbUsOxJOGtDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;jtuaBa5xeKFbUsOxJOGtDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6395&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T07:56:53Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6395 https://bugzilla.redhat.com/show_bug.cgi?id=2376755 https://www.cve.org/CVERecord?id=CVE-2025-6395 https://nvd.nist.gov/vuln/detail/CVE-2025-6395 https://gitlab.com/gnutls/gnutls/-/issues/1718 https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6395.json https://access.redhat.com/errata/RHSA-2025:16116&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-6.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;juRvPdedfeoW/YVn4PBM8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;juRvPdedfeoW/YVn4PBM8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jujfK7kvNttCHbG9Y1cEjw==&#34;: {&#xA;      &#34;id&#34;: &#34;jujfK7kvNttCHbG9Y1cEjw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22873&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability has been identified in the Go os package affecting the Root abstraction, where improper handling of trailing path separators could allow access to the parent directory of a configured root directory. By supplying a filename ending in \&#34;../\&#34;, an attacker may be able to open the immediate parent directory of the intended Root. Although this escape does not allow traversal to higher-level ancestors or direct access to files within the parent directory, it may expose directory metadata or unintended filesystem structure if the application passes untrusted path input to Root.Open.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-04T23:05:24Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22873 https://bugzilla.redhat.com/show_bug.cgi?id=2436992 https://www.cve.org/CVERecord?id=CVE-2025-22873 https://nvd.nist.gov/vuln/detail/CVE-2025-22873 http://www.openwall.com/lists/oss-security/2025/05/06/2 https://go.dev/cl/670036 https://go.dev/issue/73555 https://groups.google.com/g/golang-announce/c/UZoIkUT367A/m/5WDxKizJAQAJ https://pkg.go.dev/vuln/GO-2026-4403 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22873.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jvIOr2cGPChl6X44xwkz2w==&#34;: {&#xA;      &#34;id&#34;: &#34;jvIOr2cGPChl6X44xwkz2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-48795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the SSH channel integrity. By manipulating sequence numbers during the handshake, an attacker can remove the initial messages on the secure channel without causing a MAC failure. For example, an attacker could disable the ping extension and thus disable the new countermeasure in OpenSSH 9.5 against keystroke timing attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-48795 https://bugzilla.redhat.com/show_bug.cgi?id=2254210 https://www.cve.org/CVERecord?id=CVE-2023-48795 https://nvd.nist.gov/vuln/detail/CVE-2023-48795 https://access.redhat.com/solutions/7071748 https://terrapin-attack.com/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48795.json https://access.redhat.com/errata/RHSA-2024:1130&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-34.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jweM09oSTMKt4t5s2Lpg9g==&#34;: {&#xA;      &#34;id&#34;: &#34;jweM09oSTMKt4t5s2Lpg9g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29400&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. Templates containing actions in unquoted HTML attributes, for example, \&#34;attr={{.}}\&#34;) executed with empty input, could result in output that has unexpected results when parsed due to HTML normalization rules. This issue may allow the injection of arbitrary attributes into tags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29400 https://bugzilla.redhat.com/show_bug.cgi?id=2196029 https://www.cve.org/CVERecord?id=CVE-2023-29400 https://nvd.nist.gov/vuln/detail/CVE-2023-29400 https://go.dev/issue/59722 https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29400.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jyRfRwiUvNWAyNlZmv3MkQ==&#34;: {&#xA;      &#34;id&#34;: &#34;jyRfRwiUvNWAyNlZmv3MkQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38552&#34;,&#xA;      &#34;description&#34;: &#34;When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to node&#39;s policy implementation, thus effectively disabling the integrity check.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38552 https://bugzilla.redhat.com/show_bug.cgi?id=2244415 https://www.cve.org/CVERecord?id=CVE-2023-38552 https://nvd.nist.gov/vuln/detail/CVE-2023-38552 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38552.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;k/2DvTn2KLL28Yuh/WFLmw==&#34;: {&#xA;      &#34;id&#34;: &#34;k/2DvTn2KLL28Yuh/WFLmw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3576&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in Libtiff&#39;s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3576 https://bugzilla.redhat.com/show_bug.cgi?id=2219340 https://www.cve.org/CVERecord?id=CVE-2023-3576 https://nvd.nist.gov/vuln/detail/CVE-2023-3576 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3576.json https://access.redhat.com/errata/RHSA-2023:6575&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;k/RAvY71xpuUVrSpsGkYlA==&#34;: {&#xA;      &#34;id&#34;: &#34;k/RAvY71xpuUVrSpsGkYlA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-1143&#34;,&#xA;      &#34;description&#34;: &#34;Restricted file access on Windows in os and net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-07T16:08:45Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/56694 https://go.dev/cl/455716 https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.9&#34;&#xA;    },&#xA;    &#34;k2PJBnbhSab9fWak/vBKbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;k2PJBnbhSab9fWak/vBKbQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33846&#34;,&#xA;      &#34;description&#34;: &#34;A heap buffer overflow vulnerability exists in the DTLS handshake fragment reassembly logic of GnuTLS. The issue arises in merge_handshake_packet() where incoming handshake fragments are matched and merged based solely on handshake type, without validating that the message_length field remains consistent across all fragments of the same logical message. An attacker can exploit this by sending crafted DTLS fragments with conflicting message_length values, causing the implementation to allocate a buffer based on a smaller initial fragment and subsequently write beyond its bounds using larger, inconsistent fragments. Because the merge operation does not enforce proper bounds checking against the allocated buffer size, this results in an out-of-bounds write on the heap. The vulnerability is remotely exploitable without authentication via the DTLS handshake path and can lead to application crashes or potential memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-05-04T08:53:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33846 https://bugzilla.redhat.com/show_bug.cgi?id=2450625 https://www.cve.org/CVERecord?id=CVE-2026-33846 https://nvd.nist.gov/vuln/detail/CVE-2026-33846 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33846.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k4dDUqBohIhzwbUS8fZiCA==&#34;: {&#xA;      &#34;id&#34;: &#34;k4dDUqBohIhzwbUS8fZiCA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;k5LjlV1zmKau2rAIOnay6g==&#34;: {&#xA;      &#34;id&#34;: &#34;k5LjlV1zmKau2rAIOnay6g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:5765&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.2.3.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;k6D6o9qP1X41yPQlNQ8aww==&#34;: {&#xA;      &#34;id&#34;: &#34;k6D6o9qP1X41yPQlNQ8aww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33750&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the brace-expansion library, a component used for generating strings based on patterns. A remote attacker could exploit this vulnerability by providing a specially crafted brace pattern that includes a zero step value. This malicious input causes the library&#39;s sequence generation loop to run indefinitely, leading to excessive memory allocation and causing the process to hang. This results in a Denial of Service (DoS) for the affected application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-27T14:04:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33750 https://bugzilla.redhat.com/show_bug.cgi?id=2452285 https://www.cve.org/CVERecord?id=CVE-2026-33750 https://nvd.nist.gov/vuln/detail/CVE-2026-33750 https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L107-L113 https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L184 https://github.com/juliangruber/brace-expansion/commit/311ac0d54994158c0a384e286a7d6cbb17ee8ed5 https://github.com/juliangruber/brace-expansion/commit/7fd684f89fdde3549563d0a6522226a9189472a2 https://github.com/juliangruber/brace-expansion/commit/b9cacd9e55e7a1fa588fe4b7bb1159d52f1d902a https://github.com/juliangruber/brace-expansion/issues/98 https://github.com/juliangruber/brace-expansion/pull/95 https://github.com/juliangruber/brace-expansion/pull/96 https://github.com/juliangruber/brace-expansion/pull/97 https://github.com/juliangruber/brace-expansion/security/advisories/GHSA-f886-m6hf-6m8v https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33750.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k9Yjqv3ifDP4XwsJSZ8XiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;k9Yjqv3ifDP4XwsJSZ8XiQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31130&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs in the ares_inet_net_pton() function, which is vulnerable to a buffer underflow for certain ipv6 addresses. \&#34;0::00:00:00/2\&#34; in particular was found to cause an issue. C-ares only uses this function internally for configuration purposes, which would require an administrator to configure such an address via ares_set_sortlist().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31130 https://bugzilla.redhat.com/show_bug.cgi?id=2209497 https://www.cve.org/CVERecord?id=CVE-2023-31130 https://nvd.nist.gov/vuln/detail/CVE-2023-31130 https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31130.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;k9jtJIr2beiO7DTwypDNWw==&#34;: {&#xA;      &#34;id&#34;: &#34;k9jtJIr2beiO7DTwypDNWw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6844&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `readelf` utility of the binutils package. A local attacker could exploit two Denial of Service (DoS) vulnerabilities by providing a specially crafted Executable and Linkable Format (ELF) file. One vulnerability, a resource exhaustion (CWE-400), can lead to an out-of-memory condition. The other, a null pointer dereference (CWE-476), can cause a segmentation fault. Both issues can result in the `readelf` utility becoming unresponsive or crashing, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6844 https://bugzilla.redhat.com/show_bug.cgi?id=2460016 https://www.cve.org/CVERecord?id=CVE-2026-6844 https://nvd.nist.gov/vuln/detail/CVE-2026-6844 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6844.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kABs7TAnvuphaClsm0yUYQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kABs7TAnvuphaClsm0yUYQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2229&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client&#39;s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:27:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2229 https://bugzilla.redhat.com/show_bug.cgi?id=2447143 https://www.cve.org/CVERecord?id=CVE-2026-2229 https://nvd.nist.gov/vuln/detail/CVE-2026-2229 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8 https://hackerone.com/reports/3487486 https://nodejs.org/api/zlib.html#class-zlibinflateraw https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2229.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kBdyi87P4B1cTF5hLS7ByA==&#34;: {&#xA;      &#34;id&#34;: &#34;kBdyi87P4B1cTF5hLS7ByA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kCgZMoKRMbRx90oiE7jJ+w==&#34;: {&#xA;      &#34;id&#34;: &#34;kCgZMoKRMbRx90oiE7jJ+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-43552&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in curl. In this issue, curl can be asked to tunnel all protocols virtually it supports through an HTTP proxy. HTTP proxies can deny these tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific SMB or TELNET protocols, curl can use a heap-allocated struct after it has been freed and shut down the code path in its transfer.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-43552 https://bugzilla.redhat.com/show_bug.cgi?id=2152652 https://www.cve.org/CVERecord?id=CVE-2022-43552 https://nvd.nist.gov/vuln/detail/CVE-2022-43552 https://curl.se/docs/CVE-2022-43552.html https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-43552.json https://access.redhat.com/errata/RHSA-2023:2478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kCyfUBctJ+eryOZP6UiDKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kCyfUBctJ+eryOZP6UiDKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23085&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23085 https://bugzilla.redhat.com/show_bug.cgi?id=2342618 https://www.cve.org/CVERecord?id=CVE-2025-23085 https://nvd.nist.gov/vuln/detail/CVE-2025-23085 https://nodejs.org/pt/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23085.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.13.1-1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kDZjsaAjptkThRRg1TjTRg==&#34;: {&#xA;      &#34;id&#34;: &#34;kDZjsaAjptkThRRg1TjTRg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kEe4Kuw3hXrzhJ/JDjR7wg==&#34;: {&#xA;      &#34;id&#34;: &#34;kEe4Kuw3hXrzhJ/JDjR7wg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45803&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn&#39;t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren&#39;t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn&#39;t exploitable.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45803 https://bugzilla.redhat.com/show_bug.cgi?id=2246840 https://www.cve.org/CVERecord?id=CVE-2023-45803 https://nvd.nist.gov/vuln/detail/CVE-2023-45803 https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9 https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4 https://www.rfc-editor.org/rfc/rfc9110.html#name-get https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45803.json https://access.redhat.com/errata/RHSA-2024:0464&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-urllib3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.26.5-3.el9_3.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kFbIkTDdc0p9e6ndPrAnHA==&#34;: {&#xA;      &#34;id&#34;: &#34;kFbIkTDdc0p9e6ndPrAnHA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21892&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. On Linux, Node.js ignores certain environment variables if an unprivileged user has set them while the process is running with elevated privileges, except for CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when other capabilities have been set. This flaw allows unprivileged users to inject code that inherits the process&#39;s elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21892 https://bugzilla.redhat.com/show_bug.cgi?id=2264582 https://www.cve.org/CVERecord?id=CVE-2024-21892 https://nvd.nist.gov/vuln/detail/CVE-2024-21892 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21892.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kHC7JlgJ1gpjDIHxKgXZuQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kHC7JlgJ1gpjDIHxKgXZuQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2024-2609&#34;,&#xA;      &#34;description&#34;: &#34;Comments in display names are incorrectly handled in net/mail&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T22:15:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/65083 https://go.dev/cl/555596 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.21.8&#34;&#xA;    },&#xA;    &#34;kJ/PUfmUBn2Ep03yRLItuQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kJ/PUfmUBn2Ep03yRLItuQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kMB61Eclf1Qb2Suk3JRmXw==&#34;: {&#xA;      &#34;id&#34;: &#34;kMB61Eclf1Qb2Suk3JRmXw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kQEcZDAS6Ka6J710VZUH9w==&#34;: {&#xA;      &#34;id&#34;: &#34;kQEcZDAS6Ka6J710VZUH9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25062&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free flaw was found in libxml2. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25062 https://bugzilla.redhat.com/show_bug.cgi?id=2262726 https://www.cve.org/CVERecord?id=CVE-2024-25062 https://nvd.nist.gov/vuln/detail/CVE-2024-25062 https://gitlab.gnome.org/GNOME/libxml2/-/issues/604 https://gitlab.gnome.org/GNOME/libxml2/-/tags https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25062.json https://access.redhat.com/errata/RHSA-2024:2679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kQL9cvtBFPgCA0FVlrhUBg==&#34;: {&#xA;      &#34;id&#34;: &#34;kQL9cvtBFPgCA0FVlrhUBg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61731&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in cmd/go. An attacker can exploit this by building a malicious Go source file that uses the &#39;#cgo pkg-config:&#39; directive. This allows the attacker to write to an arbitrary file with partial control over its content, by providing a &#39;--log-file&#39; argument to the pkg-config command. This vulnerability can lead to arbitrary file write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61731 https://bugzilla.redhat.com/show_bug.cgi?id=2434433 https://www.cve.org/CVERecord?id=CVE-2025-61731 https://nvd.nist.gov/vuln/detail/CVE-2025-61731 https://go.dev/cl/736711 https://go.dev/issue/77100 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4339 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61731.json https://access.redhat.com/errata/RHSA-2026:5942&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.8-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kQq8hvN2yLWiupMaLbRduA==&#34;: {&#xA;      &#34;id&#34;: &#34;kQq8hvN2yLWiupMaLbRduA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Symbol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.08-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kRGVc4s/SuXPOfCHc7Q9ug==&#34;: {&#xA;      &#34;id&#34;: &#34;kRGVc4s/SuXPOfCHc7Q9ug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31147&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs when /dev/urandom or RtlGenRandom() are unavailable, c-ares will use rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand(), so it will generate predictable output.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31147 https://bugzilla.redhat.com/show_bug.cgi?id=2209501 https://www.cve.org/CVERecord?id=CVE-2023-31147 https://nvd.nist.gov/vuln/detail/CVE-2023-31147 https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31147.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kRa60N9SRvgjl+iiwZ9fZg==&#34;: {&#xA;      &#34;id&#34;: &#34;kRa60N9SRvgjl+iiwZ9fZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46218&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl that verifies a given cookie domain against the Public Suffix List. This issue could allow a malicious HTTP server to set \&#34;super cookies\&#34; in curl that are passed back to more origins than what is otherwise allowed or possible.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T07:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46218 https://bugzilla.redhat.com/show_bug.cgi?id=2252030 https://www.cve.org/CVERecord?id=CVE-2023-46218 https://nvd.nist.gov/vuln/detail/CVE-2023-46218 https://curl.se/docs/CVE-2023-46218.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46218.json https://access.redhat.com/errata/RHSA-2024:1129&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kRj1Frl5pmWWgd5LR0IPyw==&#34;: {&#xA;      &#34;id&#34;: &#34;kRj1Frl5pmWWgd5LR0IPyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4435&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython&#39;s tarfile module. This vulnerability allows unauthorized file extraction via crafted tar archives when TarFile.errorlevel=0, bypassing expected filtering mechanisms.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:59:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4435 https://bugzilla.redhat.com/show_bug.cgi?id=2370010 https://www.cve.org/CVERecord?id=CVE-2025-4435 https://nvd.nist.gov/vuln/detail/CVE-2025-4435 https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4435.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kRqkfuoNHXgeW9vp8iyzQw==&#34;: {&#xA;      &#34;id&#34;: &#34;kRqkfuoNHXgeW9vp8iyzQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-41175&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-41175 https://bugzilla.redhat.com/show_bug.cgi?id=2235264 https://www.cve.org/CVERecord?id=CVE-2023-41175 https://nvd.nist.gov/vuln/detail/CVE-2023-41175 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-41175.json https://access.redhat.com/errata/RHSA-2024:2289&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-12.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kTasTqgA/HsT2H85z8VDPw==&#34;: {&#xA;      &#34;id&#34;: &#34;kTasTqgA/HsT2H85z8VDPw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46809&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The privateDecrypt() API of the crypto library may allow a covert timing side-channel during PKCS#1 v1.5 padding error handling. This issue revealed significant timing differences in decryption for valid and invalid ciphertexts, which may allow a remote attacker to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing JSON Web Encryption messages.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46809 https://bugzilla.redhat.com/show_bug.cgi?id=2264569 https://www.cve.org/CVERecord?id=CVE-2023-46809 https://nvd.nist.gov/vuln/detail/CVE-2023-46809 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46809.json https://access.redhat.com/errata/RHSA-2024:1503&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.19.1-1.module+el9.3.0+21388+22892fb9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kTyfGInwWoCVv7gGPYCF5g==&#34;: {&#xA;      &#34;id&#34;: &#34;kTyfGInwWoCVv7gGPYCF5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2610&#34;,&#xA;      &#34;description&#34;: &#34;Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1532.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2610 https://bugzilla.redhat.com/show_bug.cgi?id=2209048 https://www.cve.org/CVERecord?id=CVE-2023-2610 https://nvd.nist.gov/vuln/detail/CVE-2023-2610 https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2610.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kUo4IyXRh1XFppRDAqTNnw==&#34;: {&#xA;      &#34;id&#34;: &#34;kUo4IyXRh1XFppRDAqTNnw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-33285&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was discovered in Qt. This security flaw occurs in the QDnsLookup function, which has a buffer over-read via a crafted reply from a DNS server.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-33285 https://bugzilla.redhat.com/show_bug.cgi?id=2209488 https://www.cve.org/CVERecord?id=CVE-2023-33285 https://nvd.nist.gov/vuln/detail/CVE-2023-33285 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-33285.json https://access.redhat.com/errata/RHSA-2023:6369&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;qt5-srpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:5.15.9-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kVJhm1LYIfhvn92InJZLDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kVJhm1LYIfhvn92InJZLDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31147&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs when /dev/urandom or RtlGenRandom() are unavailable, c-ares will use rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand(), so it will generate predictable output.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31147 https://bugzilla.redhat.com/show_bug.cgi?id=2209501 https://www.cve.org/CVERecord?id=CVE-2023-31147 https://nvd.nist.gov/vuln/detail/CVE-2023-31147 https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31147.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kVjUyjaMJ0bXnwb03Ksw3A==&#34;: {&#xA;      &#34;id&#34;: &#34;kVjUyjaMJ0bXnwb03Ksw3A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0450&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python/CPython &#39;zipfile&#39; that can allow a zip-bomb type of attack. An attacker may craft a zip file format, leading to a Denial of Service when processed.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0450 https://bugzilla.redhat.com/show_bug.cgi?id=2276525 https://www.cve.org/CVERecord?id=CVE-2024-0450 https://nvd.nist.gov/vuln/detail/CVE-2024-0450 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0450.json https://access.redhat.com/errata/RHSA-2024:4078&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kXL26w3j4LcAqSQ9tOuWMA==&#34;: {&#xA;      &#34;id&#34;: &#34;kXL26w3j4LcAqSQ9tOuWMA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23167&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the HTTP parser of Node.js. This vulnerability allows attackers to perform request smuggling and bypass proxy-based access controls via improperly terminated HTTP/1 headers using \\r\\n\\rX instead of the standard \\r\\n\\r\\n.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23167 https://bugzilla.redhat.com/show_bug.cgi?id=2367167 https://www.cve.org/CVERecord?id=CVE-2025-23167 https://nvd.nist.gov/vuln/detail/CVE-2025-23167 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23167.json https://access.redhat.com/errata/RHSA-2025:8468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.19.2.1.module+el9.6.0+23146+be9976bd&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kaUbMItvWrS1leJMEsAk9A==&#34;: {&#xA;      &#34;id&#34;: &#34;kaUbMItvWrS1leJMEsAk9A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2284&#34;,&#xA;      &#34;description&#34;: &#34;Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2284 https://bugzilla.redhat.com/show_bug.cgi?id=2103872 https://www.cve.org/CVERecord?id=CVE-2022-2284 https://nvd.nist.gov/vuln/detail/CVE-2022-2284 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2284.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kdSSzkEHTOGF0fpTfXjzcg==&#34;: {&#xA;      &#34;id&#34;: &#34;kdSSzkEHTOGF0fpTfXjzcg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4904 https://bugzilla.redhat.com/show_bug.cgi?id=2168631 https://www.cve.org/CVERecord?id=CVE-2022-4904 https://nvd.nist.gov/vuln/detail/CVE-2022-4904 https://github.com/c-ares/c-ares/issues/496 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4904.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;keMF1HAI1OIF8MvJtPZQ+g==&#34;: {&#xA;      &#34;id&#34;: &#34;keMF1HAI1OIF8MvJtPZQ+g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31124&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This issue occurs when cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross-compiling aarch64 android. As a result, it will downgrade to rand(), which could allow an attacker to utilize the lack of entropy by not using a CSPRNG.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31124 https://bugzilla.redhat.com/show_bug.cgi?id=2209494 https://www.cve.org/CVERecord?id=CVE-2023-31124 https://nvd.nist.gov/vuln/detail/CVE-2023-31124 https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31124.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kgCv9K1pgDK48LdFtpFN9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;kgCv9K1pgDK48LdFtpFN9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;khaGOQZwNAF+Kql1EAlBfw==&#34;: {&#xA;      &#34;id&#34;: &#34;khaGOQZwNAF+Kql1EAlBfw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-26465&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client&#39;s memory resource first, turning the attack complexity high.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-26465 https://bugzilla.redhat.com/show_bug.cgi?id=2344780 https://www.cve.org/CVERecord?id=CVE-2025-26465 https://nvd.nist.gov/vuln/detail/CVE-2025-26465 https://access.redhat.com/solutions/7109879 https://seclists.org/oss-sec/2025/q1/144 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-26465.json https://access.redhat.com/errata/RHSA-2025:6993&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-45.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;khwtIlYEcWkkzJP1rg7BNg==&#34;: {&#xA;      &#34;id&#34;: &#34;khwtIlYEcWkkzJP1rg7BNg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0466&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The X509_VERIFY_PARAM_add0_policy() function is documented to enable the certificate policy check when doing certificate verification implicitly. However, implementing the function does not enable the check, allowing certificates with invalid or incorrect policies to pass the certificate verification. Suddenly enabling the policy check could break existing deployments, so it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. The applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0466 https://bugzilla.redhat.com/show_bug.cgi?id=2182565 https://www.cve.org/CVERecord?id=CVE-2023-0466 https://nvd.nist.gov/vuln/detail/CVE-2023-0466 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0466.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ki2PMarj2WoMKDbw3+XV3A==&#34;: {&#xA;      &#34;id&#34;: &#34;ki2PMarj2WoMKDbw3+XV3A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json https://access.redhat.com/errata/RHSA-2026:13677&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kiHPM08GilYyFXQYDbdefw==&#34;: {&#xA;      &#34;id&#34;: &#34;kiHPM08GilYyFXQYDbdefw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23936&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the fetch API in Node.js that did not prevent CRLF injection in the &#39;host&#39; header. This issue could allow HTTP response splitting and HTTP header injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23936 https://bugzilla.redhat.com/show_bug.cgi?id=2172190 https://www.cve.org/CVERecord?id=CVE-2023-23936 https://nvd.nist.gov/vuln/detail/CVE-2023-23936 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23936.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kicrFnXrLH996rjfEw0amg==&#34;: {&#xA;      &#34;id&#34;: &#34;kicrFnXrLH996rjfEw0amg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.2-1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kjz43GS3cPffEnOhzwtYDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kjz43GS3cPffEnOhzwtYDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22695&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a reference library for processing PNG (Portable Network Graphics) image files. A local attacker could exploit a heap buffer over-read vulnerability in the `png_image_finish_read` function by tricking a user into processing a specially crafted interlaced 16-bit PNG file with an 8-bit output format and non-minimal row stride. This could lead to a denial of service (DoS) and potentially information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T22:55:40Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22695 https://bugzilla.redhat.com/show_bug.cgi?id=2428825 https://www.cve.org/CVERecord?id=CVE-2026-22695 https://nvd.nist.gov/vuln/detail/CVE-2026-22695 https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea https://github.com/pnggroup/libpng/commit/e4f7ad4ea2 https://github.com/pnggroup/libpng/issues/778 https://github.com/pnggroup/libpng/security/advisories/GHSA-mmq5-27w3-rxpp https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22695.json https://access.redhat.com/errata/RHSA-2026:3405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kkBeA26IUhnokem2LDfx1A==&#34;: {&#xA;      &#34;id&#34;: &#34;kkBeA26IUhnokem2LDfx1A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27538&#34;,&#xA;      &#34;description&#34;: &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27538 https://bugzilla.redhat.com/show_bug.cgi?id=2179103 https://www.cve.org/CVERecord?id=CVE-2023-27538 https://nvd.nist.gov/vuln/detail/CVE-2023-27538 https://curl.se/docs/CVE-2023-27538.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27538.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kkxgUCDqJw1GL8dK+Je2RA==&#34;: {&#xA;      &#34;id&#34;: &#34;kkxgUCDqJw1GL8dK+Je2RA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-39260&#34;,&#xA;      &#34;description&#34;: &#34;Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git&#39;s push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-39260 https://bugzilla.redhat.com/show_bug.cgi?id=2137423 https://www.cve.org/CVERecord?id=CVE-2022-39260 https://nvd.nist.gov/vuln/detail/CVE-2022-39260 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-39260.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;klH60uFrR0WkawaSlcOEKg==&#34;: {&#xA;      &#34;id&#34;: &#34;klH60uFrR0WkawaSlcOEKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1484&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1484 https://bugzilla.redhat.com/show_bug.cgi?id=2433259 https://www.cve.org/CVERecord?id=CVE-2026-1484 https://nvd.nist.gov/vuln/detail/CVE-2026-1484 https://gitlab.gnome.org/GNOME/glib/-/issues/3870 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1484.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;knD9e5c9mhfEteHg6iIbAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;knD9e5c9mhfEteHg6iIbAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;knUP7wXG3O435cJDvu9Thw==&#34;: {&#xA;      &#34;id&#34;: &#34;knUP7wXG3O435cJDvu9Thw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69647&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted ELF binary file containing malformed DWARF loclists data with the readelf program can trigger an infinite loop and result in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69647 https://bugzilla.redhat.com/show_bug.cgi?id=2445773 https://www.cve.org/CVERecord?id=CVE-2025-69647 https://nvd.nist.gov/vuln/detail/CVE-2025-69647 https://sourceware.org/bugzilla/show_bug.cgi?id=33640 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=455446bbdc8675f34808187de2bbad4682016ff7 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69647.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;koaJtTt9+fGxG4OSw5hxFA==&#34;: {&#xA;      &#34;id&#34;: &#34;koaJtTt9+fGxG4OSw5hxFA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-DynaLoader&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.47-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ktNuCXztDAtRpUWlUtIWUg==&#34;: {&#xA;      &#34;id&#34;: &#34;ktNuCXztDAtRpUWlUtIWUg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ktZZSLvjrHrh7DYZ23sMhw==&#34;: {&#xA;      &#34;id&#34;: &#34;ktZZSLvjrHrh7DYZ23sMhw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45143&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Undici node package due to the occurrence of Cross-origin requests, possibly leading to a cookie header leakage. By default, cookie headers are forbidden request headers, and they must be enabled. This flaw allows a malicious user to access this leaked cookie if they have control of the redirection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45143 https://bugzilla.redhat.com/show_bug.cgi?id=2244104 https://www.cve.org/CVERecord?id=CVE-2023-45143 https://nvd.nist.gov/vuln/detail/CVE-2023-45143 https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45143.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kwBmjCC7+d5xUliMZJPNWA==&#34;: {&#xA;      &#34;id&#34;: &#34;kwBmjCC7+d5xUliMZJPNWA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-File-stat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.09-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;kxjEyJZKMrQwjAj12bH0Ag==&#34;: {&#xA;      &#34;id&#34;: &#34;kxjEyJZKMrQwjAj12bH0Ag==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22018&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js package. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files they do not have explicit read access to.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22018 https://bugzilla.redhat.com/show_bug.cgi?id=2296990 https://www.cve.org/CVERecord?id=CVE-2024-22018 https://nvd.nist.gov/vuln/detail/CVE-2024-22018 https://hackerone.com/reports/2145862 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22018.json https://access.redhat.com/errata/RHSA-2024:5815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.16.0-1.module+el9.4.0+22197+9e60f127&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ky4IJ5u2Ib7CaDmE7xOysg==&#34;: {&#xA;      &#34;id&#34;: &#34;ky4IJ5u2Ib7CaDmE7xOysg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-46822&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow vulnerability was found in libjpeg-turbo in the get_word_rgb_row() function in rdppm.c. The flaw occurs when the PPM reader in libjpeg-turbo mishandles use of the tjLoadImage() function for loading a 16-bit binary PPM file into a grayscale uncompressed image buffer and then loading a 16-bit binary PGM file into an RGB uncompressed image buffer. This flaw allows a remote attacker to persuade a victim to open a specially-crafted file, causing the application to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-46822 https://bugzilla.redhat.com/show_bug.cgi?id=2100044 https://www.cve.org/CVERecord?id=CVE-2021-46822 https://nvd.nist.gov/vuln/detail/CVE-2021-46822 https://exchange.xforce.ibmcloud.com/vulnerabilities/221567 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-46822.json https://access.redhat.com/errata/RHSA-2023:1068&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libjpeg-turbo-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.0.90-6.el9_1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;l/tOmWC5BVb4or7dYqfWjA==&#34;: {&#xA;      &#34;id&#34;: &#34;l/tOmWC5BVb4or7dYqfWjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41411&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, an open-source command-line text editor. This command injection vulnerability occurs during tag file processing. A local user could craft a malicious tags file containing backtick syntax in the filename field. When Vim resolves a tag from this file, it executes the embedded command via the system shell, leading to arbitrary code execution with the privileges of the running user.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-24T16:51:39Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-41411 https://bugzilla.redhat.com/show_bug.cgi?id=2461614 https://www.cve.org/CVERecord?id=CVE-2026-41411 https://nvd.nist.gov/vuln/detail/CVE-2026-41411 https://github.com/vim/vim/commit/c78194e41d5a0b05b0ddf383b6679b1503f977fb https://github.com/vim/vim/releases/tag/v9.2.0357 https://github.com/vim/vim/security/advisories/GHSA-cwgx-gcj7-6qh8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-41411.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;: {&#xA;      &#34;id&#34;: &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;l2+nQ26t0lYvVluseJErUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;l2+nQ26t0lYvVluseJErUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-File-Copy&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;l2fXal/tlhZFSzN3bmiLSg==&#34;: {&#xA;      &#34;id&#34;: &#34;l2fXal/tlhZFSzN3bmiLSg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4603&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use the EVP_PKEY_param_check() or EVP_PKEY_public_check() function to check a DSA public key or DSA parameters may experience long delays when checking excessively long DSA keys or parameters.  In applications that allow untrusted sources to provide the key or parameters that are checked, an attacker may be able to cause a denial of service. These functions are not called by OpenSSL on untrusted DSA keys. The applications that directly call these functions are the ones that may be vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4603 https://bugzilla.redhat.com/show_bug.cgi?id=2281029 https://www.cve.org/CVERecord?id=CVE-2024-4603 https://nvd.nist.gov/vuln/detail/CVE-2024-4603 https://www.openssl.org/news/secadv/20240516.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4603.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;l3j9C20yHr6ZHIXLApzl0A==&#34;: {&#xA;      &#34;id&#34;: &#34;l3j9C20yHr6ZHIXLApzl0A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;l5Fb8T5ynp1oelRWVY+EaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;l5Fb8T5ynp1oelRWVY+EaQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45336&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45336 https://bugzilla.redhat.com/show_bug.cgi?id=2341751 https://www.cve.org/CVERecord?id=CVE-2024-45336 https://nvd.nist.gov/vuln/detail/CVE-2024-45336 https://github.com/golang/go/issues/70530 https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45336.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;l5eC5C4lpe8Zt0TnNwDO+g==&#34;: {&#xA;      &#34;id&#34;: &#34;l5eC5C4lpe8Zt0TnNwDO+g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34982&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. A modeline is used to set specific editor options directly from a text file. However, the `complete`, `guitabtooltip`, `printheader` options and the `mapset` function lack proper security checks, allowing an attacker to bypass restrictions and cause arbitrary OS command execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T15:16:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34982 https://bugzilla.redhat.com/show_bug.cgi?id=2455400 https://www.cve.org/CVERecord?id=CVE-2026-34982 https://nvd.nist.gov/vuln/detail/CVE-2026-34982 http://www.openwall.com/lists/oss-security/2026/04/01/1 https://github.com/vim/vim/commit/75661a66a1db1e1f3f1245c615 https://github.com/vim/vim/releases/tag/v9.2.0276 https://github.com/vim/vim/security/advisories/GHSA-8h6p-m6gr-mpw9 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34982.json https://access.redhat.com/errata/RHSA-2026:11510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;l5iJurZf3UzepkqgzjvSSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;l5iJurZf3UzepkqgzjvSSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5914&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5914 https://bugzilla.redhat.com/show_bug.cgi?id=2370861 https://www.cve.org/CVERecord?id=CVE-2025-5914 https://nvd.nist.gov/vuln/detail/CVE-2025-5914 https://github.com/libarchive/libarchive/pull/2598 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5914.json https://access.redhat.com/errata/RHSA-2025:14130&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bsdtar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-6.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3784&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3784 https://bugzilla.redhat.com/show_bug.cgi?id=2446449 https://www.cve.org/CVERecord?id=CVE-2026-3784 https://nvd.nist.gov/vuln/detail/CVE-2026-3784 http://www.openwall.com/lists/oss-security/2026/03/11/3 https://curl.se/docs/CVE-2026-3784.html https://curl.se/docs/CVE-2026-3784.json https://hackerone.com/reports/3584903 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3784.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;l7gfVyLrNH9qcWdXdRt9Kg==&#34;: {&#xA;      &#34;id&#34;: &#34;l7gfVyLrNH9qcWdXdRt9Kg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-30632&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-30632 https://bugzilla.redhat.com/show_bug.cgi?id=2107386 https://www.cve.org/CVERecord?id=CVE-2022-30632 https://nvd.nist.gov/vuln/detail/CVE-2022-30632 https://go.dev/issue/53416 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-30632.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;l8driNMmALQs2/V7+uCq+w==&#34;: {&#xA;      &#34;id&#34;: &#34;l8driNMmALQs2/V7+uCq+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-NDBM_File&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.15-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;l8z3hCmcLYlZgxzha0zw+g==&#34;: {&#xA;      &#34;id&#34;: &#34;l8z3hCmcLYlZgxzha0zw+g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45288&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45288 https://bugzilla.redhat.com/show_bug.cgi?id=2268273 https://www.cve.org/CVERecord?id=CVE-2023-45288 https://nvd.nist.gov/vuln/detail/CVE-2023-45288 https://nowotarski.info/http2-continuation-flood/ https://pkg.go.dev/vuln/GO-2024-2687 https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45288.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;l91ZStS7zd83ItxB5JiNAw==&#34;: {&#xA;      &#34;id&#34;: &#34;l91ZStS7zd83ItxB5JiNAw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0865&#34;,&#xA;      &#34;description&#34;: &#34;Missing newline filtering has been discovered in Python. User-controlled header names and values containing newlines can allow injecting HTTP headers.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:26:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0865 https://bugzilla.redhat.com/show_bug.cgi?id=2431367 https://www.cve.org/CVERecord?id=CVE-2026-0865 https://nvd.nist.gov/vuln/detail/CVE-2026-0865 https://github.com/python/cpython/issues/143916 https://github.com/python/cpython/pull/143917 https://mail.python.org/archives/list/security-announce@python.org/thread/BJ6QPHNSHJTS3A7CFV6IBMCAP2DWRVNT/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0865.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lAFNCmDlAVSKGu2gqmWvBw==&#34;: {&#xA;      &#34;id&#34;: &#34;lAFNCmDlAVSKGu2gqmWvBw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lBoi08D0xA11v+agRADO8A==&#34;: {&#xA;      &#34;id&#34;: &#34;lBoi08D0xA11v+agRADO8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-7425&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7425 https://bugzilla.redhat.com/show_bug.cgi?id=2379274 https://www.cve.org/CVERecord?id=CVE-2025-7425 https://nvd.nist.gov/vuln/detail/CVE-2025-7425 https://gitlab.gnome.org/GNOME/libxslt/-/issues/140 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7425.json https://access.redhat.com/errata/RHSA-2025:12447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-11.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lCc1jyHfsFJK2HfULjN8pA==&#34;: {&#xA;      &#34;id&#34;: &#34;lCc1jyHfsFJK2HfULjN8pA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-12781&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the base64 module in the Python standard library. The b64decode, standard_b64decode and urlsafe_b64decode functions will always accept the &#39;+&#39; and &#39;/&#39; characters even when an alternative base64 alphabet is specified via the altchars parameter that excludes them. This input validation bypass allows malformed or unexpected data to pass through decoding filters, potentially causing logical errors or data integrity issues in applications relying on strict character sets.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-21T19:34:47Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-12781 https://bugzilla.redhat.com/show_bug.cgi?id=2431736 https://www.cve.org/CVERecord?id=CVE-2025-12781 https://nvd.nist.gov/vuln/detail/CVE-2025-12781 https://github.com/python/cpython/issues/125346 https://github.com/python/cpython/pull/141128 https://mail.python.org/archives/list/security-announce@python.org/thread/KRI7GC6S27YV5NJ4FPDALS2WI5ENAFJ6/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-12781.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lCd4ciOqH+xVdJTAK6erDg==&#34;: {&#xA;      &#34;id&#34;: &#34;lCd4ciOqH+xVdJTAK6erDg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-POSIX&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.94-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lG2c0hNx+Fgq8Zf8B1rJyw==&#34;: {&#xA;      &#34;id&#34;: &#34;lG2c0hNx+Fgq8Zf8B1rJyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30589&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30589 https://bugzilla.redhat.com/show_bug.cgi?id=2219841 https://www.cve.org/CVERecord?id=CVE-2023-30589 https://nvd.nist.gov/vuln/detail/CVE-2023-30589 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30589.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.16.1-1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lH27Z8PmZeo/EM/AegpCTA==&#34;: {&#xA;      &#34;id&#34;: &#34;lH27Z8PmZeo/EM/AegpCTA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24790&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Go language standard library net/netip. The method Is*() (IsPrivate(), IsPublic(), etc) doesn&#39;t behave properly when working with IPv6 mapped to IPv4 addresses. The unexpected behavior can lead to integrity and confidentiality issues, specifically when these methods are used to control access to resources or data.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24790 https://bugzilla.redhat.com/show_bug.cgi?id=2292787 https://www.cve.org/CVERecord?id=CVE-2024-24790 https://nvd.nist.gov/vuln/detail/CVE-2024-24790 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24790.json https://access.redhat.com/errata/RHSA-2024:4212&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.11-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lHLNxD93t7uUJfmDhNwvCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lHLNxD93t7uUJfmDhNwvCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3256&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free vulnerability was found in vim&#39;s movemark() function of the src/mark.c file. This issue occurs because vim uses freed memory when &#39;autocmd&#39; changes the mark. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3256 https://bugzilla.redhat.com/show_bug.cgi?id=2132571 https://www.cve.org/CVERecord?id=CVE-2022-3256 https://nvd.nist.gov/vuln/detail/CVE-2022-3256 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3256.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lIzMhy2E3/kAp+LsQCQyCA==&#34;: {&#xA;      &#34;id&#34;: &#34;lIzMhy2E3/kAp+LsQCQyCA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1704&#34;,&#xA;      &#34;description&#34;: &#34;Excessive memory allocation in net/http and net/textproto&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-05T21:04:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/58975 https://go.dev/cl/481994 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.8&#34;&#xA;    },&#xA;    &#34;lJ8RTw7m+AgAnWW6upSntA==&#34;: {&#xA;      &#34;id&#34;: &#34;lJ8RTw7m+AgAnWW6upSntA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-45078&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds flaw was found in binutils’ stabs functionality. The attack needs to be initiated locally where an attacker could convince a victim to read a specially crafted file that is processed by objdump, leading to the disclosure of memory and possibly leading to the execution of arbitrary code or causing the utility to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-45078 https://bugzilla.redhat.com/show_bug.cgi?id=2033715 https://www.cve.org/CVERecord?id=CVE-2021-45078 https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-45078.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lJah2RfNfRF+vEQdCucT7w==&#34;: {&#xA;      &#34;id&#34;: &#34;lJah2RfNfRF+vEQdCucT7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6232&#34;,&#xA;      &#34;description&#34;: &#34;A regular expression denial of service (ReDos) vulnerability was found in Python&#39;s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-03T13:15:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6232 https://bugzilla.redhat.com/show_bug.cgi?id=2309426 https://www.cve.org/CVERecord?id=CVE-2024-6232 https://nvd.nist.gov/vuln/detail/CVE-2024-6232 https://github.com/python/cpython/issues/121285 https://github.com/python/cpython/pull/121286 https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6232.json https://access.redhat.com/errata/RHSA-2024:9468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.19-8.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lKniGV6mBq1xFWJ6V0QVvA==&#34;: {&#xA;      &#34;id&#34;: &#34;lKniGV6mBq1xFWJ6V0QVvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29491&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in ncurses and occurs when used by a setuid application. This flaw allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29491 https://bugzilla.redhat.com/show_bug.cgi?id=2191704 https://www.cve.org/CVERecord?id=CVE-2023-29491 https://nvd.nist.gov/vuln/detail/CVE-2023-29491 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29491.json https://access.redhat.com/errata/RHSA-2023:6698&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:6.2-10.20210508.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lM6Cai1zYvH4FYQ8nb6tQg==&#34;: {&#xA;      &#34;id&#34;: &#34;lM6Cai1zYvH4FYQ8nb6tQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lO89yYeT5Xt1E5KBgR1OXw==&#34;: {&#xA;      &#34;id&#34;: &#34;lO89yYeT5Xt1E5KBgR1OXw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lQ+CMunyB1B/r/pkv6U72w==&#34;: {&#xA;      &#34;id&#34;: &#34;lQ+CMunyB1B/r/pkv6U72w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Class-Struct&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:0.66-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lQBARBTddFvexevUD04GZA==&#34;: {&#xA;      &#34;id&#34;: &#34;lQBARBTddFvexevUD04GZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5745&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. A NULL pointer dereference vulnerability exists in the ACL parsing logic, specifically within the archive_acl_from_text_nl() function. When processing a malformed ACL string (such as a bare \&#34;d\&#34; or \&#34;default\&#34; tag without subsequent fields), the function fails to perform adequate validation before advancing the pointer. An attacker can exploit this by providing a maliciously crafted archive, causing an application utilizing the libarchive API (such as bsdtar) to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5745 https://bugzilla.redhat.com/show_bug.cgi?id=2455921 https://www.cve.org/CVERecord?id=CVE-2026-5745 https://nvd.nist.gov/vuln/detail/CVE-2026-5745 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5745.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lTNtbu9KrTbZ2ion3t+azw==&#34;: {&#xA;      &#34;id&#34;: &#34;lTNtbu9KrTbZ2ion3t+azw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lVjWozUTbgE/Ed14ZW1okw==&#34;: {&#xA;      &#34;id&#34;: &#34;lVjWozUTbgE/Ed14ZW1okw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61726&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61726 https://bugzilla.redhat.com/show_bug.cgi?id=2434432 https://www.cve.org/CVERecord?id=CVE-2025-61726 https://nvd.nist.gov/vuln/detail/CVE-2025-61726 https://go.dev/cl/736712 https://go.dev/issue/77101 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4341 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61726.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lWKRi6BgpanbsQgeIct91A==&#34;: {&#xA;      &#34;id&#34;: &#34;lWKRi6BgpanbsQgeIct91A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-35252&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability found in curl. This security flaw happens when curl is used to retrieve and parse cookies from an HTTP(S) server, where it accepts cookies using control codes (byte values below 32), and also when cookies that contain such control codes are later sent back to an HTTP(S) server, possibly causing the server to return a 400 response. This issue effectively allows a \&#34;sister site\&#34; to deny service to siblings and cause a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-35252 https://bugzilla.redhat.com/show_bug.cgi?id=2120718 https://www.cve.org/CVERecord?id=CVE-2022-35252 https://nvd.nist.gov/vuln/detail/CVE-2022-35252 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-35252.json https://access.redhat.com/errata/RHSA-2023:2478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lWdVDKK0NI1ECjrQyrQZhA==&#34;: {&#xA;      &#34;id&#34;: &#34;lWdVDKK0NI1ECjrQyrQZhA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11414&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted object file with the ld linker can trigger an out-of-bounds read in the get_link_hash_entry function in the bfd/elflink.c file due to an improper check, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-07T22:32:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11414 https://bugzilla.redhat.com/show_bug.cgi?id=2402424 https://www.cve.org/CVERecord?id=CVE-2025-11414 https://nvd.nist.gov/vuln/detail/CVE-2025-11414 https://sourceware.org/bugzilla/show_bug.cgi?id=33450 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703 https://vuldb.com/?id.327350 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11414.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lWxwCNVjYSW4SdS9h9uKvg==&#34;: {&#xA;      &#34;id&#34;: &#34;lWxwCNVjYSW4SdS9h9uKvg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59464&#34;,&#xA;      &#34;description&#34;: &#34;A resource consumption flaw has been discovered in NodeJS. A memory leak in Node.js’s OpenSSL integration occurs when converting `X.509` certificate fields to UTF-8 without freeing the allocated buffer. When applications call `socket.getPeerCertificate(true)`, each certificate field leaks memory, allowing remote clients to trigger steady memory growth through repeated TLS connections. Over time this can lead to resource exhaustion and denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59464 https://bugzilla.redhat.com/show_bug.cgi?id=2431344 https://www.cve.org/CVERecord?id=CVE-2025-59464 https://nvd.nist.gov/vuln/detail/CVE-2025-59464 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59464.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lc0ErrFagkcQxsv9AGKTjw==&#34;: {&#xA;      &#34;id&#34;: &#34;lc0ErrFagkcQxsv9AGKTjw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ldTn/Q3i3BpKZ95U4mfrcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ldTn/Q3i3BpKZ95U4mfrcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45490&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat&#39;s xmlparse.c component. This vulnerability allows an attacker to cause improper handling of XML data by providing a negative length value to the XML_ParseBuffer function.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-30T03:15:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45490 https://bugzilla.redhat.com/show_bug.cgi?id=2308615 https://www.cve.org/CVERecord?id=CVE-2024-45490 https://nvd.nist.gov/vuln/detail/CVE-2024-45490 https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes https://github.com/libexpat/libexpat/issues/887 https://github.com/libexpat/libexpat/pull/890 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45490.json https://access.redhat.com/errata/RHSA-2024:6754&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-2.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lgYZVj6kPc0Poy1meDiyZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lgYZVj6kPc0Poy1meDiyZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-53905&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T20:48:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-53905 https://bugzilla.redhat.com/show_bug.cgi?id=2380362 https://www.cve.org/CVERecord?id=CVE-2025-53905 https://nvd.nist.gov/vuln/detail/CVE-2025-53905 https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239 https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-53905.json https://access.redhat.com/errata/RHSA-2025:20945&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lh/EYac7XXFvwJr7gkU1TA==&#34;: {&#xA;      &#34;id&#34;: &#34;lh/EYac7XXFvwJr7gkU1TA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38546&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. This flaw allows an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38546 https://bugzilla.redhat.com/show_bug.cgi?id=2241938 https://access.redhat.com/errata/RHSA-2024:2101 https://www.cve.org/CVERecord?id=CVE-2023-38546 https://nvd.nist.gov/vuln/detail/CVE-2023-38546 https://curl.se/docs/CVE-2023-38546.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38546.json https://access.redhat.com/errata/RHSA-2023:5763&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ljT4JJv6XdYorFfJ6zbfog==&#34;: {&#xA;      &#34;id&#34;: &#34;ljT4JJv6XdYorFfJ6zbfog==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;: {&#xA;      &#34;id&#34;: &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40355&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in MIT Kerberos 5 (krb5). An unauthenticated remote attacker can exploit a NULL pointer dereference vulnerability by calling `gss_accept_sec_context()` on a system with a NegoEx mechanism registered. This can lead to the termination of the process, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-40355 https://bugzilla.redhat.com/show_bug.cgi?id=2463370 https://www.cve.org/CVERecord?id=CVE-2026-40355 https://nvd.nist.gov/vuln/detail/CVE-2026-40355 https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.html https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929f https://web.mit.edu/kerberos/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-40355.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lsfrxxENmZMCtV8uOKkr8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;lsfrxxENmZMCtV8uOKkr8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6119&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6119 https://bugzilla.redhat.com/show_bug.cgi?id=2306158 https://www.cve.org/CVERecord?id=CVE-2024-6119 https://nvd.nist.gov/vuln/detail/CVE-2024-6119 https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6119.json https://access.redhat.com/errata/RHSA-2024:6783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-28.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ltoIfsso65jjPxRqV9UMRw==&#34;: {&#xA;      &#34;id&#34;: &#34;ltoIfsso65jjPxRqV9UMRw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39322&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39322 https://bugzilla.redhat.com/show_bug.cgi?id=2237778 https://www.cve.org/CVERecord?id=CVE-2023-39322 https://nvd.nist.gov/vuln/detail/CVE-2023-39322 https://go.dev/cl/523039 https://go.dev/issue/62266 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2045.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39322.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ltryu+P4IG4b3EAJKjyGHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ltryu+P4IG4b3EAJKjyGHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-53905&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T20:48:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-53905 https://bugzilla.redhat.com/show_bug.cgi?id=2380362 https://www.cve.org/CVERecord?id=CVE-2025-53905 https://nvd.nist.gov/vuln/detail/CVE-2025-53905 https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239 https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-53905.json https://access.redhat.com/errata/RHSA-2025:17742&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-22.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lv4eSxX+AEAW88phUmOolQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lv4eSxX+AEAW88phUmOolQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26462&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in krb5 in /krb5/src/kdc/ndr.c. This issue can lead to a denial of service through memory exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-26462 https://bugzilla.redhat.com/show_bug.cgi?id=2266742 https://www.cve.org/CVERecord?id=CVE-2024-26462 https://nvd.nist.gov/vuln/detail/CVE-2024-26462 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-26462.json https://access.redhat.com/errata/RHSA-2024:9331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;lz6O0nYiDpis8SScmTUuSg==&#34;: {&#xA;      &#34;id&#34;: &#34;lz6O0nYiDpis8SScmTUuSg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1215&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. A local user may be able to trigger memory corruption by using the `--log` option with a non-existent path, which can lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-12T18:31:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1215 https://bugzilla.redhat.com/show_bug.cgi?id=2345318 https://www.cve.org/CVERecord?id=CVE-2025-1215 https://nvd.nist.gov/vuln/detail/CVE-2025-1215 https://github.com/vim/vim/commit/c5654b84480822817bb7b69ebc97c174c91185e9 https://github.com/vim/vim/issues/16606 https://github.com/vim/vim/releases/tag/v9.1.1097 https://vuldb.com/?ctiid.295174 https://vuldb.com/?id.295174 https://vuldb.com/?submit.497546 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1215.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;m+ltkfB6bwuyxpSjgAFr9w==&#34;: {&#xA;      &#34;id&#34;: &#34;m+ltkfB6bwuyxpSjgAFr9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5363&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL in how it processes key and initialization vector (IV) lengths. This issue can lead to potential truncation or overruns during the initialization of some symmetric ciphers. A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. Both truncations and overruns of the key and the IV will produce incorrect results and could, in some cases, trigger a memory exception.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-24T15:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5363 https://bugzilla.redhat.com/show_bug.cgi?id=2243839 https://www.cve.org/CVERecord?id=CVE-2023-5363 https://nvd.nist.gov/vuln/detail/CVE-2023-5363 https://www.openssl.org/news/secadv/20231024.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5363.json https://access.redhat.com/errata/RHSA-2024:0310&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-25.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;m/cpX9gyFETv4B87S/qRxw==&#34;: {&#xA;      &#34;id&#34;: &#34;m/cpX9gyFETv4B87S/qRxw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11468&#34;,&#xA;      &#34;description&#34;: &#34;Missing character filtering has been discovered in Python. When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:09:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11468 https://bugzilla.redhat.com/show_bug.cgi?id=2431375 https://www.cve.org/CVERecord?id=CVE-2025-11468 https://nvd.nist.gov/vuln/detail/CVE-2025-11468 https://github.com/python/cpython/issues/143935 https://github.com/python/cpython/pull/143936 https://mail.python.org/archives/list/security-announce@python.org/thread/FELSEOLBI2QR6YLG6Q7VYF7FWSGQTKLI/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11468.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;m/d6QTwNzEzxGSR3T2263Q==&#34;: {&#xA;      &#34;id&#34;: &#34;m/d6QTwNzEzxGSR3T2263Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27982&#34;,&#xA;      &#34;description&#34;: &#34;An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27982 https://bugzilla.redhat.com/show_bug.cgi?id=2275392 https://www.cve.org/CVERecord?id=CVE-2024-27982 https://nvd.nist.gov/vuln/detail/CVE-2024-27982 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27982.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;m02T5S9rBezyv/+a/R6Fkw==&#34;: {&#xA;      &#34;id&#34;: &#34;m02T5S9rBezyv/+a/R6Fkw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-50349&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git. This vulnerability occurs when Git requests credentials via a terminal prompt, for example, without the use of a credential helper. During this process, Git displays the host name for which the credentials are needed, but any URL-encoded parts are decoded and displayed directly. This can allow an attacker to manipulate URLs by including ANSI escape sequences, which can be interpreted by the terminal to mislead users by tricking them into entering passwords that are redirected to malicious attacker-controlled sites.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T18:43:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-50349 https://bugzilla.redhat.com/show_bug.cgi?id=2337824 https://www.cve.org/CVERecord?id=CVE-2024-50349 https://nvd.nist.gov/vuln/detail/CVE-2024-50349 https://github.com/git/git/commit/7725b8100ffbbff2750ee4d61a0fcc1f53a086e8 https://github.com/git/git/commit/c903985bf7e772e2d08275c1a95c8a55ab011577 https://github.com/git/git/security/advisories/GHSA-hmg8-h7qf-7cxr https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-50349.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;m0VRm0XEm9FSwttsQ8QLaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;m0VRm0XEm9FSwttsQ8QLaQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0465&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. OpenSSL and other certificate policy checks silently ignore invalid certificate policies in leaf certificates that are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0465 https://bugzilla.redhat.com/show_bug.cgi?id=2182561 https://www.cve.org/CVERecord?id=CVE-2023-0465 https://nvd.nist.gov/vuln/detail/CVE-2023-0465 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0465.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;m2sL00H9lvJ4xs2UqwHxiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;m2sL00H9lvJ4xs2UqwHxiQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4904 https://bugzilla.redhat.com/show_bug.cgi?id=2168631 https://www.cve.org/CVERecord?id=CVE-2022-4904 https://nvd.nist.gov/vuln/detail/CVE-2022-4904 https://github.com/c-ares/c-ares/issues/496 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4904.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;m4A081U6rE2WLJ4u/pMkqg==&#34;: {&#xA;      &#34;id&#34;: &#34;m4A081U6rE2WLJ4u/pMkqg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;m77LjZYd/4k9LSozG2S2mA==&#34;: {&#xA;      &#34;id&#34;: &#34;m77LjZYd/4k9LSozG2S2mA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-50349&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git. This vulnerability occurs when Git requests credentials via a terminal prompt, for example, without the use of a credential helper. During this process, Git displays the host name for which the credentials are needed, but any URL-encoded parts are decoded and displayed directly. This can allow an attacker to manipulate URLs by including ANSI escape sequences, which can be interpreted by the terminal to mislead users by tricking them into entering passwords that are redirected to malicious attacker-controlled sites.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T18:43:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-50349 https://bugzilla.redhat.com/show_bug.cgi?id=2337824 https://www.cve.org/CVERecord?id=CVE-2024-50349 https://nvd.nist.gov/vuln/detail/CVE-2024-50349 https://github.com/git/git/commit/7725b8100ffbbff2750ee4d61a0fcc1f53a086e8 https://github.com/git/git/commit/c903985bf7e772e2d08275c1a95c8a55ab011577 https://github.com/git/git/security/advisories/GHSA-hmg8-h7qf-7cxr https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-50349.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;m94VQcvA5qigjAcL/i2L2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;m94VQcvA5qigjAcL/i2L2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-File-Basename&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.85-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mBrf1Yfgr5icNwG8S0edeA==&#34;: {&#xA;      &#34;id&#34;: &#34;mBrf1Yfgr5icNwG8S0edeA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29007&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security flaw occurs when renaming or deleting a section from a configuration file, where certain malicious configuration values may be misinterpreted as the beginning of a new configuration section. This flaw leads to arbitrary configuration injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29007 https://bugzilla.redhat.com/show_bug.cgi?id=2188338 https://www.cve.org/CVERecord?id=CVE-2023-29007 https://nvd.nist.gov/vuln/detail/CVE-2023-29007 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29007.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mESXtMr2XIcnFGpdxMD0iA==&#34;: {&#xA;      &#34;id&#34;: &#34;mESXtMr2XIcnFGpdxMD0iA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mEw7dcF5jpuxJvu2G3JEew==&#34;: {&#xA;      &#34;id&#34;: &#34;mEw7dcF5jpuxJvu2G3JEew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34982&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. A modeline is used to set specific editor options directly from a text file. However, the `complete`, `guitabtooltip`, `printheader` options and the `mapset` function lack proper security checks, allowing an attacker to bypass restrictions and cause arbitrary OS command execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T15:16:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34982 https://bugzilla.redhat.com/show_bug.cgi?id=2455400 https://www.cve.org/CVERecord?id=CVE-2026-34982 https://nvd.nist.gov/vuln/detail/CVE-2026-34982 http://www.openwall.com/lists/oss-security/2026/04/01/1 https://github.com/vim/vim/commit/75661a66a1db1e1f3f1245c615 https://github.com/vim/vim/releases/tag/v9.2.0276 https://github.com/vim/vim/security/advisories/GHSA-8h6p-m6gr-mpw9 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34982.json https://access.redhat.com/errata/RHSA-2026:11510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mFUy6wspY0y/sfnCfQc0Yw==&#34;: {&#xA;      &#34;id&#34;: &#34;mFUy6wspY0y/sfnCfQc0Yw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32282&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32282 https://bugzilla.redhat.com/show_bug.cgi?id=2456336 https://www.cve.org/CVERecord?id=CVE-2026-32282 https://nvd.nist.gov/vuln/detail/CVE-2026-32282 https://go.dev/cl/763761 https://go.dev/issue/78293 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4864 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32282.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mIzvIMMUHDBMdt3eAx+4Rw==&#34;: {&#xA;      &#34;id&#34;: &#34;mIzvIMMUHDBMdt3eAx+4Rw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;: {&#xA;      &#34;id&#34;: &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5916&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5916 https://bugzilla.redhat.com/show_bug.cgi?id=2370872 https://www.cve.org/CVERecord?id=CVE-2025-5916 https://nvd.nist.gov/vuln/detail/CVE-2025-5916 https://github.com/libarchive/libarchive/pull/2568 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5916.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mL/QvlBQrld+4EwXWLYTNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;mL/QvlBQrld+4EwXWLYTNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mNBwoKfe9sN/pVvuupOIpQ==&#34;: {&#xA;      &#34;id&#34;: &#34;mNBwoKfe9sN/pVvuupOIpQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1526&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \&#34;decompression bomb,\&#34; during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:08:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1526 https://bugzilla.redhat.com/show_bug.cgi?id=2447142 https://www.cve.org/CVERecord?id=CVE-2026-1526 https://nvd.nist.gov/vuln/detail/CVE-2026-1526 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q https://hackerone.com/reports/3481206 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1526.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mOQ3hJyzcYBnd65M1VVdFA==&#34;: {&#xA;      &#34;id&#34;: &#34;mOQ3hJyzcYBnd65M1VVdFA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-4011&#34;,&#xA;      &#34;description&#34;: &#34;Parsing DER payload can cause memory exhaustion in encoding/asn1&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T21:50:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/75671 https://go.dev/cl/709856 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.8&#34;&#xA;    },&#xA;    &#34;mPAC5fvINjFbBEv6qTd6tQ==&#34;: {&#xA;      &#34;id&#34;: &#34;mPAC5fvINjFbBEv6qTd6tQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32611&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32611 https://bugzilla.redhat.com/show_bug.cgi?id=2211829 https://www.cve.org/CVERecord?id=CVE-2023-32611 https://nvd.nist.gov/vuln/detail/CVE-2023-32611 https://gitlab.gnome.org/GNOME/glib/-/issues/2797 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32611.json https://access.redhat.com/errata/RHSA-2023:6631&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mQKKxdEERDHEVyOMhYExEw==&#34;: {&#xA;      &#34;id&#34;: &#34;mQKKxdEERDHEVyOMhYExEw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30590&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30590 https://bugzilla.redhat.com/show_bug.cgi?id=2219842 https://www.cve.org/CVERecord?id=CVE-2023-30590 https://nvd.nist.gov/vuln/detail/CVE-2023-30590 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30590.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mQgdyTODJZ/UTHC5haonAg==&#34;: {&#xA;      &#34;id&#34;: &#34;mQgdyTODJZ/UTHC5haonAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4647&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU Binutils BFD library, a widely used component for handling binary files such as object files and executables. The issue occurs when processing specially crafted XCOFF object files, where a relocation type value is not properly validated before being used. This can cause the program to read memory outside of intended bounds. As a result, affected tools may crash or expose unintended memory contents, leading to denial-of-service or limited information disclosure risks.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4647 https://bugzilla.redhat.com/show_bug.cgi?id=2450302 https://www.cve.org/CVERecord?id=CVE-2026-4647 https://nvd.nist.gov/vuln/detail/CVE-2026-4647 https://sourceware.org/bugzilla/show_bug.cgi?id=33919 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4647.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mQwmpMs9V7B+YNSY3NMExw==&#34;: {&#xA;      &#34;id&#34;: &#34;mQwmpMs9V7B+YNSY3NMExw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1299&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the email module in the Python standard library. When serializing an email message, the BytesGenerator class fails to properly quote newline characters for email headers. This issue is exploitable when the LiteralHeader class is used as it does not respect email folding rules, allowing an attacker to inject email headers and potentially modify message recipients or the email body, and spoof sender information.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-23T16:27:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1299 https://bugzilla.redhat.com/show_bug.cgi?id=2432437 https://www.cve.org/CVERecord?id=CVE-2026-1299 https://nvd.nist.gov/vuln/detail/CVE-2026-1299 https://cve.org/CVERecord?id=CVE-2024-6923 https://github.com/python/cpython/commit/052e55e7d44718fe46cbba0ca995cb8fcc359413 https://github.com/python/cpython/issues/144125 https://github.com/python/cpython/pull/144126 https://mail.python.org/archives/list/security-announce@python.org/thread/6ZZULGALJTITEAGEXLDJE2C6FORDXPBT/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1299.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mSEMDfE7dS8a+RoMfkjqhg==&#34;: {&#xA;      &#34;id&#34;: &#34;mSEMDfE7dS8a+RoMfkjqhg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mT/r0SKhQZ91EH4d3KiGWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;mT/r0SKhQZ91EH4d3KiGWQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21710&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21710 https://bugzilla.redhat.com/show_bug.cgi?id=2453151 https://www.cve.org/CVERecord?id=CVE-2026-21710 https://nvd.nist.gov/vuln/detail/CVE-2026-21710 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21710.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mTjHmpUEF29L0I107JlM3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;mTjHmpUEF29L0I107JlM3Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59466&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in Node.js error handling where \&#34;Maximum call stack size exceeded\&#34; errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(&#39;uncaughtException&#39;)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59466 https://bugzilla.redhat.com/show_bug.cgi?id=2431343 https://www.cve.org/CVERecord?id=CVE-2025-59466 https://nvd.nist.gov/vuln/detail/CVE-2025-59466 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59466.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mUXGZjQ6odB/7zYNoJjJRA==&#34;: {&#xA;      &#34;id&#34;: &#34;mUXGZjQ6odB/7zYNoJjJRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4138&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python tarfile module. This vulnerability allows attackers to bypass extraction filters, enabling symlink targets to escape the destination directory and allowing unauthorized modification of file metadata via the use of TarFile.extract() or TarFile.extractall() with the filter= parameter set to \&#34;data\&#34; or \&#34;tar\&#34;.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4138 https://bugzilla.redhat.com/show_bug.cgi?id=2372426 https://www.cve.org/CVERecord?id=CVE-2025-4138 https://nvd.nist.gov/vuln/detail/CVE-2025-4138 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4138.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mX276ORRxpj/FeNL+3OrXg==&#34;: {&#xA;      &#34;id&#34;: &#34;mX276ORRxpj/FeNL+3OrXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2650&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL resulting in a possible denial of service while translating ASN.1 object identifiers. Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience long delays when processing messages, which may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2650 https://bugzilla.redhat.com/show_bug.cgi?id=2207947 https://www.cve.org/CVERecord?id=CVE-2023-2650 https://nvd.nist.gov/vuln/detail/CVE-2023-2650 https://www.openssl.org/news/secadv/20230530.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2650.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mXfTdwl2racpbSHHHKO6EA==&#34;: {&#xA;      &#34;id&#34;: &#34;mXfTdwl2racpbSHHHKO6EA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4741&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in OpenSSL. Calling the OpenSSL API SSL_free_buffers function may cause memory to be accessed that was previously freed in some situations.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4741 https://bugzilla.redhat.com/show_bug.cgi?id=2283757 https://www.cve.org/CVERecord?id=CVE-2024-4741 https://nvd.nist.gov/vuln/detail/CVE-2024-4741 https://www.openssl.org/news/secadv/20240528.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4741.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mXoGTWRL/KLyEYWh5uyvXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;mXoGTWRL/KLyEYWh5uyvXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. This vulnerability, a heap-buffer-overflow and a segmentation fault, exists in the swap file recovery logic. A local attacker could exploit this by providing a specially crafted swap file. This could lead to a denial of service (DoS) or potentially information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-27T22:06:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28421 https://bugzilla.redhat.com/show_bug.cgi?id=2443474 https://www.cve.org/CVERecord?id=CVE-2026-28421 https://nvd.nist.gov/vuln/detail/CVE-2026-28421 https://github.com/vim/vim/commit/65c1a143c331c886dc28 https://github.com/vim/vim/releases/tag/v9.2.0077 https://github.com/vim/vim/security/advisories/GHSA-r2gw-2x48-jj5p https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28421.json https://access.redhat.com/errata/RHSA-2026:8259&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mYgwcPpa/l0bTZdysqbplg==&#34;: {&#xA;      &#34;id&#34;: &#34;mYgwcPpa/l0bTZdysqbplg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mZC3gBcn6x1aC7q9hXUpKg==&#34;: {&#xA;      &#34;id&#34;: &#34;mZC3gBcn6x1aC7q9hXUpKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3644&#34;,&#xA;      &#34;description&#34;: &#34;A control character validation flaw has been discovered in the Python http.cookie module. The Morsel.update(), |= operator, and unpickling paths were not patched to resolve  CVE-2026-0672, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T17:37:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3644 https://bugzilla.redhat.com/show_bug.cgi?id=2448168 https://www.cve.org/CVERecord?id=CVE-2026-3644 https://nvd.nist.gov/vuln/detail/CVE-2026-3644 https://github.com/python/cpython/commit/57e88c1cf95e1481b94ae57abe1010469d47a6b4 https://github.com/python/cpython/issues/145599 https://github.com/python/cpython/pull/145600 https://mail.python.org/archives/list/security-announce@python.org/thread/H6CADMBCDRFGWCMOXWUIHFJNV43GABJ7/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3644.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mZCCwO//htsOIXazj/SeOw==&#34;: {&#xA;      &#34;id&#34;: &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-31789&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability, a heap buffer overflow, affects 32-bit systems when processing an unusually large X.509 certificate. If an application or service attempts to print or log such a specially crafted certificate, it could lead to a system crash or potentially allow an attacker to execute arbitrary code. This issue is considered low severity due to the specific conditions required for exploitation, including the need for an extremely large certificate and a 32-bit operating environment.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31789 https://bugzilla.redhat.com/show_bug.cgi?id=2451095 https://www.cve.org/CVERecord?id=CVE-2026-31789 https://nvd.nist.gov/vuln/detail/CVE-2026-31789 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31789.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mbMEAQXpYoMKq7Io1LfrJA==&#34;: {&#xA;      &#34;id&#34;: &#34;mbMEAQXpYoMKq7Io1LfrJA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32067&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32067 https://bugzilla.redhat.com/show_bug.cgi?id=2209502 https://www.cve.org/CVERecord?id=CVE-2023-32067 https://nvd.nist.gov/vuln/detail/CVE-2023-32067 https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32067.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mfYVQsCdSPyqR1UobqhEIw==&#34;: {&#xA;      &#34;id&#34;: &#34;mfYVQsCdSPyqR1UobqhEIw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23918&#34;,&#xA;      &#34;description&#34;: &#34;A privilege escalation vulnerability exists in Node.js \u003c19.6.1, \u003c18.14.1, \u003c16.19.1 and \u003c14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23918 https://bugzilla.redhat.com/show_bug.cgi?id=2171935 https://www.cve.org/CVERecord?id=CVE-2023-23918 https://nvd.nist.gov/vuln/detail/CVE-2023-23918 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23918.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;miA8N3aOifbt6s11v8VS/A==&#34;: {&#xA;      &#34;id&#34;: &#34;miA8N3aOifbt6s11v8VS/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-1394&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \&#34;return nil, nil, fail(...)\&#34; pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-1394 https://bugzilla.redhat.com/show_bug.cgi?id=2262921 https://www.cve.org/CVERecord?id=CVE-2024-1394 https://nvd.nist.gov/vuln/detail/CVE-2024-1394 https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136 https://github.com/golang-fips/openssl/security/advisories/GHSA-78hx-gp6g-7mj6 https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f https://pkg.go.dev/vuln/GO-2024-2660 https://vuln.go.dev/ID/GO-2024-2660.json https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-1394.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mjI/WzMYY52AQdc1No8ugQ==&#34;: {&#xA;      &#34;id&#34;: &#34;mjI/WzMYY52AQdc1No8ugQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61724&#34;,&#xA;      &#34;description&#34;: &#34;The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T22:10:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61724 https://bugzilla.redhat.com/show_bug.cgi?id=2407257 https://www.cve.org/CVERecord?id=CVE-2025-61724 https://nvd.nist.gov/vuln/detail/CVE-2025-61724 https://go.dev/cl/709859 https://go.dev/issue/75716 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://pkg.go.dev/vuln/GO-2025-4015 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61724.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mjV/DAgymXlZYSj9rj04pg==&#34;: {&#xA;      &#34;id&#34;: &#34;mjV/DAgymXlZYSj9rj04pg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mk/9oG3VlXeyR83vbnlC7g==&#34;: {&#xA;      &#34;id&#34;: &#34;mk/9oG3VlXeyR83vbnlC7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24790&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Go language standard library net/netip. The method Is*() (IsPrivate(), IsPublic(), etc) doesn&#39;t behave properly when working with IPv6 mapped to IPv4 addresses. The unexpected behavior can lead to integrity and confidentiality issues, specifically when these methods are used to control access to resources or data.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24790 https://bugzilla.redhat.com/show_bug.cgi?id=2292787 https://www.cve.org/CVERecord?id=CVE-2024-24790 https://nvd.nist.gov/vuln/detail/CVE-2024-24790 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24790.json https://access.redhat.com/errata/RHSA-2024:4212&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.11-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ml41hyZPGVbTkzvmMyY3Yg==&#34;: {&#xA;      &#34;id&#34;: &#34;ml41hyZPGVbTkzvmMyY3Yg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mmFI4mA7exd6BfbwTUwJfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;mmFI4mA7exd6BfbwTUwJfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-20197&#34;,&#xA;      &#34;description&#34;: &#34;There is an open race window when writing output in the following utilities in GNU binutils1: ar, objcopy, strip, and ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-20197 https://bugzilla.redhat.com/show_bug.cgi?id=1913743 https://www.cve.org/CVERecord?id=CVE-2021-20197 https://nvd.nist.gov/vuln/detail/CVE-2021-20197 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-20197.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mpDlR2Lk6PsJrTVRdAvAng==&#34;: {&#xA;      &#34;id&#34;: &#34;mpDlR2Lk6PsJrTVRdAvAng==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28834&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28834 https://bugzilla.redhat.com/show_bug.cgi?id=2269228 https://www.cve.org/CVERecord?id=CVE-2024-28834 https://nvd.nist.gov/vuln/detail/CVE-2024-28834 https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html https://minerva.crocs.fi.muni.cz/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28834.json https://access.redhat.com/errata/RHSA-2024:1879&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.7.6-23.el9_3.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mpJkDXIXuQphmTXI2ejm1A==&#34;: {&#xA;      &#34;id&#34;: &#34;mpJkDXIXuQphmTXI2ejm1A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mqxlcVJc3F4dPOTEtUve1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;mqxlcVJc3F4dPOTEtUve1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23918&#34;,&#xA;      &#34;description&#34;: &#34;A privilege escalation vulnerability exists in Node.js \u003c19.6.1, \u003c18.14.1, \u003c16.19.1 and \u003c14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23918 https://bugzilla.redhat.com/show_bug.cgi?id=2171935 https://www.cve.org/CVERecord?id=CVE-2023-23918 https://nvd.nist.gov/vuln/detail/CVE-2023-23918 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23918.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mwpgk/i3GXoSJDpblt44zg==&#34;: {&#xA;      &#34;id&#34;: &#34;mwpgk/i3GXoSJDpblt44zg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1255&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security flaw occurs because the AES-XTS cipher decryption implementation for the 64-bit ARM platform contains an issue that could cause it to read past the input buffer, leading to a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1255 https://bugzilla.redhat.com/show_bug.cgi?id=2188461 https://www.cve.org/CVERecord?id=CVE-2023-1255 https://nvd.nist.gov/vuln/detail/CVE-2023-1255 https://www.openssl.org/news/secadv/20230420.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1255.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mypK4Oz3YEbjmcF//Lb3ug==&#34;: {&#xA;      &#34;id&#34;: &#34;mypK4Oz3YEbjmcF//Lb3ug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24538&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go. This flaw allows a remote attacker to execute arbitrary code on the system, caused by not properly considering backticks (`) as Javascript string delimiters. By sending a specially crafted request, an attacker execute arbitrary code on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24538 https://bugzilla.redhat.com/show_bug.cgi?id=2184481 https://www.cve.org/CVERecord?id=CVE-2023-24538 https://nvd.nist.gov/vuln/detail/CVE-2023-24538 https://github.com/golang/go/issues/59234 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24538.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;n+8zHdzpUdNYaOfjqM+rvQ==&#34;: {&#xA;      &#34;id&#34;: &#34;n+8zHdzpUdNYaOfjqM+rvQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;n2MoI6iOOGKJg6CiwpZkxg==&#34;: {&#xA;      &#34;id&#34;: &#34;n2MoI6iOOGKJg6CiwpZkxg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34155&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the go/parser package of the Golang standard library. Calling any Parse functions on Go source code containing deeply nested literals can cause a panic due to stack exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34155 https://bugzilla.redhat.com/show_bug.cgi?id=2310527 https://www.cve.org/CVERecord?id=CVE-2024-34155 https://nvd.nist.gov/vuln/detail/CVE-2024-34155 https://go.dev/cl/611238 https://go.dev/issue/69138 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3105 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34155.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;n30+9otRNHBUO3IOHvF3kA==&#34;: {&#xA;      &#34;id&#34;: &#34;n30+9otRNHBUO3IOHvF3kA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmount-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;n39YhRffL6tFFAy/S18A8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;n39YhRffL6tFFAy/S18A8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1371&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU elfutils. This vulnerability allows a NULL pointer dereference via the handle_dynamic_symtab function in readelf.c.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-17T02:31:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1371 https://bugzilla.redhat.com/show_bug.cgi?id=2346055 https://www.cve.org/CVERecord?id=CVE-2025-1371 https://nvd.nist.gov/vuln/detail/CVE-2025-1371 https://sourceware.org/bugzilla/attachment.cgi?id=15926 https://sourceware.org/bugzilla/show_bug.cgi?id=32655 https://sourceware.org/bugzilla/show_bug.cgi?id=32655#c2 https://vuldb.com/?ctiid.295978 https://vuldb.com/?id.295978 https://vuldb.com/?submit.496484 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1371.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;elfutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;n5bOb2nwIXCE6i6WEpGlzA==&#34;: {&#xA;      &#34;id&#34;: &#34;n5bOb2nwIXCE6i6WEpGlzA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;n6Vm6uSXhVeVnZmJCVL4pw==&#34;: {&#xA;      &#34;id&#34;: &#34;n6Vm6uSXhVeVnZmJCVL4pw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;n6coP572PTpURrDz8Q2egA==&#34;: {&#xA;      &#34;id&#34;: &#34;n6coP572PTpURrDz8Q2egA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66862&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted PE file with cxxfilt can trigger a heap-based buffer over-read in the gnu_special function in the cplus-dem.c file, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66862 https://bugzilla.redhat.com/show_bug.cgi?id=2425825 https://www.cve.org/CVERecord?id=CVE-2025-66862 https://nvd.nist.gov/vuln/detail/CVE-2025-66862 https://github.com/caozhzh/CRGF-Vul/blob/main/cxxfilt/crash3.md https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66862.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;n78TtR5pw5YtOwMk7gVGmg==&#34;: {&#xA;      &#34;id&#34;: &#34;n78TtR5pw5YtOwMk7gVGmg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-56171&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a use-after-free via a crafted XML document validated against an XML schema with certain identity constraints or a crafted XML schema.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-56171 https://bugzilla.redhat.com/show_bug.cgi?id=2346416 https://www.cve.org/CVERecord?id=CVE-2024-56171 https://nvd.nist.gov/vuln/detail/CVE-2024-56171 https://gitlab.gnome.org/GNOME/libxml2/-/issues/828 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-56171.json https://access.redhat.com/errata/RHSA-2025:2679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_5.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;n8gOZ9FmDLirfTfnNZSfNA==&#34;: {&#xA;      &#34;id&#34;: &#34;n8gOZ9FmDLirfTfnNZSfNA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61728&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61728 https://bugzilla.redhat.com/show_bug.cgi?id=2434431 https://www.cve.org/CVERecord?id=CVE-2025-61728 https://nvd.nist.gov/vuln/detail/CVE-2025-61728 https://go.dev/cl/736713 https://go.dev/issue/77102 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4342 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61728.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;n9h0mZrBntcdO8rut9mZew==&#34;: {&#xA;      &#34;id&#34;: &#34;n9h0mZrBntcdO8rut9mZew==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1703&#34;,&#xA;      &#34;description&#34;: &#34;Backticks not treated as string delimiters in html/template&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-05T21:05:27Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/59234 https://go.dev/cl/482079 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.8&#34;&#xA;    },&#xA;    &#34;nAVorfcFz0ZcWPmPpZfMtg==&#34;: {&#xA;      &#34;id&#34;: &#34;nAVorfcFz0ZcWPmPpZfMtg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nD4gdXb8ND61ypX9fYklTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;nD4gdXb8ND61ypX9fYklTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30774&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30774 https://bugzilla.redhat.com/show_bug.cgi?id=2187139 https://www.cve.org/CVERecord?id=CVE-2023-30774 https://nvd.nist.gov/vuln/detail/CVE-2023-30774 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30774.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nF1VC5iJhTtrDBwL8mfOiw==&#34;: {&#xA;      &#34;id&#34;: &#34;nF1VC5iJhTtrDBwL8mfOiw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12747&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in rsync. This vulnerability arises from a race condition during rsync&#39;s handling of symbolic links. Rsync&#39;s default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-14T15:06:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12747 https://bugzilla.redhat.com/show_bug.cgi?id=2332968 https://www.cve.org/CVERecord?id=CVE-2024-12747 https://nvd.nist.gov/vuln/detail/CVE-2024-12747 https://kb.cert.org/vuls/id/952657 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12747.json https://access.redhat.com/errata/RHSA-2025:7050&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.2.5-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nFaODSvvA4RrGIiPJ9FjRA==&#34;: {&#xA;      &#34;id&#34;: &#34;nFaODSvvA4RrGIiPJ9FjRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-POSIX&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.94-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nGijNEIOx4yiwRd2hN0uZA==&#34;: {&#xA;      &#34;id&#34;: &#34;nGijNEIOx4yiwRd2hN0uZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nKGJQ32gv73mgVLbPDD8Qg==&#34;: {&#xA;      &#34;id&#34;: &#34;nKGJQ32gv73mgVLbPDD8Qg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24807&#34;,&#xA;      &#34;description&#34;: &#34;Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24807 https://bugzilla.redhat.com/show_bug.cgi?id=2172204 https://www.cve.org/CVERecord?id=CVE-2023-24807 https://nvd.nist.gov/vuln/detail/CVE-2023-24807 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24807.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nLbsKQgcqXqFJTjqeQs6Vg==&#34;: {&#xA;      &#34;id&#34;: &#34;nLbsKQgcqXqFJTjqeQs6Vg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nM+XWkmaG537tz4PDM13+w==&#34;: {&#xA;      &#34;id&#34;: &#34;nM+XWkmaG537tz4PDM13+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41723&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-17T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41723 https://bugzilla.redhat.com/show_bug.cgi?id=2178358 https://www.cve.org/CVERecord?id=CVE-2022-41723 https://nvd.nist.gov/vuln/detail/CVE-2022-41723 https://github.com/advisories/GHSA-vvpx-j8f3-3w6h https://go.dev/cl/468135 https://go.dev/cl/468295 https://go.dev/issue/57855 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E https://pkg.go.dev/vuln/GO-2023-1571 https://vuln.go.dev/ID/GO-2023-1571.json https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41723.json https://access.redhat.com/errata/RHBA-2023:2181&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.6-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nNNVXLjFvnegTKkITfCBuA==&#34;: {&#xA;      &#34;id&#34;: &#34;nNNVXLjFvnegTKkITfCBuA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32611&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32611 https://bugzilla.redhat.com/show_bug.cgi?id=2211829 https://www.cve.org/CVERecord?id=CVE-2023-32611 https://nvd.nist.gov/vuln/detail/CVE-2023-32611 https://gitlab.gnome.org/GNOME/glib/-/issues/2797 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32611.json https://access.redhat.com/errata/RHSA-2023:6631&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nNzRt87EkCVymyYuDyEW2w==&#34;: {&#xA;      &#34;id&#34;: &#34;nNzRt87EkCVymyYuDyEW2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6597&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the tempfile.TemporaryDirectory class in python3/cpython3. The class may dereference symbolic links during permission-related errors, resulting in users that run privileged programs being able to modify permissions of files referenced by the symbolic link.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6597 https://bugzilla.redhat.com/show_bug.cgi?id=2276518 https://www.cve.org/CVERecord?id=CVE-2023-6597 https://nvd.nist.gov/vuln/detail/CVE-2023-6597 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6597.json https://access.redhat.com/errata/RHSA-2024:4078&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nOD1OtMP4aGP/bT3iktDEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;nOD1OtMP4aGP/bT3iktDEQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-1144&#34;,&#xA;      &#34;description&#34;: &#34;Excessive memory growth in net/http and golang.org/x/net/http2&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-08T19:01:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/56350 https://go.dev/cl/455717 https://go.dev/cl/455635 https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.9&#34;&#xA;    },&#xA;    &#34;nPl1VYR04nooFy6e74yZlg==&#34;: {&#xA;      &#34;id&#34;: &#34;nPl1VYR04nooFy6e74yZlg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25136&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSH server (sshd), which introduced a double-free vulnerability during options.kex_algorithms handling. An unauthenticated attacker can trigger the double-free in the default configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25136 https://bugzilla.redhat.com/show_bug.cgi?id=2167636 https://www.cve.org/CVERecord?id=CVE-2023-25136 https://nvd.nist.gov/vuln/detail/CVE-2023-25136 https://bugzilla.mindrot.org/show_bug.cgi?id=3522 https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946 https://www.openwall.com/lists/oss-security/2023/02/02/2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25136.json https://access.redhat.com/errata/RHSA-2023:2645&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-29.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nRYrn2tFn8hdV0x+2YRPYQ==&#34;: {&#xA;      &#34;id&#34;: &#34;nRYrn2tFn8hdV0x+2YRPYQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28835&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \&#34;certtool --verify-chain\&#34; command.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28835 https://bugzilla.redhat.com/show_bug.cgi?id=2269084 https://www.cve.org/CVERecord?id=CVE-2024-28835 https://nvd.nist.gov/vuln/detail/CVE-2024-28835 https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28835.json https://access.redhat.com/errata/RHSA-2024:1879&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.7.6-23.el9_3.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nRlBpDuWR9J0Ttd/BugkSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;nRlBpDuWR9J0Ttd/BugkSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nS3gw6C5KX889pH0DdnXbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;nS3gw6C5KX889pH0DdnXbQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bsdtar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nS4rhARAcjvkSY8dJUFdOA==&#34;: {&#xA;      &#34;id&#34;: &#34;nS4rhARAcjvkSY8dJUFdOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39319&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of \&#34;\u003cscript\&#34;, \&#34;\u003c!--\&#34;, and \&#34;\u003c/script\&#34; within JS literals in \u003cscript\u003e contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39319 https://bugzilla.redhat.com/show_bug.cgi?id=2237773 https://www.cve.org/CVERecord?id=CVE-2023-39319 https://nvd.nist.gov/vuln/detail/CVE-2023-39319 https://go.dev/cl/526157 https://go.dev/issue/62197 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2043.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39319.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nVEuAeNYaydUTqNE5GOm/w==&#34;: {&#xA;      &#34;id&#34;: &#34;nVEuAeNYaydUTqNE5GOm/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24536&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an issue during multipart form parsing. By sending a specially crafted input, a remote attacker can consume large amounts of CPU and memory, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24536 https://bugzilla.redhat.com/show_bug.cgi?id=2184482 https://www.cve.org/CVERecord?id=CVE-2023-24536 https://nvd.nist.gov/vuln/detail/CVE-2023-24536 https://go.dev/issue/59153 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24536.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nVgNlf1p1N8UKAkTllJrCA==&#34;: {&#xA;      &#34;id&#34;: &#34;nVgNlf1p1N8UKAkTllJrCA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24783&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s crypto/x509 standard library package. Verifying a certificate chain that contains a certificate with an unknown public key algorithm will cause a Certificate.Verify to panic. This issue affects all crypto/tls clients and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24783 https://bugzilla.redhat.com/show_bug.cgi?id=2268019 https://www.cve.org/CVERecord?id=CVE-2024-24783 https://nvd.nist.gov/vuln/detail/CVE-2024-24783 http://www.openwall.com/lists/oss-security/2024/03/08/4 https://github.com/advisories/GHSA-3q2c-pvp5-3cqp https://go.dev/cl/569339 https://go.dev/issue/65390 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg https://pkg.go.dev/vuln/GO-2024-2598 https://security.netapp.com/advisory/ntap-20240329-0005 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24783.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nZ2DFaqiaft4/Dqj5SJp4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;nZ2DFaqiaft4/Dqj5SJp4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;naO+9RNjE/hIMaezFHe7IA==&#34;: {&#xA;      &#34;id&#34;: &#34;naO+9RNjE/hIMaezFHe7IA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2024-2888&#34;,&#xA;      &#34;description&#34;: &#34;Mishandling of corrupt central directory record in archive/zip&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-04T22:48:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/585397 https://go.dev/issue/66869 https://groups.google.com/g/golang-announce/c/XbxouI9gY7k/m/TuoGEhxIEwAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.21.11&#34;&#xA;    },&#xA;    &#34;nbtTb8L4YMUxpajoNaatQg==&#34;: {&#xA;      &#34;id&#34;: &#34;nbtTb8L4YMUxpajoNaatQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgomp&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;: {&#xA;      &#34;id&#34;: &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nfRozYKxaq/cbStnERagAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;nfRozYKxaq/cbStnERagAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34156&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34156 https://bugzilla.redhat.com/show_bug.cgi?id=2310528 https://www.cve.org/CVERecord?id=CVE-2024-34156 https://nvd.nist.gov/vuln/detail/CVE-2024-34156 https://go.dev/cl/611239 https://go.dev/issue/69139 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3106 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34156.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nhTPOqyx5Hjq5RaQThVb3A==&#34;: {&#xA;      &#34;id&#34;: &#34;nhTPOqyx5Hjq5RaQThVb3A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-43548&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in NodeJS. The issue occurs in the Node.js rebinding protector for --inspect that still allows invalid IP addresses, specifically, the octal format. This flaw allows an attacker to perform DNS rebinding and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-11-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-43548 https://bugzilla.redhat.com/show_bug.cgi?id=2140911 https://www.cve.org/CVERecord?id=CVE-2022-43548 https://nvd.nist.gov/vuln/detail/CVE-2022-43548 https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/#dns-rebinding-in-inspect-via-invalid-octal-ip-address-medium-cve-2022-43548 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-43548.json https://access.redhat.com/errata/RHSA-2022:8832&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.12.1-1.module+el9.1.0.z+17326+318294bb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nmCFeE95EAFeqYx2GUkIrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;nmCFeE95EAFeqYx2GUkIrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69651&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. An attacker could exploit this vulnerability by providing a crafted Executable and Linkable Format (ELF) binary with malformed relocation or symbol data. Processing this malicious binary leads to an invalid pointer free, which triggers memory corruption checks and causes the program to terminate.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69651 https://bugzilla.redhat.com/show_bug.cgi?id=2445299 https://www.cve.org/CVERecord?id=CVE-2025-69651 https://nvd.nist.gov/vuln/detail/CVE-2025-69651 https://sourceware.org/bugzilla/show_bug.cgi?id=33700 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea4bc025abdba85a90e26e13f551c16a44bfa921 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69651.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;noShzkxXeZ6xaXHAA8su4g==&#34;: {&#xA;      &#34;id&#34;: &#34;noShzkxXeZ6xaXHAA8su4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-22490&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. Using a specially-crafted repository, Git can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source $GIT_DIR/objects directory contains symbolic links (CVE-2022-39253), the objects directory may still be a symbolic link.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-22490 https://bugzilla.redhat.com/show_bug.cgi?id=2168160 https://www.cve.org/CVERecord?id=CVE-2023-22490 https://nvd.nist.gov/vuln/detail/CVE-2023-22490 https://github.blog/2023-02-14-git-security-vulnerabilities-announced-3/ https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-22490.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;noUIfMZn5dUZdEKTi/GsOA==&#34;: {&#xA;      &#34;id&#34;: &#34;noUIfMZn5dUZdEKTi/GsOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-30204&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Emacs. When Emacs is used as an email client, a preview of a crafted LaTeX document attached to an email can exhaust the disk space or the inodes allocated for the partition where the /tmp directory is located. This issue possibly results in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-30204 https://bugzilla.redhat.com/show_bug.cgi?id=2280297 https://www.cve.org/CVERecord?id=CVE-2024-30204 https://nvd.nist.gov/vuln/detail/CVE-2024-30204 https://www.openwall.com/lists/oss-security/2024/03/25/2 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-30204.json https://access.redhat.com/errata/RHSA-2024:9302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:27.2-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;npYdj4HvH6/ZpruXP++2aA==&#34;: {&#xA;      &#34;id&#34;: &#34;npYdj4HvH6/ZpruXP++2aA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nqEvJfkqmt5u+8eh9j8mMA==&#34;: {&#xA;      &#34;id&#34;: &#34;nqEvJfkqmt5u+8eh9j8mMA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T17:48:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68121 https://bugzilla.redhat.com/show_bug.cgi?id=2437111 https://www.cve.org/CVERecord?id=CVE-2025-68121 https://nvd.nist.gov/vuln/detail/CVE-2025-68121 https://go.dev/cl/737700 https://go.dev/issue/77217 https://groups.google.com/g/golang-announce/c/K09ubi9FQFk https://pkg.go.dev/vuln/GO-2026-4337 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68121.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nrMORRsp2EH7zbxJc144bw==&#34;: {&#xA;      &#34;id&#34;: &#34;nrMORRsp2EH7zbxJc144bw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ntPgpTaOsf+PmS8l/Ba/Gw==&#34;: {&#xA;      &#34;id&#34;: &#34;ntPgpTaOsf+PmS8l/Ba/Gw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0397&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Python. A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “get_ca_certs()”. The race condition can be triggered if the methods are called at the same time that certificates are loaded into the SSLContext, such as during the TLS handshake with a  configured certificate directory.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0397 https://bugzilla.redhat.com/show_bug.cgi?id=2301891 https://www.cve.org/CVERecord?id=CVE-2024-0397 https://nvd.nist.gov/vuln/detail/CVE-2024-0397 https://mail.python.org/archives/list/security-announce@python.org/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0397.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nuFsbkH7VzW6LS3WLhSszA==&#34;: {&#xA;      &#34;id&#34;: &#34;nuFsbkH7VzW6LS3WLhSszA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in zlib. An attacker providing specially crafted input to the `crc32_combine64` or `crc32_combine_gen64` functions could trigger an infinite loop within the `x2nmodp` function. This leads to excessive CPU consumption, which can result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-18T02:36:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27171 https://bugzilla.redhat.com/show_bug.cgi?id=2440530 https://www.cve.org/CVERecord?id=CVE-2026-27171 https://nvd.nist.gov/vuln/detail/CVE-2026-27171 https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/ https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf https://github.com/madler/zlib/issues/904 https://github.com/madler/zlib/releases/tag/v1.3.2 https://ostif.org/zlib-audit-complete/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27171.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nxT/hl64jXfWptNxWhmDuA==&#34;: {&#xA;      &#34;id&#34;: &#34;nxT/hl64jXfWptNxWhmDuA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-48384&#34;,&#xA;      &#34;description&#34;: &#34;A line-end handling flaw was found in Git. When writing a config entry, values with a trailing carriage return (CR) are not quoted, resulting in the CR being lost when the config is read later. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read, resulting in the submodule being checked out to an incorrect location.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T18:23:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-48384 https://bugzilla.redhat.com/show_bug.cgi?id=2378806 https://www.cve.org/CVERecord?id=CVE-2025-48384 https://nvd.nist.gov/vuln/detail/CVE-2025-48384 https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384 https://github.com/git/git/commit/05e9cd64ee23bbadcea6bcffd6660ed02b8eab89 https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9 https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-48384.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ny9UQzoPVAr0qIXyPr3Zuw==&#34;: {&#xA;      &#34;id&#34;: &#34;ny9UQzoPVAr0qIXyPr3Zuw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8291&#34;,&#xA;      &#34;description&#34;: &#34;A zip file handling flaw has been discovered in the python standard library `zipfile` module. The &#39;zipfile&#39; module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the &#39;zipfile&#39; module compared to other ZIP implementations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-07T18:10:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8291 https://bugzilla.redhat.com/show_bug.cgi?id=2402342 https://www.cve.org/CVERecord?id=CVE-2025-8291 https://nvd.nist.gov/vuln/detail/CVE-2025-8291 https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267 https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6 https://github.com/python/cpython/issues/139700 https://github.com/python/cpython/pull/139702 https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8291.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;nyAi61ve961xOEKhhdNTkg==&#34;: {&#xA;      &#34;id&#34;: &#34;nyAi61ve961xOEKhhdNTkg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59465&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been discovered in NodeJS. A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59465 https://bugzilla.redhat.com/show_bug.cgi?id=2431349 https://www.cve.org/CVERecord?id=CVE-2025-59465 https://nvd.nist.gov/vuln/detail/CVE-2025-59465 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59465.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.4-1.22.22.0.1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;o+oNdKG9C3ouEb/OQo1GOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;o+oNdKG9C3ouEb/OQo1GOQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32002&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32002 https://bugzilla.redhat.com/show_bug.cgi?id=2230948 https://www.cve.org/CVERecord?id=CVE-2023-32002 https://nvd.nist.gov/vuln/detail/CVE-2023-32002 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32002.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;o/JG334q9R0nTyZD1vNw7w==&#34;: {&#xA;      &#34;id&#34;: &#34;o/JG334q9R0nTyZD1vNw7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35938&#34;,&#xA;      &#34;description&#34;: &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35938 https://bugzilla.redhat.com/show_bug.cgi?id=1964114 https://www.cve.org/CVERecord?id=CVE-2021-35938 https://nvd.nist.gov/vuln/detail/CVE-2021-35938 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35938.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-sign-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;o16kBwzDyL2DXuhbCPWX9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;o16kBwzDyL2DXuhbCPWX9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3572&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3572 https://bugzilla.redhat.com/show_bug.cgi?id=1962856 https://www.cve.org/CVERecord?id=CVE-2021-3572 https://nvd.nist.gov/vuln/detail/CVE-2021-3572 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3572.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;o1V8hGX+jv19u/R1lSOgXA==&#34;: {&#xA;      &#34;id&#34;: &#34;o1V8hGX+jv19u/R1lSOgXA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;o2Jv7s2Wil4Jz6qK6599ww==&#34;: {&#xA;      &#34;id&#34;: &#34;o2Jv7s2Wil4Jz6qK6599ww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41725&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption flaw in the net/http and mime/multipart packages. By sending a specially-crafted request, a remote attacker can cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41725 https://bugzilla.redhat.com/show_bug.cgi?id=2178488 https://www.cve.org/CVERecord?id=CVE-2022-41725 https://nvd.nist.gov/vuln/detail/CVE-2022-41725 https://go.dev/cl/468124 https://go.dev/issue/58006 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E https://pkg.go.dev/vuln/GO-2023-1569 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41725.json https://access.redhat.com/errata/RHBA-2023:2181&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.6-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;o2KTVNHERxR9Fh6aLcwbCA==&#34;: {&#xA;      &#34;id&#34;: &#34;o2KTVNHERxR9Fh6aLcwbCA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3497&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSH GSSAPI (Generic Security Service Application Program Interface) delta patches, as included in various Linux distributions. A remote attacker could exploit this by sending an unexpected GSSAPI message type during the key exchange process. This occurs because the `sshpkt_disconnect()` function, when called on an error, does not properly terminate the process, leading to the continued execution of the program with uninitialized connection variables. Accessing these uninitialized variables can lead to undefined behavior, potentially resulting in information disclosure or a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T18:27:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3497 https://bugzilla.redhat.com/show_bug.cgi?id=2447085 https://www.cve.org/CVERecord?id=CVE-2026-3497 https://nvd.nist.gov/vuln/detail/CVE-2026-3497 https://ubuntu.com/security/CVE-2026-3497 https://www.openwall.com/lists/oss-security/2026/03/12/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3497.json https://access.redhat.com/errata/RHSA-2026:6462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-48.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;o2RzBkbyaO/aJUexQwQheA==&#34;: {&#xA;      &#34;id&#34;: &#34;o2RzBkbyaO/aJUexQwQheA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31147&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs when /dev/urandom or RtlGenRandom() are unavailable, c-ares will use rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand(), so it will generate predictable output.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31147 https://bugzilla.redhat.com/show_bug.cgi?id=2209501 https://www.cve.org/CVERecord?id=CVE-2023-31147 https://nvd.nist.gov/vuln/detail/CVE-2023-31147 https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31147.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.3-1.16.19.1.2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;o52gvb+djtuOAe8fWpXboQ==&#34;: {&#xA;      &#34;id&#34;: &#34;o52gvb+djtuOAe8fWpXboQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-3849&#34;,&#xA;      &#34;description&#34;: &#34;Incorrect results returned from Rows.Scan in database/sql&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-07T15:07:27Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/693735 https://go.dev/issue/74831 https://groups.google.com/g/golang-announce/c/x5MKroML2yM&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.23.12&#34;&#xA;    },&#xA;    &#34;o6arI4B+lOjvgV6k7kauyw==&#34;: {&#xA;      &#34;id&#34;: &#34;o6arI4B+lOjvgV6k7kauyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46809&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The privateDecrypt() API of the crypto library may allow a covert timing side-channel during PKCS#1 v1.5 padding error handling. This issue revealed significant timing differences in decryption for valid and invalid ciphertexts, which may allow a remote attacker to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing JSON Web Encryption messages.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46809 https://bugzilla.redhat.com/show_bug.cgi?id=2264569 https://www.cve.org/CVERecord?id=CVE-2023-46809 https://nvd.nist.gov/vuln/detail/CVE-2023-46809 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46809.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;o7U6pbXnKgxDi4OXl/ryRA==&#34;: {&#xA;      &#34;id&#34;: &#34;o7U6pbXnKgxDi4OXl/ryRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24807&#34;,&#xA;      &#34;description&#34;: &#34;Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24807 https://bugzilla.redhat.com/show_bug.cgi?id=2172204 https://www.cve.org/CVERecord?id=CVE-2023-24807 https://nvd.nist.gov/vuln/detail/CVE-2023-24807 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24807.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;o8O4Ttqnv0lQfm1yyfyVsw==&#34;: {&#xA;      &#34;id&#34;: &#34;o8O4Ttqnv0lQfm1yyfyVsw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-1720&#34;,&#xA;      &#34;description&#34;: &#34;A heap buffer over-read vulnerability was found in Vim&#39;s grab_file_name() function of the src/findfile.c file. This flaw occurs because the function reads after the NULL terminates the line with \&#34;gf\&#34; in Visual block mode. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap buffer over-read vulnerability that causes an application to crash and corrupt memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-05-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-1720 https://bugzilla.redhat.com/show_bug.cgi?id=2099979 https://www.cve.org/CVERecord?id=CVE-2022-1720 https://nvd.nist.gov/vuln/detail/CVE-2022-1720 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1720.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;o94cfzaEslnrzBtYm19DkA==&#34;: {&#xA;      &#34;id&#34;: &#34;o94cfzaEslnrzBtYm19DkA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3970&#34;,&#xA;      &#34;description&#34;: &#34;An integer overflow flaw was found in LibTIFF. This issue exists in the TIFFReadRGBATileExt function of the libtiff/tif_getimage.c file, and may lead to a buffer overflow.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-11-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3970 https://bugzilla.redhat.com/show_bug.cgi?id=2148918 https://www.cve.org/CVERecord?id=CVE-2022-3970 https://nvd.nist.gov/vuln/detail/CVE-2022-3970 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3970.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oAa5rQ+ettvHgaEihiWA9A==&#34;: {&#xA;      &#34;id&#34;: &#34;oAa5rQ+ettvHgaEihiWA9A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38546&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. This flaw allows an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38546 https://bugzilla.redhat.com/show_bug.cgi?id=2241938 https://access.redhat.com/errata/RHSA-2024:2101 https://www.cve.org/CVERecord?id=CVE-2023-38546 https://nvd.nist.gov/vuln/detail/CVE-2023-38546 https://curl.se/docs/CVE-2023-38546.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38546.json https://access.redhat.com/errata/RHSA-2023:5763&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oBl0IuwDdaD9PwMwSDcQpg==&#34;: {&#xA;      &#34;id&#34;: &#34;oBl0IuwDdaD9PwMwSDcQpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23918&#34;,&#xA;      &#34;description&#34;: &#34;A privilege escalation vulnerability exists in Node.js \u003c19.6.1, \u003c18.14.1, \u003c16.19.1 and \u003c14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23918 https://bugzilla.redhat.com/show_bug.cgi?id=2171935 https://www.cve.org/CVERecord?id=CVE-2023-23918 https://nvd.nist.gov/vuln/detail/CVE-2023-23918 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23918.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.3-1.16.19.1.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oCDLcNdeKQmSOcg6w237gw==&#34;: {&#xA;      &#34;id&#34;: &#34;oCDLcNdeKQmSOcg6w237gw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-47081&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-09T17:57:47Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-47081 https://bugzilla.redhat.com/show_bug.cgi?id=2371272 https://www.cve.org/CVERecord?id=CVE-2024-47081 https://nvd.nist.gov/vuln/detail/CVE-2024-47081 http://seclists.org/fulldisclosure/2025/Jun/2 http://www.openwall.com/lists/oss-security/2025/06/03/11 http://www.openwall.com/lists/oss-security/2025/06/03/9 http://www.openwall.com/lists/oss-security/2025/06/04/1 http://www.openwall.com/lists/oss-security/2025/06/04/6 https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef https://github.com/psf/requests/pull/6965 https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7 https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env https://seclists.org/fulldisclosure/2025/Jun/2 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-47081.json https://access.redhat.com/errata/RHSA-2025:12519&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-requests&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.25.1-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oCYqRL0yaCqkmUcecOaYrA==&#34;: {&#xA;      &#34;id&#34;: &#34;oCYqRL0yaCqkmUcecOaYrA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1528&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici&#39;s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:21:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1528 https://bugzilla.redhat.com/show_bug.cgi?id=2447145 https://www.cve.org/CVERecord?id=CVE-2026-1528 https://nvd.nist.gov/vuln/detail/CVE-2026-1528 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj https://hackerone.com/reports/3537648 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1528.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oDGZCaWnkiaSQdz+QhIr5Q==&#34;: {&#xA;      &#34;id&#34;: &#34;oDGZCaWnkiaSQdz+QhIr5Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oDr5DknKU9AmvJu2r8+yFw==&#34;: {&#xA;      &#34;id&#34;: &#34;oDr5DknKU9AmvJu2r8+yFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oEKqq2GIVwWjorWJihmJiw==&#34;: {&#xA;      &#34;id&#34;: &#34;oEKqq2GIVwWjorWJihmJiw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0727&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The optional ContentInfo fields can be set to null, even if the \&#34;type\&#34; is a valid value, which can lead to a null dereference error that may cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0727 https://bugzilla.redhat.com/show_bug.cgi?id=2259944 https://www.cve.org/CVERecord?id=CVE-2024-0727 https://nvd.nist.gov/vuln/detail/CVE-2024-0727 https://github.com/openssl/openssl/pull/23362 https://www.openssl.org/news/secadv/20240125.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0727.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oGKMWwqd8g23cJbO7k5MNA==&#34;: {&#xA;      &#34;id&#34;: &#34;oGKMWwqd8g23cJbO7k5MNA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1753&#34;,&#xA;      &#34;description&#34;: &#34;Improper handling of empty HTML attributes in html/template&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-05T21:10:24Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/59722 https://go.dev/cl/491617 https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.9&#34;&#xA;    },&#xA;    &#34;oGVW07Zdco+t8LxGqPbEUA==&#34;: {&#xA;      &#34;id&#34;: &#34;oGVW07Zdco+t8LxGqPbEUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32681&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python-requests package, where it is vulnerable to potentially leaking Proxy-Authorization headers to destination servers, specifically during redirects to an HTTPS origin. This is a product of how rebuild_proxies is used to recompute and reattach the Proxy-Authorization header to requests when redirected. This behavior only affects proxied requests when credentials are supplied in the URL user information component (for example, https://username:password@proxy:8080).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32681 https://bugzilla.redhat.com/show_bug.cgi?id=2209469 https://www.cve.org/CVERecord?id=CVE-2023-32681 https://nvd.nist.gov/vuln/detail/CVE-2023-32681 https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32681.json https://access.redhat.com/errata/RHSA-2023:4350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-requests&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.25.1-7.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oGhsPyoyEtiEHT7/0qF+CQ==&#34;: {&#xA;      &#34;id&#34;: &#34;oGhsPyoyEtiEHT7/0qF+CQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-7545&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. The `copy_section` function in `binutils/objcopy.c` is susceptible to a heap-based buffer overflow due to improper bounds checking during data copying. This flaw allows a local attacker to provide a specially crafted file. This manipulation can lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-13T21:44:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7545 https://bugzilla.redhat.com/show_bug.cgi?id=2379785 https://www.cve.org/CVERecord?id=CVE-2025-7545 https://nvd.nist.gov/vuln/detail/CVE-2025-7545 https://sourceware.org/bugzilla/attachment.cgi?id=16117 https://sourceware.org/bugzilla/show_bug.cgi?id=33049 https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944 https://vuldb.com/?ctiid.316243 https://vuldb.com/?id.316243 https://vuldb.com/?submit.614355 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7545.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oIBUxFCAPk4vRXBwpcmtFw==&#34;: {&#xA;      &#34;id&#34;: &#34;oIBUxFCAPk4vRXBwpcmtFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-44840&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow vulnerability was found in binutils in the find_section_in_set function. This flaw allows an attacker to use a specially crafted payload to trigger a buffer overflow, resulting in issues with availability, confidentiality, and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-44840 https://bugzilla.redhat.com/show_bug.cgi?id=2234004 https://www.cve.org/CVERecord?id=CVE-2022-44840 https://nvd.nist.gov/vuln/detail/CVE-2022-44840 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-44840.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oIxZENYISdQtE42Fc34Vyg==&#34;: {&#xA;      &#34;id&#34;: &#34;oIxZENYISdQtE42Fc34Vyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oNps3pS/KBKadK++zlgktA==&#34;: {&#xA;      &#34;id&#34;: &#34;oNps3pS/KBKadK++zlgktA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22866&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-06T16:54:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22866 https://bugzilla.redhat.com/show_bug.cgi?id=2344219 https://www.cve.org/CVERecord?id=CVE-2025-22866 https://nvd.nist.gov/vuln/detail/CVE-2025-22866 https://go.dev/cl/643735 https://go.dev/issue/71383 https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k https://pkg.go.dev/vuln/GO-2025-3447 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22866.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;delve&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.1-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oQ3Lediq93z2xbrIoJUi7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;oQ3Lediq93z2xbrIoJUi7Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oQ8YhXsWl1bwUCG1x+HzDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;oQ8YhXsWl1bwUCG1x+HzDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24807&#34;,&#xA;      &#34;description&#34;: &#34;Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24807 https://bugzilla.redhat.com/show_bug.cgi?id=2172204 https://www.cve.org/CVERecord?id=CVE-2023-24807 https://nvd.nist.gov/vuln/detail/CVE-2023-24807 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24807.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oUbBUuaPbKO68xR8hm0EKg==&#34;: {&#xA;      &#34;id&#34;: &#34;oUbBUuaPbKO68xR8hm0EKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27538&#34;,&#xA;      &#34;description&#34;: &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27538 https://bugzilla.redhat.com/show_bug.cgi?id=2179103 https://www.cve.org/CVERecord?id=CVE-2023-27538 https://nvd.nist.gov/vuln/detail/CVE-2023-27538 https://curl.se/docs/CVE-2023-27538.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27538.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oVI7j6msaWseNIkn6m/3+A==&#34;: {&#xA;      &#34;id&#34;: &#34;oVI7j6msaWseNIkn6m/3+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32611&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32611 https://bugzilla.redhat.com/show_bug.cgi?id=2211829 https://www.cve.org/CVERecord?id=CVE-2023-32611 https://nvd.nist.gov/vuln/detail/CVE-2023-32611 https://gitlab.gnome.org/GNOME/glib/-/issues/2797 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32611.json https://access.redhat.com/errata/RHSA-2023:6631&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oVgcRSL89qnSRkMXpV8N8A==&#34;: {&#xA;      &#34;id&#34;: &#34;oVgcRSL89qnSRkMXpV8N8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2819&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim. The vulnerability occurs due to illegal memory access and leads to a heap buffer overflow vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2819 https://bugzilla.redhat.com/show_bug.cgi?id=2118594 https://www.cve.org/CVERecord?id=CVE-2022-2819 https://nvd.nist.gov/vuln/detail/CVE-2022-2819 https://huntr.dev/bounties/0a9bd71e-66b8-4eb1-9566-7dfd9b097e59 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2819.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oXbtPoAI0xd/D3jVRZ8E8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;oXbtPoAI0xd/D3jVRZ8E8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23916&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. A malicious server can insert an unlimited number of compression steps. This decompression chain could result in out-of-memory errors.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23916 https://bugzilla.redhat.com/show_bug.cgi?id=2167815 https://www.cve.org/CVERecord?id=CVE-2023-23916 https://nvd.nist.gov/vuln/detail/CVE-2023-23916 https://curl.se/docs/CVE-2023-23916.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23916.json https://access.redhat.com/errata/RHSA-2023:1701&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-19.el9_1.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oYEyIJ07SURdsg7rK6qrYw==&#34;: {&#xA;      &#34;id&#34;: &#34;oYEyIJ07SURdsg7rK6qrYw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-1037&#34;,&#xA;      &#34;description&#34;: &#34;Unbounded memory consumption when reading headers in archive/tar&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-06T16:26:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/54853 https://go.dev/cl/439355 https://groups.google.com/g/golang-announce/c/xtuG5faxtaU&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.7&#34;&#xA;    },&#xA;    &#34;obSzOBXxlQxURPk04eb+8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;obSzOBXxlQxURPk04eb+8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52356&#34;,&#xA;      &#34;description&#34;: &#34;A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-52356 https://bugzilla.redhat.com/show_bug.cgi?id=2251344 https://www.cve.org/CVERecord?id=CVE-2023-52356 https://nvd.nist.gov/vuln/detail/CVE-2023-52356 https://gitlab.com/libtiff/libtiff/-/issues/622 https://gitlab.com/libtiff/libtiff/-/merge_requests/546 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-52356.json https://access.redhat.com/errata/RHSA-2025:20801&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-15.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;obTTrP5oWTTgSGItpJqyKg==&#34;: {&#xA;      &#34;id&#34;: &#34;obTTrP5oWTTgSGItpJqyKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-30631&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-30631 https://bugzilla.redhat.com/show_bug.cgi?id=2107342 https://www.cve.org/CVERecord?id=CVE-2022-30631 https://nvd.nist.gov/vuln/detail/CVE-2022-30631 https://go.dev/issue/53168 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-30631.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ohJ0B7EgOJ9MaxYsbvhjIA==&#34;: {&#xA;      &#34;id&#34;: &#34;ohJ0B7EgOJ9MaxYsbvhjIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3826&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Libiberty. A heap and stack buffer overflow found in the dlang_lname function in d-demangle.c leads to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-09-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3826 https://bugzilla.redhat.com/show_bug.cgi?id=2122627 https://www.cve.org/CVERecord?id=CVE-2021-3826 https://nvd.nist.gov/vuln/detail/CVE-2021-3826 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3826.json https://access.redhat.com/errata/RHSA-2023:6372&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb-gdbserver&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:10.2-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;okR1HNl+O4zCKuv8Joeqcg==&#34;: {&#xA;      &#34;id&#34;: &#34;okR1HNl+O4zCKuv8Joeqcg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;okRzJuZWda3BPI4wHU6OSg==&#34;: {&#xA;      &#34;id&#34;: &#34;okRzJuZWda3BPI4wHU6OSg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24784&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s net/mail standard library package. The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions made by programs using different parsers.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24784 https://bugzilla.redhat.com/show_bug.cgi?id=2268021 https://www.cve.org/CVERecord?id=CVE-2024-24784 https://nvd.nist.gov/vuln/detail/CVE-2024-24784 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24784.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;okW8xf+CinO7BWuM9dEk4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;okW8xf+CinO7BWuM9dEk4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;opnb226IH8+SU+iAVOx8hw==&#34;: {&#xA;      &#34;id&#34;: &#34;opnb226IH8+SU+iAVOx8hw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3138&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3138 https://bugzilla.redhat.com/show_bug.cgi?id=2213748 https://www.cve.org/CVERecord?id=CVE-2023-3138 https://nvd.nist.gov/vuln/detail/CVE-2023-3138 https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/304a654a0d57bf0f00d8998185f0360332cfa36c https://lists.x.org/archives/xorg-announce/2023-June/003406.html https://lists.x.org/archives/xorg-announce/2023-June/003407.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3138.json https://access.redhat.com/errata/RHSA-2023:6497&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11-xcb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-8.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oqSc7q4k6wTno/u9knscCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9681&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in curl. When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain&#39;s cache entry, making it end sooner or later than intended.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9681 https://bugzilla.redhat.com/show_bug.cgi?id=2322969 https://www.cve.org/CVERecord?id=CVE-2024-9681 https://nvd.nist.gov/vuln/detail/CVE-2024-9681 https://hackerone.com/reports/2764830 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9681.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;osxk1q2jE3TCrr5JCQRhNA==&#34;: {&#xA;      &#34;id&#34;: &#34;osxk1q2jE3TCrr5JCQRhNA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25629&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25629 https://bugzilla.redhat.com/show_bug.cgi?id=2265713 https://www.cve.org/CVERecord?id=CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629 https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25629.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oucbqlkzMDMKcvhtL5s8bg==&#34;: {&#xA;      &#34;id&#34;: &#34;oucbqlkzMDMKcvhtL5s8bg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27140&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Go programming language (golang) and its command-line tool (cmd/go). A remote attacker could exploit this during the build process by crafting malicious SWIG (Simplified Wrapper and Interface Generator) file names that contain \&#34;cgo\&#34; and specific payloads. This could lead to code smuggling and arbitrary code execution, bypassing trust mechanisms and allowing the attacker to run unauthorized code.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27140 https://bugzilla.redhat.com/show_bug.cgi?id=2456341 https://www.cve.org/CVERecord?id=CVE-2026-27140 https://nvd.nist.gov/vuln/detail/CVE-2026-27140 https://go.dev/cl/763768 https://go.dev/issue/78335 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4871 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27140.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;owALVsfUiwMtDqenpdt7Zg==&#34;: {&#xA;      &#34;id&#34;: &#34;owALVsfUiwMtDqenpdt7Zg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30581&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been discovered in Node.js,  where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30581 https://bugzilla.redhat.com/show_bug.cgi?id=2219824 https://www.cve.org/CVERecord?id=CVE-2023-30581 https://nvd.nist.gov/vuln/detail/CVE-2023-30581 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30581.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.16.1-1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oyvtOIVUDqm1ruQx8vhRhA==&#34;: {&#xA;      &#34;id&#34;: &#34;oyvtOIVUDqm1ruQx8vhRhA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22667&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in Vim. The did_set_langmap function in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions. That buffer can be overflown, possibly leading to memory corruption and escalation of privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22667 https://bugzilla.redhat.com/show_bug.cgi?id=2262999 https://www.cve.org/CVERecord?id=CVE-2024-22667 https://nvd.nist.gov/vuln/detail/CVE-2024-22667 https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22667.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ozbcadljjD/zIm3hj6kVaw==&#34;: {&#xA;      &#34;id&#34;: &#34;ozbcadljjD/zIm3hj6kVaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39615&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Libxml2, where it contains a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a denial of service (DoS) by supplying a crafted XML file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39615 https://bugzilla.redhat.com/show_bug.cgi?id=2235864 https://www.cve.org/CVERecord?id=CVE-2023-39615 https://nvd.nist.gov/vuln/detail/CVE-2023-39615 https://gitlab.gnome.org/GNOME/libxml2/-/issues/535 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39615.json https://access.redhat.com/errata/RHSA-2023:7747&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-5.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;p2+Y5XRhYt7mgZ7H+35S0w==&#34;: {&#xA;      &#34;id&#34;: &#34;p2+Y5XRhYt7mgZ7H+35S0w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-File-Find&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.37-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;p2D36zAi5tbYfUPJhBVLhg==&#34;: {&#xA;      &#34;id&#34;: &#34;p2D36zAi5tbYfUPJhBVLhg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38546&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. This flaw allows an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38546 https://bugzilla.redhat.com/show_bug.cgi?id=2241938 https://access.redhat.com/errata/RHSA-2024:2101 https://www.cve.org/CVERecord?id=CVE-2023-38546 https://nvd.nist.gov/vuln/detail/CVE-2023-38546 https://curl.se/docs/CVE-2023-38546.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38546.json https://access.redhat.com/errata/RHSA-2023:6745&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;p4PSGpZ+FENmdQZ22vQ2FQ==&#34;: {&#xA;      &#34;id&#34;: &#34;p4PSGpZ+FENmdQZ22vQ2FQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-48385&#34;,&#xA;      &#34;description&#34;: &#34;A bundled uri handling flaw was found in Git. When cloning a repository, Git knows to optionally fetch a bundle advertised by the remote server, which allows the server side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T18:23:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-48385 https://bugzilla.redhat.com/show_bug.cgi?id=2378808 https://www.cve.org/CVERecord?id=CVE-2025-48385 https://nvd.nist.gov/vuln/detail/CVE-2025-48385 https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-48385.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;p5Ki7Z96ChbT07EZ4WnnKg==&#34;: {&#xA;      &#34;id&#34;: &#34;p5Ki7Z96ChbT07EZ4WnnKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45289&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s net/http/cookiejar standard library package. When following an HTTP redirect to a domain that is not a subdomain match or an exact match of the initial domain, an http.Client does not forward sensitive headers such as \&#34;Authorization\&#34; or \&#34;Cookie\&#34;. For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45289 https://bugzilla.redhat.com/show_bug.cgi?id=2268018 https://www.cve.org/CVERecord?id=CVE-2023-45289 https://nvd.nist.gov/vuln/detail/CVE-2023-45289 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45289.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;p8XKlr7C/uFXLykQP2132Q==&#34;: {&#xA;      &#34;id&#34;: &#34;p8XKlr7C/uFXLykQP2132Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25136&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSH server (sshd), which introduced a double-free vulnerability during options.kex_algorithms handling. An unauthenticated attacker can trigger the double-free in the default configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25136 https://bugzilla.redhat.com/show_bug.cgi?id=2167636 https://www.cve.org/CVERecord?id=CVE-2023-25136 https://nvd.nist.gov/vuln/detail/CVE-2023-25136 https://bugzilla.mindrot.org/show_bug.cgi?id=3522 https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946 https://www.openwall.com/lists/oss-security/2023/02/02/2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25136.json https://access.redhat.com/errata/RHSA-2023:2645&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-29.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pBJCL45M2NleSRKXAGAPTw==&#34;: {&#xA;      &#34;id&#34;: &#34;pBJCL45M2NleSRKXAGAPTw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61143&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtiff. This vulnerability, a NULL pointer dereference, occurs in the `tif_open.c` component. An attacker could exploit this by providing specially crafted input, leading to a Denial of Service (DoS) due to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61143 https://bugzilla.redhat.com/show_bug.cgi?id=2441978 https://www.cve.org/CVERecord?id=CVE-2025-61143 https://nvd.nist.gov/vuln/detail/CVE-2025-61143 https://gist.github.com/optionGo/9c024cd8e7b131463b84dc60af9bb0aa https://gitlab.com/libtiff/libtiff/-/issues/737 https://gitlab.com/libtiff/libtiff/-/merge_requests/755 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61143.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pC9XVLaTUwErG9Rd01nABA==&#34;: {&#xA;      &#34;id&#34;: &#34;pC9XVLaTUwErG9Rd01nABA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47906&#34;,&#xA;      &#34;description&#34;: &#34;A path handling flaw has been discovered in the os/exec go package. If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\&#34;\&#34;, \&#34;.\&#34;, and \&#34;..\&#34;), can result in the binaries listed in the PATH being unexpectedly returned.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-18T18:41:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47906 https://bugzilla.redhat.com/show_bug.cgi?id=2396546 https://www.cve.org/CVERecord?id=CVE-2025-47906 https://nvd.nist.gov/vuln/detail/CVE-2025-47906 https://go.dev/cl/691775 https://go.dev/issue/74466 https://groups.google.com/g/golang-announce/c/x5MKroML2yM https://pkg.go.dev/vuln/GO-2025-3956 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47906.json https://access.redhat.com/errata/RHSA-2025:22005&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-srpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.6.0-12.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pENgwsqn4gloGqUZSMstFA==&#34;: {&#xA;      &#34;id&#34;: &#34;pENgwsqn4gloGqUZSMstFA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4864&#34;,&#xA;      &#34;description&#34;: &#34;TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T22:53:49Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/763761 https://go.dev/issue/78293 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.25.9&#34;&#xA;    },&#xA;    &#34;pEwkPeffucbY50JSGQdERQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pEwkPeffucbY50JSGQdERQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3358&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL, where it incorrectly handles legacy custom ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other similarly named encryption and decryption initialization functions). Instead of using the custom cipher directly, it incorrectly tries to fetch an equivalent cipher from the available providers. An equivalent cipher is found based on the NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a given cipher. However, it is possible for an application to incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef is used this way, the OpenSSL encryption/decryption initialization function will match the NULL cipher as equivalent and fetch this from the available providers. This is successful if the default provider has been loaded (or if a third-party provider has been loaded that offers this cipher). Using the NULL cipher means that the plaintext is emitted as the ciphertext.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3358 https://bugzilla.redhat.com/show_bug.cgi?id=2134740 https://www.cve.org/CVERecord?id=CVE-2022-3358 https://nvd.nist.gov/vuln/detail/CVE-2022-3358 https://www.openssl.org/news/secadv/20221011.txt https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3358.json https://access.redhat.com/errata/RHSA-2023:2523&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-6.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pF95anl048AG1ftGU/lNnw==&#34;: {&#xA;      &#34;id&#34;: &#34;pF95anl048AG1ftGU/lNnw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21710&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21710 https://bugzilla.redhat.com/show_bug.cgi?id=2453151 https://www.cve.org/CVERecord?id=CVE-2026-21710 https://nvd.nist.gov/vuln/detail/CVE-2026-21710 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21710.json https://access.redhat.com/errata/RHSA-2026:7896&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.2-1.module+el9.7.0+24193+41b7b572&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pFXK+S/0lzfxv0ToVY49hA==&#34;: {&#xA;      &#34;id&#34;: &#34;pFXK+S/0lzfxv0ToVY49hA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22018&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js package. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files they do not have explicit read access to.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22018 https://bugzilla.redhat.com/show_bug.cgi?id=2296990 https://www.cve.org/CVERecord?id=CVE-2024-22018 https://nvd.nist.gov/vuln/detail/CVE-2024-22018 https://hackerone.com/reports/2145862 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22018.json https://access.redhat.com/errata/RHSA-2024:5815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.16.0-1.module+el9.4.0+22197+9e60f127&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pGkOHCsusTyFHJ/G9JGXiA==&#34;: {&#xA;      &#34;id&#34;: &#34;pGkOHCsusTyFHJ/G9JGXiA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24807&#34;,&#xA;      &#34;description&#34;: &#34;Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24807 https://bugzilla.redhat.com/show_bug.cgi?id=2172204 https://www.cve.org/CVERecord?id=CVE-2023-24807 https://nvd.nist.gov/vuln/detail/CVE-2023-24807 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24807.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pHq3XsQe5Y157BuUHMufyg==&#34;: {&#xA;      &#34;id&#34;: &#34;pHq3XsQe5Y157BuUHMufyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24532&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/internal/nistec golang library. The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars, such as a scalar larger than the order of the curve. This does not impact usages of crypto/ecdsa or crypto/ecdh.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24532 https://bugzilla.redhat.com/show_bug.cgi?id=2223355 https://www.cve.org/CVERecord?id=CVE-2023-24532 https://nvd.nist.gov/vuln/detail/CVE-2023-24532 https://go.dev/cl/471255 https://go.dev/issue/58647 https://groups.google.com/g/golang-announce/c/3-TpUx48iQY https://pkg.go.dev/vuln/GO-2023-1621 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24532.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pIJllB0DitFR4biXCLWlfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pIJllB0DitFR4biXCLWlfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24783&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s crypto/x509 standard library package. Verifying a certificate chain that contains a certificate with an unknown public key algorithm will cause a Certificate.Verify to panic. This issue affects all crypto/tls clients and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24783 https://bugzilla.redhat.com/show_bug.cgi?id=2268019 https://www.cve.org/CVERecord?id=CVE-2024-24783 https://nvd.nist.gov/vuln/detail/CVE-2024-24783 http://www.openwall.com/lists/oss-security/2024/03/08/4 https://github.com/advisories/GHSA-3q2c-pvp5-3cqp https://go.dev/cl/569339 https://go.dev/issue/65390 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg https://pkg.go.dev/vuln/GO-2024-2598 https://security.netapp.com/advisory/ntap-20240329-0005 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24783.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pK26sxPUfpa6SjJQHK9XfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pK26sxPUfpa6SjJQHK9XfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21712&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. This vulnerability allows an attacker to cause a Denial of Service (DoS) by providing a malformed Internationalized Domain Name (IDN) to the `url.format()` function. When processed, this malformed input triggers an internal error, causing the Node.js application to crash. This can disrupt services and make them unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T15:13:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21712 https://bugzilla.redhat.com/show_bug.cgi?id=2453037 https://www.cve.org/CVERecord?id=CVE-2026-21712 https://nvd.nist.gov/vuln/detail/CVE-2026-21712 https://hackerone.com/reports/3546390 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21712.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pLMgO5RHEs1yrujEkb226g==&#34;: {&#xA;      &#34;id&#34;: &#34;pLMgO5RHEs1yrujEkb226g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22870&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in proxy host matching. This vulnerability allows improper bypassing of proxy settings via manipulating an IPv6 zone ID, causing unintended matches against the NO_PROXY environment variable.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-12T18:27:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22870 https://bugzilla.redhat.com/show_bug.cgi?id=2351766 https://www.cve.org/CVERecord?id=CVE-2025-22870 https://nvd.nist.gov/vuln/detail/CVE-2025-22870 https://go.dev/cl/654697 https://go.dev/issue/71984 https://pkg.go.dev/vuln/GO-2025-3503 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22870.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pN9L6/wRgu21CuY/FfnkIA==&#34;: {&#xA;      &#34;id&#34;: &#34;pN9L6/wRgu21CuY/FfnkIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7008&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222672 https://www.cve.org/CVERecord?id=CVE-2023-7008 https://nvd.nist.gov/vuln/detail/CVE-2023-7008 https://bugzilla.redhat.com/show_bug.cgi?id=2222261 https://github.com/systemd/systemd/issues/25676 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7008.json https://access.redhat.com/errata/RHSA-2024:2463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-32.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pNsmsBM6zioL8gqkR9CNUA==&#34;: {&#xA;      &#34;id&#34;: &#34;pNsmsBM6zioL8gqkR9CNUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27982&#34;,&#xA;      &#34;description&#34;: &#34;An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27982 https://bugzilla.redhat.com/show_bug.cgi?id=2275392 https://www.cve.org/CVERecord?id=CVE-2024-27982 https://nvd.nist.gov/vuln/detail/CVE-2024-27982 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27982.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pT+67u2xHyxzA5Cl+Ui55Q==&#34;: {&#xA;      &#34;id&#34;: &#34;pT+67u2xHyxzA5Cl+Ui55Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28321&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. An incorrect International Domain Name (IDN) wildcard match may lead to improper certificate validation.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28321 https://bugzilla.redhat.com/show_bug.cgi?id=2196786 https://www.cve.org/CVERecord?id=CVE-2023-28321 https://nvd.nist.gov/vuln/detail/CVE-2023-28321 https://curl.se/docs/CVE-2023-28321.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28321.json https://access.redhat.com/errata/RHSA-2023:4354&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pTPOuY2Z9zqKtyr33n5ctw==&#34;: {&#xA;      &#34;id&#34;: &#34;pTPOuY2Z9zqKtyr33n5ctw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pTT7g2z3OsAYgdVqJMZOLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pTT7g2z3OsAYgdVqJMZOLQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0521&#34;,&#xA;      &#34;description&#34;: &#34;Stack exhaustion from deeply nested XML documents in encoding/xml&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-20T17:02:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/417062 https://go.googlesource.com/go/+/08c46ed43d80bbb67cb904944ea3417989be4af3 https://go.dev/issue/53614 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.4&#34;&#xA;    },&#xA;    &#34;pWQV0Z8XQHYl5n7sHUZBqA==&#34;: {&#xA;      &#34;id&#34;: &#34;pWQV0Z8XQHYl5n7sHUZBqA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js due to a lack of safeguards on chunk extension bytes. The server may read an unbounded number of bytes from a single connection, which can allow an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22019 https://bugzilla.redhat.com/show_bug.cgi?id=2264574 https://www.cve.org/CVERecord?id=CVE-2024-22019 https://nvd.nist.gov/vuln/detail/CVE-2024-22019 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22019.json https://access.redhat.com/errata/RHSA-2024:1503&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.19.1-1.module+el9.3.0+21388+22892fb9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pWmmw4ixBXV6KyYl3C9RWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pWmmw4ixBXV6KyYl3C9RWQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pX9giWYBuTR0yK974RC2ng==&#34;: {&#xA;      &#34;id&#34;: &#34;pX9giWYBuTR0yK974RC2ng==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7104&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in SQLite3. This issue affects the sessionReadRecord function of the ext/session/sqlite3session.c function in the make alltest Handler component. Manipulation may cause a heap-based buffer overflow to occur.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7104 https://bugzilla.redhat.com/show_bug.cgi?id=2256194 https://www.cve.org/CVERecord?id=CVE-2023-7104 https://nvd.nist.gov/vuln/detail/CVE-2023-7104 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7104.json https://access.redhat.com/errata/RHSA-2024:0465&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-7.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pd2B9G+4ekvOFTzso0NXCw==&#34;: {&#xA;      &#34;id&#34;: &#34;pd2B9G+4ekvOFTzso0NXCw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8088&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s zipfile module. When iterating over the entries of a zip archive, the process can enter into an infinite loop state and become unresponsive. This flaw allows an attacker to craft a malicious ZIP archive, leading to a denial of service from the application consuming the zipfile module. Only applications that handle user-controlled zip archives are affected by this vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-22T19:15:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-8088 https://bugzilla.redhat.com/show_bug.cgi?id=2307370 https://www.cve.org/CVERecord?id=CVE-2024-8088 https://nvd.nist.gov/vuln/detail/CVE-2024-8088 https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64 https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea https://github.com/python/cpython/issues/122905 https://github.com/python/cpython/pull/122906 https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8088.json https://access.redhat.com/errata/RHSA-2024:6163&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;peMVLpnT962hXrm4IDBPqg==&#34;: {&#xA;      &#34;id&#34;: &#34;peMVLpnT962hXrm4IDBPqg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52005&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git. When cloning, fetching, or pushing from a server, informational or error messages are transported from the remote Git process to the client via a sideband channel. These messages are prefixed with \&#34;remote:\&#34; and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information or to mislead the user into executing untrusted scripts.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-15T17:35:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52005 https://bugzilla.redhat.com/show_bug.cgi?id=2338289 https://www.cve.org/CVERecord?id=CVE-2024-52005 https://nvd.nist.gov/vuln/detail/CVE-2024-52005 https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329 https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52005.json https://access.redhat.com/errata/RHSA-2025:7409&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.1-2.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;peuiWx2cfvlg0ej3db5p4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;peuiWx2cfvlg0ej3db5p4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34155&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the go/parser package of the Golang standard library. Calling any Parse functions on Go source code containing deeply nested literals can cause a panic due to stack exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34155 https://bugzilla.redhat.com/show_bug.cgi?id=2310527 https://www.cve.org/CVERecord?id=CVE-2024-34155 https://nvd.nist.gov/vuln/detail/CVE-2024-34155 https://go.dev/cl/611238 https://go.dev/issue/69138 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3105 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34155.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pfNYlxG8sY9hFt3528zJoA==&#34;: {&#xA;      &#34;id&#34;: &#34;pfNYlxG8sY9hFt3528zJoA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27983&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27983 https://bugzilla.redhat.com/show_bug.cgi?id=2272764 https://www.cve.org/CVERecord?id=CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27983.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pfZcHRowGRRifIIMXAg+9w==&#34;: {&#xA;      &#34;id&#34;: &#34;pfZcHRowGRRifIIMXAg+9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5678&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL, which caused the generation or checking of long X9.42 DH keys or parameters to be much slower than expected. This issue could lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5678 https://bugzilla.redhat.com/show_bug.cgi?id=2248616 https://www.cve.org/CVERecord?id=CVE-2023-5678 https://nvd.nist.gov/vuln/detail/CVE-2023-5678 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6 https://www.openssl.org/news/secadv/20231106.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5678.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pg+SRV3v3Mv4Yg+0x76+jg==&#34;: {&#xA;      &#34;id&#34;: &#34;pg+SRV3v3Mv4Yg+0x76+jg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This issue occurs when hashing empty strings which aren&#39;t null-terminated, xmlDictComputeFastKey could produce inconsistent results, which may lead to various logic or memory errors, including double free errors.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29469 https://bugzilla.redhat.com/show_bug.cgi?id=2185984 https://www.cve.org/CVERecord?id=CVE-2023-29469 https://nvd.nist.gov/vuln/detail/CVE-2023-29469 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29469.json https://access.redhat.com/errata/RHSA-2023:4349&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-3.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;piA8HykwHgm/u3haFYSPzw==&#34;: {&#xA;      &#34;id&#34;: &#34;piA8HykwHgm/u3haFYSPzw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2975&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries, which are unauthenticated as a consequence. Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be misled by removing, adding, or reordering such empty entries as these are ignored by the OpenSSL implementation. The AES-SIV algorithm allows for the authentication of multiple associated data entries and encryption. To authenticate empty data, the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with a NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL returns success for such a call instead of performing the associated data authentication operation. Thus, the empty data will not be authenticated.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2975 https://bugzilla.redhat.com/show_bug.cgi?id=2223016 https://www.cve.org/CVERecord?id=CVE-2023-2975 https://nvd.nist.gov/vuln/detail/CVE-2023-2975 https://www.openssl.org/news/secadv/20230714.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2975.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pl0eAtev2igDstYhHd6sxw==&#34;: {&#xA;      &#34;id&#34;: &#34;pl0eAtev2igDstYhHd6sxw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25881&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25881 https://bugzilla.redhat.com/show_bug.cgi?id=2165824 https://www.cve.org/CVERecord?id=CVE-2022-25881 https://nvd.nist.gov/vuln/detail/CVE-2022-25881 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25881.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;plDQVm4QhCu9lfz3pQKBFw==&#34;: {&#xA;      &#34;id&#34;: &#34;plDQVm4QhCu9lfz3pQKBFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21712&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. This vulnerability allows an attacker to cause a Denial of Service (DoS) by providing a malformed Internationalized Domain Name (IDN) to the `url.format()` function. When processed, this malformed input triggers an internal error, causing the Node.js application to crash. This can disrupt services and make them unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T15:13:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21712 https://bugzilla.redhat.com/show_bug.cgi?id=2453037 https://www.cve.org/CVERecord?id=CVE-2026-21712 https://nvd.nist.gov/vuln/detail/CVE-2026-21712 https://hackerone.com/reports/3546390 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21712.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;plTl3JV8fPj1sUiMh31FmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;plTl3JV8fPj1sUiMh31FmQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6597&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the tempfile.TemporaryDirectory class in python3/cpython3. The class may dereference symbolic links during permission-related errors, resulting in users that run privileged programs being able to modify permissions of files referenced by the symbolic link.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6597 https://bugzilla.redhat.com/show_bug.cgi?id=2276518 https://www.cve.org/CVERecord?id=CVE-2023-6597 https://nvd.nist.gov/vuln/detail/CVE-2023-6597 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6597.json https://access.redhat.com/errata/RHSA-2024:4078&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pmYCdyBPlSpsjaT+VrrmLg==&#34;: {&#xA;      &#34;id&#34;: &#34;pmYCdyBPlSpsjaT+VrrmLg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24807&#34;,&#xA;      &#34;description&#34;: &#34;Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24807 https://bugzilla.redhat.com/show_bug.cgi?id=2172204 https://www.cve.org/CVERecord?id=CVE-2023-24807 https://nvd.nist.gov/vuln/detail/CVE-2023-24807 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24807.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pp3PQor2CpTCVnKZusQgwg==&#34;: {&#xA;      &#34;id&#34;: &#34;pp3PQor2CpTCVnKZusQgwg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21892&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. On Linux, Node.js ignores certain environment variables if an unprivileged user has set them while the process is running with elevated privileges, except for CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when other capabilities have been set. This flaw allows unprivileged users to inject code that inherits the process&#39;s elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21892 https://bugzilla.redhat.com/show_bug.cgi?id=2264582 https://www.cve.org/CVERecord?id=CVE-2024-21892 https://nvd.nist.gov/vuln/detail/CVE-2024-21892 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21892.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pqvnt6puEE8VbSe1ozlTfg==&#34;: {&#xA;      &#34;id&#34;: &#34;pqvnt6puEE8VbSe1ozlTfg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45336&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45336 https://bugzilla.redhat.com/show_bug.cgi?id=2341751 https://www.cve.org/CVERecord?id=CVE-2024-45336 https://nvd.nist.gov/vuln/detail/CVE-2024-45336 https://github.com/golang/go/issues/70530 https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45336.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pr6wo3A29JKUBSVK/BGExw==&#34;: {&#xA;      &#34;id&#34;: &#34;pr6wo3A29JKUBSVK/BGExw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32465&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git in a full copy of a Git repository. A prerequisite for this vulnerability is for an unauthenticated attacker to place a specialized repository on their target&#39;s local system. If the victim were to clone this repository, it could result in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32465 https://bugzilla.redhat.com/show_bug.cgi?id=2280446 https://www.cve.org/CVERecord?id=CVE-2024-32465 https://nvd.nist.gov/vuln/detail/CVE-2024-32465 https://github.com/git/git/security/advisories/GHSA-vm9j-46j9-qvq4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32465.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;psR1kVsSZz19yYKHsoaoNg==&#34;: {&#xA;      &#34;id&#34;: &#34;psR1kVsSZz19yYKHsoaoNg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23936&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the fetch API in Node.js that did not prevent CRLF injection in the &#39;host&#39; header. This issue could allow HTTP response splitting and HTTP header injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23936 https://bugzilla.redhat.com/show_bug.cgi?id=2172190 https://www.cve.org/CVERecord?id=CVE-2023-23936 https://nvd.nist.gov/vuln/detail/CVE-2023-23936 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23936.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;psclC23VyV2exiVERqdTxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;psclC23VyV2exiVERqdTxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69644&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. A local attacker can exploit a logic flaw in the handling of DWARF (Debugging With Attributed Record Formats) location list headers within the objdump utility. By supplying a crafted binary with malformed debug information, the attacker can cause objdump to enter an unbounded loop, leading to excessive resource consumption and a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69644 https://bugzilla.redhat.com/show_bug.cgi?id=2445263 https://www.cve.org/CVERecord?id=CVE-2025-69644 https://nvd.nist.gov/vuln/detail/CVE-2025-69644 https://sourceware.org/bugzilla/show_bug.cgi?id=33639 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=455446bbdc8675f34808187de2bbad4682016ff7 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69644.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;psr6EfqmKkDu2s/af+27mw==&#34;: {&#xA;      &#34;id&#34;: &#34;psr6EfqmKkDu2s/af+27mw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30589&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30589 https://bugzilla.redhat.com/show_bug.cgi?id=2219841 https://www.cve.org/CVERecord?id=CVE-2023-30589 https://nvd.nist.gov/vuln/detail/CVE-2023-30589 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30589.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.16.1-1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pv5Nm8Lwfq3X5Sm3cuoD1g==&#34;: {&#xA;      &#34;id&#34;: &#34;pv5Nm8Lwfq3X5Sm3cuoD1g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pvm4gwkuqzgisbgZu1oTlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pvm4gwkuqzgisbgZu1oTlQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0527&#34;,&#xA;      &#34;description&#34;: &#34;Stack exhaustion in Glob on certain paths in io/fs&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-20T20:52:22Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/417065 https://go.googlesource.com/go/+/fa2d41d0ca736f3ad6b200b2a4e134364e9acc59 https://go.dev/issue/53415 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.4&#34;&#xA;    },&#xA;    &#34;pvtiIO9KHqFscFbvNo86Dw==&#34;: {&#xA;      &#34;id&#34;: &#34;pvtiIO9KHqFscFbvNo86Dw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-51385&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. In certain circumstances, a remote attacker may be able to execute arbitrary OS commands by using expansion tokens, such as %u or %h, with user names or host names that contain shell metacharacters.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-51385 https://bugzilla.redhat.com/show_bug.cgi?id=2255271 https://www.cve.org/CVERecord?id=CVE-2023-51385 https://nvd.nist.gov/vuln/detail/CVE-2023-51385 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-51385.json https://access.redhat.com/errata/RHSA-2024:1130&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-34.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pwFS1oPwyZIRVgVgtAgSPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pwFS1oPwyZIRVgVgtAgSPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4527 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://www.cve.org/CVERecord?id=CVE-2023-4527 https://nvd.nist.gov/vuln/detail/CVE-2023-4527 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4527.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pwNeC1oSJCRKeW3NQ1Zwmw==&#34;: {&#xA;      &#34;id&#34;: &#34;pwNeC1oSJCRKeW3NQ1Zwmw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46218&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl that verifies a given cookie domain against the Public Suffix List. This issue could allow a malicious HTTP server to set \&#34;super cookies\&#34; in curl that are passed back to more origins than what is otherwise allowed or possible.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T07:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46218 https://bugzilla.redhat.com/show_bug.cgi?id=2252030 https://www.cve.org/CVERecord?id=CVE-2023-46218 https://nvd.nist.gov/vuln/detail/CVE-2023-46218 https://curl.se/docs/CVE-2023-46218.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46218.json https://access.redhat.com/errata/RHSA-2024:1129&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pwSWzlcJAuR/J5zikGUxiw==&#34;: {&#xA;      &#34;id&#34;: &#34;pwSWzlcJAuR/J5zikGUxiw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34156&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34156 https://bugzilla.redhat.com/show_bug.cgi?id=2310528 https://www.cve.org/CVERecord?id=CVE-2024-34156 https://nvd.nist.gov/vuln/detail/CVE-2024-34156 https://go.dev/cl/611239 https://go.dev/issue/69139 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3106 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34156.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pxuVFZsuUa8YFBkmcjpnxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pxuVFZsuUa8YFBkmcjpnxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-43552&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in curl. In this issue, curl can be asked to tunnel all protocols virtually it supports through an HTTP proxy. HTTP proxies can deny these tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific SMB or TELNET protocols, curl can use a heap-allocated struct after it has been freed and shut down the code path in its transfer.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-43552 https://bugzilla.redhat.com/show_bug.cgi?id=2152652 https://www.cve.org/CVERecord?id=CVE-2022-43552 https://nvd.nist.gov/vuln/detail/CVE-2022-43552 https://curl.se/docs/CVE-2022-43552.html https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-43552.json https://access.redhat.com/errata/RHSA-2023:2478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;pzONVbRfZmj1lkGaWtUucQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pzONVbRfZmj1lkGaWtUucQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;q29SxeDdhfgnRkudvf3mdA==&#34;: {&#xA;      &#34;id&#34;: &#34;q29SxeDdhfgnRkudvf3mdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41724&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41724 https://bugzilla.redhat.com/show_bug.cgi?id=2178492 https://www.cve.org/CVERecord?id=CVE-2022-41724 https://nvd.nist.gov/vuln/detail/CVE-2022-41724 https://go.dev/cl/468125 https://go.dev/issue/58001 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E https://pkg.go.dev/vuln/GO-2023-1570 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41724.json https://access.redhat.com/errata/RHBA-2023:2181&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.6-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;q4W6wpO2YbOLS87LUXPVBw==&#34;: {&#xA;      &#34;id&#34;: &#34;q4W6wpO2YbOLS87LUXPVBw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8851&#34;,&#xA;      &#34;description&#34;: &#34;A stack based buffer overflow flaw has been discovered in libTIFF. An attacker with local access may be able to craft input to the readSeparateStripsetoBuffer function in the file tools/tiffcrop.c that triggers this flaw. This issue could allow an attacker to achieve local code execution in the context of the affected process.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-11T13:32:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8851 https://bugzilla.redhat.com/show_bug.cgi?id=2387618 https://www.cve.org/CVERecord?id=CVE-2025-8851 https://nvd.nist.gov/vuln/detail/CVE-2025-8851 http://www.libtiff.org/ https://gitlab.com/libtiff/libtiff/-/commit/8a7a48d7a645992ca83062b3a1873c951661e2b3 https://vuldb.com/?ctiid.319382 https://vuldb.com/?id.319382 https://vuldb.com/?submit.624604 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8851.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;q5joCCZ2cOTa0rXBUtiSpQ==&#34;: {&#xA;      &#34;id&#34;: &#34;q5joCCZ2cOTa0rXBUtiSpQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11839&#34;,&#xA;      &#34;description&#34;: &#34;An uncheck return value flaw has been discovered in the GNU binutils program. This flaw exists in the `tg_tag_type` function of the file prdbg.c and exploitation of this flaw may lead to a program crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-16T14:02:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11839 https://bugzilla.redhat.com/show_bug.cgi?id=2404439 https://www.cve.org/CVERecord?id=CVE-2025-11839 https://nvd.nist.gov/vuln/detail/CVE-2025-11839 https://sourceware.org/bugzilla/attachment.cgi?id=16344 https://sourceware.org/bugzilla/show_bug.cgi?id=33448 https://vuldb.com/?ctiid.328774 https://vuldb.com/?id.328774 https://vuldb.com/?submit.661279 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11839.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;q6x8gUSR0HLnQLHLmB4Htw==&#34;: {&#xA;      &#34;id&#34;: &#34;q6x8gUSR0HLnQLHLmB4Htw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractContigSamplesShifted16bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0795 https://bugzilla.redhat.com/show_bug.cgi?id=2170119 https://www.cve.org/CVERecord?id=CVE-2023-0795 https://nvd.nist.gov/vuln/detail/CVE-2023-0795 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0795.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;q7IyWv1MOsi/PXOLUGKElQ==&#34;: {&#xA;      &#34;id&#34;: &#34;q7IyWv1MOsi/PXOLUGKElQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6409&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was discovered in how signals are handled by OpenSSH&#39;s server (sshd). If a remote attacker does not authenticate within a set time period, then sshd&#39;s SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-08T17:45:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6409 https://bugzilla.redhat.com/show_bug.cgi?id=2295085 https://www.cve.org/CVERecord?id=CVE-2024-6409 https://nvd.nist.gov/vuln/detail/CVE-2024-6409 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6409.json https://access.redhat.com/errata/RHSA-2024:4457&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-38.el9_4.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;q9L+6bHSCCXbReRfXEPeTg==&#34;: {&#xA;      &#34;id&#34;: &#34;q9L+6bHSCCXbReRfXEPeTg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43787&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43787 https://bugzilla.redhat.com/show_bug.cgi?id=2242254 https://www.cve.org/CVERecord?id=CVE-2023-43787 https://nvd.nist.gov/vuln/detail/CVE-2023-43787 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43787.json https://access.redhat.com/errata/RHSA-2024:2145&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qAjJcUd7scO8lHObIc+8TA==&#34;: {&#xA;      &#34;id&#34;: &#34;qAjJcUd7scO8lHObIc+8TA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61727&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/x509 package in the Go standard library. This vulnerability allows a certificate validation bypass via an excluded subdomain constraint in a certificated chain as it does not restrict the usage of wildcard SANs in the leaf certificate.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-03T19:37:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61727 https://bugzilla.redhat.com/show_bug.cgi?id=2418677 https://www.cve.org/CVERecord?id=CVE-2025-61727 https://nvd.nist.gov/vuln/detail/CVE-2025-61727 https://go.dev/cl/723900 https://go.dev/issue/76442 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 https://pkg.go.dev/vuln/GO-2025-4175 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61727.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qB1uVwi5ydv4et+JpGcenw==&#34;: {&#xA;      &#34;id&#34;: &#34;qB1uVwi5ydv4et+JpGcenw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-36054&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the _xdr_kadm5_principal_ent_rec() function in lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (krb5). This issue occurs due to lack of validation in the relationship between n_key_data and the key_data array count, leading to the freeing of uninitialized pointers. This may allow a remote authenticated attacker to send a specially crafted request that causes the kadmind process to crash, resulting in a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-36054 https://bugzilla.redhat.com/show_bug.cgi?id=2230178 https://www.cve.org/CVERecord?id=CVE-2023-36054 https://nvd.nist.gov/vuln/detail/CVE-2023-36054 https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final https://web.mit.edu/kerberos/www/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-36054.json https://access.redhat.com/errata/RHSA-2023:6699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qEQEeZkI3fZm1RmMiKeYYg==&#34;: {&#xA;      &#34;id&#34;: &#34;qEQEeZkI3fZm1RmMiKeYYg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js package. By embedding non-network imports in data URLs, this flaw allows an attacker to execute arbitrary code, compromising system security.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22020 https://bugzilla.redhat.com/show_bug.cgi?id=2296417 https://www.cve.org/CVERecord?id=CVE-2024-22020 https://nvd.nist.gov/vuln/detail/CVE-2024-22020 https://hackerone.com/reports/2092749 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22020.json https://access.redhat.com/errata/RHSA-2024:5815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.16.0-1.module+el9.4.0+22197+9e60f127&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qEhRdzGH44SGjJIcqcIv/g==&#34;: {&#xA;      &#34;id&#34;: &#34;qEhRdzGH44SGjJIcqcIv/g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2344&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow was found in Vim in the ins_compl_add function in the insexpand.c file. This issue occurs due to a read past the end of a buffer when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2344 https://bugzilla.redhat.com/show_bug.cgi?id=2106787 https://www.cve.org/CVERecord?id=CVE-2022-2344 https://nvd.nist.gov/vuln/detail/CVE-2022-2344 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2344.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qEoADqpvCc0dfHbPv1ykKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qEoADqpvCc0dfHbPv1ykKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59465&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been discovered in NodeJS. A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59465 https://bugzilla.redhat.com/show_bug.cgi?id=2431349 https://www.cve.org/CVERecord?id=CVE-2025-59465 https://nvd.nist.gov/vuln/detail/CVE-2025-59465 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59465.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0989&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested \u003cinclude\u003e directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0989 https://bugzilla.redhat.com/show_bug.cgi?id=2429933 https://www.cve.org/CVERecord?id=CVE-2026-0989 https://nvd.nist.gov/vuln/detail/CVE-2026-0989 https://gitlab.gnome.org/GNOME/libxml2/-/issues/998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0989.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qFdiNhAK1CrksJV/dJy7OA==&#34;: {&#xA;      &#34;id&#34;: &#34;qFdiNhAK1CrksJV/dJy7OA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-49794&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\&#34;...\&#34;/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program&#39;s crash using libxml or other possible undefined behaviors.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-49794 https://bugzilla.redhat.com/show_bug.cgi?id=2372373 https://www.cve.org/CVERecord?id=CVE-2025-49794 https://nvd.nist.gov/vuln/detail/CVE-2025-49794 https://gitlab.gnome.org/GNOME/libxml2/-/issues/931 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-49794.json https://access.redhat.com/errata/RHSA-2025:10699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qFhnV7djagzTbJn2rH4ndA==&#34;: {&#xA;      &#34;id&#34;: &#34;qFhnV7djagzTbJn2rH4ndA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32020&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw allows an unauthenticated attacker to place a specialized repository on their target&#39;s local system. For performance reasons, Git uses hardlinks when cloning a repository located on the same disk. However, if the repo being cloned is owned by a different user, this can introduce a security risk. At any time in the future, the original repo owner could rewrite the hardlinked files in the cloned user&#39;s repo.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32020 https://bugzilla.redhat.com/show_bug.cgi?id=2280466 https://www.cve.org/CVERecord?id=CVE-2024-32020 https://nvd.nist.gov/vuln/detail/CVE-2024-32020 https://github.com/git/git/security/advisories/GHSA-5rfh-556j-fhgj https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32020.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qI12E1AIG5PjZFUHEhSkgw==&#34;: {&#xA;      &#34;id&#34;: &#34;qI12E1AIG5PjZFUHEhSkgw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qIRy7/v51ILezECGLzLGBw==&#34;: {&#xA;      &#34;id&#34;: &#34;qIRy7/v51ILezECGLzLGBw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-48384&#34;,&#xA;      &#34;description&#34;: &#34;A line-end handling flaw was found in Git. When writing a config entry, values with a trailing carriage return (CR) are not quoted, resulting in the CR being lost when the config is read later. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read, resulting in the submodule being checked out to an incorrect location.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T18:23:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-48384 https://bugzilla.redhat.com/show_bug.cgi?id=2378806 https://www.cve.org/CVERecord?id=CVE-2025-48384 https://nvd.nist.gov/vuln/detail/CVE-2025-48384 https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384 https://github.com/git/git/commit/05e9cd64ee23bbadcea6bcffd6660ed02b8eab89 https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9 https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-48384.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core-doc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qLHoaQ/4ax3G7SRd9aV2yg==&#34;: {&#xA;      &#34;id&#34;: &#34;qLHoaQ/4ax3G7SRd9aV2yg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30775&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30775 https://bugzilla.redhat.com/show_bug.cgi?id=2187141 https://www.cve.org/CVERecord?id=CVE-2023-30775 https://nvd.nist.gov/vuln/detail/CVE-2023-30775 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30775.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qMBdcJlDiWOfl15fflzyow==&#34;: {&#xA;      &#34;id&#34;: &#34;qMBdcJlDiWOfl15fflzyow==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61144&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been found in libtiff. This stack-based buffer overflow occurs in tiffcrop (part of libtiff) within the function readSeparateStripsIntoBuffer. When processing a malformed TIFF directory (e.g., improper tags/order, missing StripByteCounts), the function overflows a stack-allocated array (srcbuffs) by accessing one element beyond its boundary in combineSeparateSamplesBytes. This leads to an AddressSanitizer-detected buffer over-read and crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61144 https://bugzilla.redhat.com/show_bug.cgi?id=2441977 https://www.cve.org/CVERecord?id=CVE-2025-61144 https://nvd.nist.gov/vuln/detail/CVE-2025-61144 https://gist.github.com/optionGo/5ad17e96a0a40f03578dd6c9f8645952 https://gitlab.com/libtiff/libtiff/-/commit/09f53a86cf26dfd961925227e59e180db617f26d https://gitlab.com/libtiff/libtiff/-/commit/88cf9dbb48f6e172629795ecffae35d5052f68aa https://gitlab.com/libtiff/libtiff/-/issues/740 https://gitlab.com/libtiff/libtiff/-/merge_requests/757 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61144.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qMnTnRnGw88RiTP1PFxynA==&#34;: {&#xA;      &#34;id&#34;: &#34;qMnTnRnGw88RiTP1PFxynA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2398&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an application configures libcurl to use HTTP/2 server push and the amount of received headers for the push surpasses the maximum allowed limit, libcurl aborts the server push. When aborting, libcurl does not free all the previously allocated headers, resulting in a memory leak.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2398 https://bugzilla.redhat.com/show_bug.cgi?id=2270498 https://www.cve.org/CVERecord?id=CVE-2024-2398 https://nvd.nist.gov/vuln/detail/CVE-2024-2398 https://curl.se/docs/CVE-2024-2398.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2398.json https://access.redhat.com/errata/RHSA-2024:5529&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-29.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qNhEJopIC+OWvXbrkilAfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qNhEJopIC+OWvXbrkilAfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4741&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in OpenSSL. Calling the OpenSSL API SSL_free_buffers function may cause memory to be accessed that was previously freed in some situations.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4741 https://bugzilla.redhat.com/show_bug.cgi?id=2283757 https://www.cve.org/CVERecord?id=CVE-2024-4741 https://nvd.nist.gov/vuln/detail/CVE-2024-4741 https://www.openssl.org/news/secadv/20240528.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4741.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qNquCdlCIf/n2ozJDLW9Rw==&#34;: {&#xA;      &#34;id&#34;: &#34;qNquCdlCIf/n2ozJDLW9Rw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-38593&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Qt, where an out-of-bounds write in the QOutlineMapper::convertPath function can lead to a denial of service, a remote attacker could exploit this flaw by sending a specially crafted request, causing the application to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-07-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-38593 https://bugzilla.redhat.com/show_bug.cgi?id=1994719 https://www.cve.org/CVERecord?id=CVE-2021-38593 https://nvd.nist.gov/vuln/detail/CVE-2021-38593 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-38593.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;qt5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qOdN56IOMUot4YWCQPjPvA==&#34;: {&#xA;      &#34;id&#34;: &#34;qOdN56IOMUot4YWCQPjPvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qPGxfT+FyuMifHo1C/aY6w==&#34;: {&#xA;      &#34;id&#34;: &#34;qPGxfT+FyuMifHo1C/aY6w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32414&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows out-of-bounds memory access due to incorrect handling of return values in xmlPythonFileRead and xmlPythonFileReadRaw. This is caused by a mismatch between the length of the file in bytes vs the length in characters, as unicode characters can occupy up to 4 bytes per character.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32414 https://bugzilla.redhat.com/show_bug.cgi?id=2358121 https://www.cve.org/CVERecord?id=CVE-2025-32414 https://nvd.nist.gov/vuln/detail/CVE-2025-32414 https://gitlab.gnome.org/GNOME/libxml2/-/issues/889 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32414.json https://access.redhat.com/errata/RHSA-2025:13428&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-12.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qQxzRYdLEwZ+uwtq33H+Uw==&#34;: {&#xA;      &#34;id&#34;: &#34;qQxzRYdLEwZ+uwtq33H+Uw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qRLrD7xZAOZ93NjJgcm1Qw==&#34;: {&#xA;      &#34;id&#34;: &#34;qRLrD7xZAOZ93NjJgcm1Qw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47906&#34;,&#xA;      &#34;description&#34;: &#34;A path handling flaw has been discovered in the os/exec go package. If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\&#34;\&#34;, \&#34;.\&#34;, and \&#34;..\&#34;), can result in the binaries listed in the PATH being unexpectedly returned.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-18T18:41:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47906 https://bugzilla.redhat.com/show_bug.cgi?id=2396546 https://www.cve.org/CVERecord?id=CVE-2025-47906 https://nvd.nist.gov/vuln/detail/CVE-2025-47906 https://go.dev/cl/691775 https://go.dev/issue/74466 https://groups.google.com/g/golang-announce/c/x5MKroML2yM https://pkg.go.dev/vuln/GO-2025-3956 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47906.json https://access.redhat.com/errata/RHSA-2025:13935&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.6-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qSRGSB2uV6n5bH1pdu2LUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qSRGSB2uV6n5bH1pdu2LUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bsdtar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qTcNeh3tg/7OmxGhGG7cNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qTcNeh3tg/7OmxGhGG7cNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qV/TxipuOJ9b9a/x4IT2cw==&#34;: {&#xA;      &#34;id&#34;: &#34;qV/TxipuOJ9b9a/x4IT2cw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-11168&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The `urllib.parse.urlsplit()` and `urlparse()` functions improperly validated bracketed hosts (`[]`), allowing hosts that weren&#39;t IPv6 or IPvFuture compliant. This behavior was not conformant to RFC 3986 and was potentially vulnerable to server-side request forgery (SSRF) if a URL is processed by more than one URL parser.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-12T21:22:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-11168 https://bugzilla.redhat.com/show_bug.cgi?id=2325776 https://www.cve.org/CVERecord?id=CVE-2024-11168 https://nvd.nist.gov/vuln/detail/CVE-2024-11168 https://github.com/python/cpython/commit/29f348e232e82938ba2165843c448c2b291504c5 https://github.com/python/cpython/commit/b2171a2fd41416cf68afd67460578631d755a550 https://github.com/python/cpython/issues/103848 https://github.com/python/cpython/pull/103849 https://mail.python.org/archives/list/security-announce@python.org/thread/XPWB6XVZ5G5KGEI63M4AWLIEUF5BPH4T/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11168.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qWK7H7gz7e8gS19GJSeIIg==&#34;: {&#xA;      &#34;id&#34;: &#34;qWK7H7gz7e8gS19GJSeIIg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2889&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in Vim in the find_var_also_in_script function in the evalvars.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2889 https://bugzilla.redhat.com/show_bug.cgi?id=2119864 https://www.cve.org/CVERecord?id=CVE-2022-2889 https://nvd.nist.gov/vuln/detail/CVE-2022-2889 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2889.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qXBiVfXy4luW+BbyG9z9BQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qXBiVfXy4luW+BbyG9z9BQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3576&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in Libtiff&#39;s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3576 https://bugzilla.redhat.com/show_bug.cgi?id=2219340 https://www.cve.org/CVERecord?id=CVE-2023-3576 https://nvd.nist.gov/vuln/detail/CVE-2023-3576 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3576.json https://access.redhat.com/errata/RHSA-2023:6575&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qYLCfB1EzRWGloOr+Ke8RA==&#34;: {&#xA;      &#34;id&#34;: &#34;qYLCfB1EzRWGloOr+Ke8RA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23920&#34;,&#xA;      &#34;description&#34;: &#34;An untrusted search path vulnerability exists in Node.js. \u003c19.6.1, \u003c18.14.1, \u003c16.19.1, and \u003c14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23920 https://bugzilla.redhat.com/show_bug.cgi?id=2172217 https://www.cve.org/CVERecord?id=CVE-2023-23920 https://nvd.nist.gov/vuln/detail/CVE-2023-23920 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23920.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qYORp6v9x0Jy6S8OKerZvw==&#34;: {&#xA;      &#34;id&#34;: &#34;qYORp6v9x0Jy6S8OKerZvw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4738&#34;,&#xA;      &#34;description&#34;: &#34;Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1848.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4738 https://bugzilla.redhat.com/show_bug.cgi?id=2237176 https://www.cve.org/CVERecord?id=CVE-2023-4738 https://nvd.nist.gov/vuln/detail/CVE-2023-4738 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4738.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qZtkd3o/RK7ypjgH80sV7A==&#34;: {&#xA;      &#34;id&#34;: &#34;qZtkd3o/RK7ypjgH80sV7A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55132&#34;,&#xA;      &#34;description&#34;: &#34;A file access flaw has been discovered in NodeJS. A file&#39;s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55132 https://bugzilla.redhat.com/show_bug.cgi?id=2431338 https://www.cve.org/CVERecord?id=CVE-2025-55132 https://nvd.nist.gov/vuln/detail/CVE-2025-55132 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55132.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.20.0.1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qaC6F9Z9j5kAaiDeRwL7nA==&#34;: {&#xA;      &#34;id&#34;: &#34;qaC6F9Z9j5kAaiDeRwL7nA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4330&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython&#39;s tarfile module. This vulnerability allows bypassing of extraction filters, enabling symlink traversal outside the intended extraction directory and potential modification of file metadata via malicious tar archives using TarFile.extractall() or TarFile.extract() with the filter=\&#34;data\&#34; or filter=\&#34;tar\&#34; parameters. This issue leads to potentially overwriting or modifying system files and metadata.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:58:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4330 https://bugzilla.redhat.com/show_bug.cgi?id=2370014 https://www.cve.org/CVERecord?id=CVE-2025-4330 https://nvd.nist.gov/vuln/detail/CVE-2025-4330 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4330.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qb5Q/H2wcR/YimCQn+AUYw==&#34;: {&#xA;      &#34;id&#34;: &#34;qb5Q/H2wcR/YimCQn+AUYw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-39260&#34;,&#xA;      &#34;description&#34;: &#34;Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git&#39;s push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-39260 https://bugzilla.redhat.com/show_bug.cgi?id=2137423 https://www.cve.org/CVERecord?id=CVE-2022-39260 https://nvd.nist.gov/vuln/detail/CVE-2022-39260 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-39260.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qbsbXExNvRlblIMDPNkFzA==&#34;: {&#xA;      &#34;id&#34;: &#34;qbsbXExNvRlblIMDPNkFzA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qcGz8bluItM475eimPK89w==&#34;: {&#xA;      &#34;id&#34;: &#34;qcGz8bluItM475eimPK89w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22874&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s crypto/x509 package. This vulnerability allows improper certificate validation, bypassing policy constraints via using ExtKeyUsageAny in VerifyOptions.KeyUsages.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T16:42:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22874 https://bugzilla.redhat.com/show_bug.cgi?id=2372320 https://www.cve.org/CVERecord?id=CVE-2025-22874 https://nvd.nist.gov/vuln/detail/CVE-2025-22874 https://go.dev/cl/670375 https://go.dev/issue/73612 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A https://pkg.go.dev/vuln/GO-2025-3749 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22874.json https://access.redhat.com/errata/RHSA-2025:10676&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.4-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qdWe9wwJNQD9uM1J1li1Vg==&#34;: {&#xA;      &#34;id&#34;: &#34;qdWe9wwJNQD9uM1J1li1Vg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgomp&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qdXDrJ7D0lw6kIY2dy+1KQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qdXDrJ7D0lw6kIY2dy+1KQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9900&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Libtiff. This vulnerability is a \&#34;write-what-where\&#34; condition, triggered when the library processes a specially crafted TIFF image file.\n\nBy providing an abnormally large image height value in the file&#39;s metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-22T14:29:35Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9900 https://bugzilla.redhat.com/show_bug.cgi?id=2392784 https://www.cve.org/CVERecord?id=CVE-2025-9900 https://nvd.nist.gov/vuln/detail/CVE-2025-9900 https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file https://gitlab.com/libtiff/libtiff/-/issues/704 https://gitlab.com/libtiff/libtiff/-/merge_requests/732 https://libtiff.gitlab.io/libtiff/releases/v4.7.1.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9900.json https://access.redhat.com/errata/RHSA-2025:20956&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-15.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qhSIFNwi876BQWyJqx7TXw==&#34;: {&#xA;      &#34;id&#34;: &#34;qhSIFNwi876BQWyJqx7TXw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-55549&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxslt. This vulnerability allows an attacker to trigger a use-after-free issue by excluding result prefixes.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-55549 https://bugzilla.redhat.com/show_bug.cgi?id=2352484 https://www.cve.org/CVERecord?id=CVE-2024-55549 https://nvd.nist.gov/vuln/detail/CVE-2024-55549 https://gitlab.gnome.org/GNOME/libxslt/-/issues/127 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-55549.json https://access.redhat.com/errata/RHSA-2025:4025&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxslt-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.1.34-9.el9_5.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qhl/5MtAFFjdvINFEhyFsg==&#34;: {&#xA;      &#34;id&#34;: &#34;qhl/5MtAFFjdvINFEhyFsg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29409&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service vulnerability was found in the Golang Go package caused by an uncontrolled resource consumption flaw. By persuading a victim to use a specially crafted certificate with large RSA keys, a remote attacker can cause a client/server to expend significant CPU time verifying signatures, resulting in a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29409 https://bugzilla.redhat.com/show_bug.cgi?id=2228743 https://www.cve.org/CVERecord?id=CVE-2023-29409 https://nvd.nist.gov/vuln/detail/CVE-2023-29409 https://go.dev/cl/515257 https://go.dev/issue/61460 https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ https://pkg.go.dev/vuln/GO-2023-1987 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29409.json https://access.redhat.com/errata/RHSA-2023:5738&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.13-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qnfP2y61ycFKlR/SBnZ5sw==&#34;: {&#xA;      &#34;id&#34;: &#34;qnfP2y61ycFKlR/SBnZ5sw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2602&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2602 https://bugzilla.redhat.com/show_bug.cgi?id=2209114 https://www.cve.org/CVERecord?id=CVE-2023-2602 https://nvd.nist.gov/vuln/detail/CVE-2023-2602 https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2602.json https://access.redhat.com/errata/RHSA-2023:5071&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.48-9.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qpRD6NPbAOP7sG5S6hInXg==&#34;: {&#xA;      &#34;id&#34;: &#34;qpRD6NPbAOP7sG5S6hInXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0397&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Python. A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “get_ca_certs()”. The race condition can be triggered if the methods are called at the same time that certificates are loaded into the SSLContext, such as during the TLS handshake with a  configured certificate directory.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0397 https://bugzilla.redhat.com/show_bug.cgi?id=2301891 https://www.cve.org/CVERecord?id=CVE-2024-0397 https://nvd.nist.gov/vuln/detail/CVE-2024-0397 https://mail.python.org/archives/list/security-announce@python.org/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0397.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qr6Jra3xQBxvbIQJAqILNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qr6Jra3xQBxvbIQJAqILNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-31498&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This vulnerability allows a remote or local attacker to cause a use-after-free, potentially leading to application-level denial of service or other unexpected behavior via manipulation of DNS responses or network conditions during query processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T13:53:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-31498 https://bugzilla.redhat.com/show_bug.cgi?id=2358271 https://www.cve.org/CVERecord?id=CVE-2025-31498 https://nvd.nist.gov/vuln/detail/CVE-2025-31498 https://github.com/c-ares/c-ares/commit/29d38719112639d8c0ba910254a3dd4f482ea2d1 https://github.com/c-ares/c-ares/pull/821 https://github.com/c-ares/c-ares/security/advisories/GHSA-6hxc-62jh-p29v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-31498.json https://access.redhat.com/errata/RHSA-2025:7433&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.15.0-1.module+el9.6.0+23062+9e7801b9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qsn7RE1KMH045/wAyIDw7A==&#34;: {&#xA;      &#34;id&#34;: &#34;qsn7RE1KMH045/wAyIDw7A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-53905&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T20:48:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-53905 https://bugzilla.redhat.com/show_bug.cgi?id=2380362 https://www.cve.org/CVERecord?id=CVE-2025-53905 https://nvd.nist.gov/vuln/detail/CVE-2025-53905 https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239 https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-53905.json https://access.redhat.com/errata/RHSA-2025:17742&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-22.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qtpMNZ+V4szO/Tox+eT3Cg==&#34;: {&#xA;      &#34;id&#34;: &#34;qtpMNZ+V4szO/Tox+eT3Cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;4:5.32.1-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;quMgsZt2z8hlQ+HzwzaVJQ==&#34;: {&#xA;      &#34;id&#34;: &#34;quMgsZt2z8hlQ+HzwzaVJQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0800&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds write in the extractContigSamplesShifted16bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited data modification.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0800 https://bugzilla.redhat.com/show_bug.cgi?id=2170167 https://www.cve.org/CVERecord?id=CVE-2023-0800 https://nvd.nist.gov/vuln/detail/CVE-2023-0800 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0800.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qug1advw8m4TjVAUPEUPiA==&#34;: {&#xA;      &#34;id&#34;: &#34;qug1advw8m4TjVAUPEUPiA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4751&#34;,&#xA;      &#34;description&#34;: &#34;Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1331.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4751 https://bugzilla.redhat.com/show_bug.cgi?id=2237187 https://www.cve.org/CVERecord?id=CVE-2023-4751 https://nvd.nist.gov/vuln/detail/CVE-2023-4751 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4751.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;quiQlBj9HjhLTEeBMkOGxA==&#34;: {&#xA;      &#34;id&#34;: &#34;quiQlBj9HjhLTEeBMkOGxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66293&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read vulnerability has been discovered in libpng. This vulnerability is in libpng&#39;s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng&#39;s internal state management.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-03T20:33:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66293 https://bugzilla.redhat.com/show_bug.cgi?id=2418711 https://www.cve.org/CVERecord?id=CVE-2025-66293 https://nvd.nist.gov/vuln/detail/CVE-2025-66293 https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1 https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a https://github.com/pnggroup/libpng/issues/764 https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66293.json https://access.redhat.com/errata/RHSA-2026:0238&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;quxt3+YB7vB2VUonbp8+2g==&#34;: {&#xA;      &#34;id&#34;: &#34;quxt3+YB7vB2VUonbp8+2g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61728&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61728 https://bugzilla.redhat.com/show_bug.cgi?id=2434431 https://www.cve.org/CVERecord?id=CVE-2025-61728 https://nvd.nist.gov/vuln/detail/CVE-2025-61728 https://go.dev/cl/736713 https://go.dev/issue/77102 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4342 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61728.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qvQ7cHiYiYJv4aTIPVusXA==&#34;: {&#xA;      &#34;id&#34;: &#34;qvQ7cHiYiYJv4aTIPVusXA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35386&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability allows a remote attacker to achieve arbitrary command execution by injecting shell metacharacters into a username provided on the command line. Exploitation requires an untrusted username and a non-default configuration of the &#39;%&#39; character in `ssh_config`.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:44:27Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35386 https://bugzilla.redhat.com/show_bug.cgi?id=2454506 https://www.cve.org/CVERecord?id=CVE-2026-35386 https://nvd.nist.gov/vuln/detail/CVE-2026-35386 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35386.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;qwmfWZM521TTUrM59mggiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qwmfWZM521TTUrM59mggiQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3497&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSH GSSAPI (Generic Security Service Application Program Interface) delta patches, as included in various Linux distributions. A remote attacker could exploit this by sending an unexpected GSSAPI message type during the key exchange process. This occurs because the `sshpkt_disconnect()` function, when called on an error, does not properly terminate the process, leading to the continued execution of the program with uninitialized connection variables. Accessing these uninitialized variables can lead to undefined behavior, potentially resulting in information disclosure or a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T18:27:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3497 https://bugzilla.redhat.com/show_bug.cgi?id=2447085 https://www.cve.org/CVERecord?id=CVE-2026-3497 https://nvd.nist.gov/vuln/detail/CVE-2026-3497 https://ubuntu.com/security/CVE-2026-3497 https://www.openwall.com/lists/oss-security/2026/03/12/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3497.json https://access.redhat.com/errata/RHSA-2026:6462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-48.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;r+NuuQcHZ5hOWGRHanlG0w==&#34;: {&#xA;      &#34;id&#34;: &#34;r+NuuQcHZ5hOWGRHanlG0w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4904 https://bugzilla.redhat.com/show_bug.cgi?id=2168631 https://www.cve.org/CVERecord?id=CVE-2022-4904 https://nvd.nist.gov/vuln/detail/CVE-2022-4904 https://github.com/c-ares/c-ares/issues/496 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4904.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.3-1.16.19.1.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;r0yngP+sUJvKraMLgaaWww==&#34;: {&#xA;      &#34;id&#34;: &#34;r0yngP+sUJvKraMLgaaWww==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1702&#34;,&#xA;      &#34;description&#34;: &#34;Infinite loop in parsing in go/scanner&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-05T21:05:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/59180 https://go.dev/cl/482078 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.8&#34;&#xA;    },&#xA;    &#34;r105o04EqvvFDoXWzu0UAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;r105o04EqvvFDoXWzu0UAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-10158&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in rsync. A malicious client acting as the receiver of an rsync file transfer can trigger an OOB read via a negative array index. The rsync client requires at least read access to the remote rsync module to trigger the issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-18T14:24:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-10158 https://bugzilla.redhat.com/show_bug.cgi?id=2415637 https://www.cve.org/CVERecord?id=CVE-2025-10158 https://nvd.nist.gov/vuln/detail/CVE-2025-10158 https://attackerkb.com/assessments/fbacb2a6-d1cd-4011-bb3a-f06b1c8306b1 https://github.com/RsyncProject/rsync/commit/797e17fc4a6f15e3b1756538a9f812b63942686f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-10158.json https://access.redhat.com/errata/RHSA-2026:6390&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.2.5-3.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;r3RLKNYtYvKarBqnnrlrew==&#34;: {&#xA;      &#34;id&#34;: &#34;r3RLKNYtYvKarBqnnrlrew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-0529&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-01-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-0529 https://bugzilla.redhat.com/show_bug.cgi?id=2051402 https://www.cve.org/CVERecord?id=CVE-2022-0529 https://nvd.nist.gov/vuln/detail/CVE-2022-0529 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-0529.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;unzip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;r3htJBqpa1VO27wdQgcGyw==&#34;: {&#xA;      &#34;id&#34;: &#34;r3htJBqpa1VO27wdQgcGyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34156&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:12Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34156 https://bugzilla.redhat.com/show_bug.cgi?id=2310528 https://www.cve.org/CVERecord?id=CVE-2024-34156 https://nvd.nist.gov/vuln/detail/CVE-2024-34156 https://go.dev/cl/611239 https://go.dev/issue/69139 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3106 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34156.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;r3kgi4w3ZfbkZqbg7eV+tg==&#34;: {&#xA;      &#34;id&#34;: &#34;r3kgi4w3ZfbkZqbg7eV+tg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66293&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read vulnerability has been discovered in libpng. This vulnerability is in libpng&#39;s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng&#39;s internal state management.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-03T20:33:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66293 https://bugzilla.redhat.com/show_bug.cgi?id=2418711 https://www.cve.org/CVERecord?id=CVE-2025-66293 https://nvd.nist.gov/vuln/detail/CVE-2025-66293 https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1 https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a https://github.com/pnggroup/libpng/issues/764 https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66293.json https://access.redhat.com/errata/RHSA-2026:0238&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;r410Z5X0yojDsVg9YVcNqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;r410Z5X0yojDsVg9YVcNqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2182&#34;,&#xA;      &#34;description&#34;: &#34;Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2182 https://bugzilla.redhat.com/show_bug.cgi?id=2102153 https://www.cve.org/CVERecord?id=CVE-2022-2182 https://nvd.nist.gov/vuln/detail/CVE-2022-2182 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2182.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;r4Fu2fNYrl5cfm4zX5YpZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;r4Fu2fNYrl5cfm4zX5YpZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69648&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted ELF binary file containing malformed DWARF .debug_rnglists data with the readelf program can trigger an infinite loop and result in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69648 https://bugzilla.redhat.com/show_bug.cgi?id=2445774 https://www.cve.org/CVERecord?id=CVE-2025-69648 https://nvd.nist.gov/vuln/detail/CVE-2025-69648 https://sourceware.org/bugzilla/show_bug.cgi?id=33641 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=598704a00cbac5e85c2bedd363357b5bf6fcee33 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69648.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;r8kk8OjPGZXkalD/ogI9TQ==&#34;: {&#xA;      &#34;id&#34;: &#34;r8kk8OjPGZXkalD/ogI9TQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24532&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/internal/nistec golang library. The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars, such as a scalar larger than the order of the curve. This does not impact usages of crypto/ecdsa or crypto/ecdh.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24532 https://bugzilla.redhat.com/show_bug.cgi?id=2223355 https://www.cve.org/CVERecord?id=CVE-2023-24532 https://nvd.nist.gov/vuln/detail/CVE-2023-24532 https://go.dev/cl/471255 https://go.dev/issue/58647 https://groups.google.com/g/golang-announce/c/3-TpUx48iQY https://pkg.go.dev/vuln/GO-2023-1621 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24532.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;r9W84DjqWVoSeRkzoMmOdA==&#34;: {&#xA;      &#34;id&#34;: &#34;r9W84DjqWVoSeRkzoMmOdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39333&#34;,&#xA;      &#34;description&#34;: &#34;Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39333 https://bugzilla.redhat.com/show_bug.cgi?id=2244418 https://www.cve.org/CVERecord?id=CVE-2023-39333 https://nvd.nist.gov/vuln/detail/CVE-2023-39333 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39333.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;r9qwoudvbxrKUZqCmUc7NA==&#34;: {&#xA;      &#34;id&#34;: &#34;r9qwoudvbxrKUZqCmUc7NA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici package for Node.js. Undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If an app has a mechanism that sends multipart requests to an attacker-controlled website, it can leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T17:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22150 https://bugzilla.redhat.com/show_bug.cgi?id=2339176 https://www.cve.org/CVERecord?id=CVE-2025-22150 https://nvd.nist.gov/vuln/detail/CVE-2025-22150 https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113 https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0 https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385 https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975 https://hackerone.com/reports/2913312 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22150.json https://access.redhat.com/errata/RHSA-2025:1446&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.6-1.module+el9.5.0+22773+9a359385&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rBDj6tuhee896qgiVA2peA==&#34;: {&#xA;      &#34;id&#34;: &#34;rBDj6tuhee896qgiVA2peA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6237&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When the EVP_PKEY_public_check() function is called in RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is a large prime, this computation takes a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6237 https://bugzilla.redhat.com/show_bug.cgi?id=2258502 https://www.cve.org/CVERecord?id=CVE-2023-6237 https://nvd.nist.gov/vuln/detail/CVE-2023-6237 https://www.openssl.org/news/secadv/20240115.txt https://www.openwall.com/lists/oss-security/2024/01/15/2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6237.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rDRtTk3Xuv5MlaUi1WKGpA==&#34;: {&#xA;      &#34;id&#34;: &#34;rDRtTk3Xuv5MlaUi1WKGpA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25679&#34;,&#xA;      &#34;description&#34;: &#34;The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:28:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25679 https://bugzilla.redhat.com/show_bug.cgi?id=2445356 https://www.cve.org/CVERecord?id=CVE-2026-25679 https://nvd.nist.gov/vuln/detail/CVE-2026-25679 https://go.dev/cl/752180 https://go.dev/issue/77578 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://pkg.go.dev/vuln/GO-2026-4601 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25679.json https://access.redhat.com/errata/RHSA-2026:5942&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.8-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rDeZ9YqARbQ/8OcOA5Tn4g==&#34;: {&#xA;      &#34;id&#34;: &#34;rDeZ9YqARbQ/8OcOA5Tn4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0465&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. OpenSSL and other certificate policy checks silently ignore invalid certificate policies in leaf certificates that are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0465 https://bugzilla.redhat.com/show_bug.cgi?id=2182561 https://www.cve.org/CVERecord?id=CVE-2023-0465 https://nvd.nist.gov/vuln/detail/CVE-2023-0465 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0465.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rDx7RcnC1Ce961LxuRo53Q==&#34;: {&#xA;      &#34;id&#34;: &#34;rDx7RcnC1Ce961LxuRo53Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29404&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. The go command may execute arbitrary code at build time when using cgo. This can occur when running \&#34;go get\&#34; on a malicious module, or when running any other command which builds untrusted code. This can be triggered by linker flags, specified via a \&#34;#cgo LDFLAGS\&#34; directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29404 https://bugzilla.redhat.com/show_bug.cgi?id=2217565 https://www.cve.org/CVERecord?id=CVE-2023-29404 https://nvd.nist.gov/vuln/detail/CVE-2023-29404 https://go.dev/cl/501225 https://go.dev/issue/60305 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29404.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rENFCyvqecBUcAR85/9PBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rENFCyvqecBUcAR85/9PBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59465&#34;,&#xA;      &#34;description&#34;: &#34;A denial of service flaw has been discovered in NodeJS. A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59465 https://bugzilla.redhat.com/show_bug.cgi?id=2431349 https://www.cve.org/CVERecord?id=CVE-2025-59465 https://nvd.nist.gov/vuln/detail/CVE-2025-59465 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59465.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.20.0.1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rFWIZJAOzhCWoZKNelyFsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rFWIZJAOzhCWoZKNelyFsQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23916&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. A malicious server can insert an unlimited number of compression steps. This decompression chain could result in out-of-memory errors.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23916 https://bugzilla.redhat.com/show_bug.cgi?id=2167815 https://www.cve.org/CVERecord?id=CVE-2023-23916 https://nvd.nist.gov/vuln/detail/CVE-2023-23916 https://curl.se/docs/CVE-2023-23916.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23916.json https://access.redhat.com/errata/RHSA-2023:1701&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-19.el9_1.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rG5ADP3EQcz3Qvp36Lywxw==&#34;: {&#xA;      &#34;id&#34;: &#34;rG5ADP3EQcz3Qvp36Lywxw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24515&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-23T07:46:36Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-24515 https://bugzilla.redhat.com/show_bug.cgi?id=2432312 https://www.cve.org/CVERecord?id=CVE-2026-24515 https://nvd.nist.gov/vuln/detail/CVE-2026-24515 https://github.com/libexpat/libexpat/pull/1131 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-24515.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rIk/NHa428tmc6oDgqypQw==&#34;: {&#xA;      &#34;id&#34;: &#34;rIk/NHa428tmc6oDgqypQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48554&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in file, a program used to identify a particular file according to the type of data contained by the file. This issue occurs when processing a specially crafted file, causing a stack-based buffer over-read, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-48554 https://bugzilla.redhat.com/show_bug.cgi?id=2235714 https://www.cve.org/CVERecord?id=CVE-2022-48554 https://nvd.nist.gov/vuln/detail/CVE-2022-48554 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-48554.json https://access.redhat.com/errata/RHSA-2024:2512&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:5.39-16.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rJHkC74NrobNudSijB/y4A==&#34;: {&#xA;      &#34;id&#34;: &#34;rJHkC74NrobNudSijB/y4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rJljaCTiTdw1uI1lvfy+hw==&#34;: {&#xA;      &#34;id&#34;: &#34;rJljaCTiTdw1uI1lvfy+hw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1170&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow vulnerability was found in Vim&#39;s utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because there is access to invalid memory with put in visual block mode. An attacker can trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1170 https://bugzilla.redhat.com/show_bug.cgi?id=2176462 https://www.cve.org/CVERecord?id=CVE-2023-1170 https://nvd.nist.gov/vuln/detail/CVE-2023-1170 https://huntr.dev/bounties/286e0090-e654-46d2-ac60-29f81799d0a4 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1170.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rKpZxH2tXrNLthuse32FWg==&#34;: {&#xA;      &#34;id&#34;: &#34;rKpZxH2tXrNLthuse32FWg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25193&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found HarfBuzz. This flaw allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25193 https://bugzilla.redhat.com/show_bug.cgi?id=2167254 https://www.cve.org/CVERecord?id=CVE-2023-25193 https://nvd.nist.gov/vuln/detail/CVE-2023-25193 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25193.json https://access.redhat.com/errata/RHSA-2024:2410&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;harfbuzz-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.7.4-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rO5a9fYyaqaIZ4bH0M8fdA==&#34;: {&#xA;      &#34;id&#34;: &#34;rO5a9fYyaqaIZ4bH0M8fdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2862&#34;,&#xA;      &#34;description&#34;: &#34;Use After Free in GitHub repository vim/vim prior to 9.0.0221.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2862 https://bugzilla.redhat.com/show_bug.cgi?id=2122139 https://www.cve.org/CVERecord?id=CVE-2022-2862 https://nvd.nist.gov/vuln/detail/CVE-2022-2862 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2862.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rPECjFpzDOL0Nn2WUSH6yg==&#34;: {&#xA;      &#34;id&#34;: &#34;rPECjFpzDOL0Nn2WUSH6yg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32288&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s `archive/tar` package. A remote attacker could exploit this vulnerability by providing a maliciously-crafted archive file. When the `tar.Reader` processes an archive containing a large number of sparse regions in the \&#34;old GNU sparse map\&#34; format, it can lead to unbounded memory allocation. This can result in a Denial of Service (DoS) condition, making the affected application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32288 https://bugzilla.redhat.com/show_bug.cgi?id=2456332 https://www.cve.org/CVERecord?id=CVE-2026-32288 https://nvd.nist.gov/vuln/detail/CVE-2026-32288 https://go.dev/cl/763766 https://go.dev/issue/78301 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4869 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32288.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rPWZNH+en7vYfObneQGeUA==&#34;: {&#xA;      &#34;id&#34;: &#34;rPWZNH+en7vYfObneQGeUA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-4006&#34;,&#xA;      &#34;description&#34;: &#34;Excessive CPU consumption in ParseAddress in net/mail&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T21:48:35Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/709860 https://go.dev/issue/75680 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.8&#34;&#xA;    },&#xA;    &#34;rPXe6sMC/46EZbom2R58Iw==&#34;: {&#xA;      &#34;id&#34;: &#34;rPXe6sMC/46EZbom2R58Iw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45285&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Golang package cmd/go. This issue permits the fallback to insecure \&#34;git://\&#34; if trying to fetch a .git module that has no \&#34;https://\&#34; or \&#34;git+ssh://\&#34; available.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45285 https://bugzilla.redhat.com/show_bug.cgi?id=2253323 https://www.cve.org/CVERecord?id=CVE-2023-45285 https://nvd.nist.gov/vuln/detail/CVE-2023-45285 https://pkg.go.dev/vuln/GO-2023-2383 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45285.json https://access.redhat.com/errata/RHSA-2024:1131&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rR226S9SV4WbmIVotM0CsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rR226S9SV4WbmIVotM0CsQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46246&#34;,&#xA;      &#34;description&#34;: &#34;Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it&#39;s possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46246 https://bugzilla.redhat.com/show_bug.cgi?id=2246953 https://www.cve.org/CVERecord?id=CVE-2023-46246 https://nvd.nist.gov/vuln/detail/CVE-2023-46246 https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46246.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rRcUnpfkGlXrbtunwHjYyg==&#34;: {&#xA;      &#34;id&#34;: &#34;rRcUnpfkGlXrbtunwHjYyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1528&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici&#39;s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:21:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1528 https://bugzilla.redhat.com/show_bug.cgi?id=2447145 https://www.cve.org/CVERecord?id=CVE-2026-1528 https://nvd.nist.gov/vuln/detail/CVE-2026-1528 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj https://hackerone.com/reports/3537648 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1528.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rRfIMqTlNWlpWE9Bi6NGYw==&#34;: {&#xA;      &#34;id&#34;: &#34;rRfIMqTlNWlpWE9Bi6NGYw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rTV9bjfy2M3+eJBkP+611w==&#34;: {&#xA;      &#34;id&#34;: &#34;rTV9bjfy2M3+eJBkP+611w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32559&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(&#39;spawn_sync&#39;) to run arbitrary code outside of the limits defined in a policy.json file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32559 https://bugzilla.redhat.com/show_bug.cgi?id=2230956 https://www.cve.org/CVERecord?id=CVE-2023-32559 https://nvd.nist.gov/vuln/detail/CVE-2023-32559 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32559.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rUdPv86F0f314ayFTA1g0w==&#34;: {&#xA;      &#34;id&#34;: &#34;rUdPv86F0f314ayFTA1g0w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6395&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T07:56:53Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6395 https://bugzilla.redhat.com/show_bug.cgi?id=2376755 https://www.cve.org/CVERecord?id=CVE-2025-6395 https://nvd.nist.gov/vuln/detail/CVE-2025-6395 https://gitlab.com/gnutls/gnutls/-/issues/1718 https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6395.json https://access.redhat.com/errata/RHSA-2025:16116&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-6.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rV97UXmAqepOnnvJur9ybQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rV97UXmAqepOnnvJur9ybQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rWYn/Km2lN55sVL7Ui4zmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rWYn/Km2lN55sVL7Ui4zmQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23920&#34;,&#xA;      &#34;description&#34;: &#34;An untrusted search path vulnerability exists in Node.js. \u003c19.6.1, \u003c18.14.1, \u003c16.19.1, and \u003c14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23920 https://bugzilla.redhat.com/show_bug.cgi?id=2172217 https://www.cve.org/CVERecord?id=CVE-2023-23920 https://nvd.nist.gov/vuln/detail/CVE-2023-23920 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23920.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.3-1.16.19.1.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rXJvA1HAsx+E4rVQeqU3qQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rXJvA1HAsx+E4rVQeqU3qQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici package for Node.js. Undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If an app has a mechanism that sends multipart requests to an attacker-controlled website, it can leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T17:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22150 https://bugzilla.redhat.com/show_bug.cgi?id=2339176 https://www.cve.org/CVERecord?id=CVE-2025-22150 https://nvd.nist.gov/vuln/detail/CVE-2025-22150 https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113 https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0 https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385 https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975 https://hackerone.com/reports/2913312 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22150.json https://access.redhat.com/errata/RHSA-2025:1446&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.18.20.6.1.module+el9.5.0+22773+9a359385&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rY2PGGazDLFtrrL5h0HYLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rY2PGGazDLFtrrL5h0HYLQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-49796&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-49796 https://bugzilla.redhat.com/show_bug.cgi?id=2372385 https://www.cve.org/CVERecord?id=CVE-2025-49796 https://nvd.nist.gov/vuln/detail/CVE-2025-49796 https://gitlab.gnome.org/GNOME/libxml2/-/issues/933 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-49796.json https://access.redhat.com/errata/RHSA-2025:10699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ra+5M5K0yyS4TNorJBFVYw==&#34;: {&#xA;      &#34;id&#34;: &#34;ra+5M5K0yyS4TNorJBFVYw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28182&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28182 https://bugzilla.redhat.com/show_bug.cgi?id=2268639 https://www.cve.org/CVERecord?id=CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28182.json https://access.redhat.com/errata/RHSA-2024:2910&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-8.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rcUIg6JYVsZx379+fVhSVg==&#34;: {&#xA;      &#34;id&#34;: &#34;rcUIg6JYVsZx379+fVhSVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38408&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in OpenSSH has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system (the code in /usr/lib is not necessarily safe for loading into ssh-agent). This flaw allows an attacker with control of the forwarded agent-socket on the server and the ability to write to the filesystem of the client host to execute arbitrary code with the privileges of the user running the ssh-agent.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38408 https://bugzilla.redhat.com/show_bug.cgi?id=2224173 https://www.cve.org/CVERecord?id=CVE-2023-38408 https://nvd.nist.gov/vuln/detail/CVE-2023-38408 https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38408.json https://access.redhat.com/errata/RHSA-2023:4412&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-30.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rct+rak3m0uMzU51NldQpg==&#34;: {&#xA;      &#34;id&#34;: &#34;rct+rak3m0uMzU51NldQpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30581&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been discovered in Node.js,  where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30581 https://bugzilla.redhat.com/show_bug.cgi?id=2219824 https://www.cve.org/CVERecord?id=CVE-2023-30581 https://nvd.nist.gov/vuln/detail/CVE-2023-30581 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30581.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.1-1.18.16.1.1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rd7C8AD7IYUHYPSfAYtKrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rd7C8AD7IYUHYPSfAYtKrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-if&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:0.60.800-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rkpLgzhV90FRHYY3ESWHfw==&#34;: {&#xA;      &#34;id&#34;: &#34;rkpLgzhV90FRHYY3ESWHfw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35065&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35065 https://bugzilla.redhat.com/show_bug.cgi?id=2156324 https://www.cve.org/CVERecord?id=CVE-2021-35065 https://nvd.nist.gov/vuln/detail/CVE-2021-35065 https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35065.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rm3fF4UjNztR1JpYwTPaVg==&#34;: {&#xA;      &#34;id&#34;: &#34;rm3fF4UjNztR1JpYwTPaVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractContigSamplesShifted24bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0796 https://bugzilla.redhat.com/show_bug.cgi?id=2170146 https://www.cve.org/CVERecord?id=CVE-2023-0796 https://nvd.nist.gov/vuln/detail/CVE-2023-0796 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0796.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rmKqD8ZR5vrHqnZkFulqdg==&#34;: {&#xA;      &#34;id&#34;: &#34;rmKqD8ZR5vrHqnZkFulqdg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64118&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in node-tar, a Tar utility for Node.js. This vulnerability allows a local attacker to potentially disclose sensitive information. When the .t (or .list) function is used with { sync: true } to read tar entry contents, and the tar file is concurrently modified on disk to a smaller size, the function may return uninitialized memory contents. This could lead to the exposure of arbitrary data.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-30T17:50:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64118 https://bugzilla.redhat.com/show_bug.cgi?id=2407440 https://www.cve.org/CVERecord?id=CVE-2025-64118 https://nvd.nist.gov/vuln/detail/CVE-2025-64118 https://github.com/isaacs/node-tar/commit/5330eb04bc43014f216e5c271b40d5c00d45224d https://github.com/isaacs/node-tar/issues/445 https://github.com/isaacs/node-tar/pull/446 https://github.com/isaacs/node-tar/security/advisories/GHSA-29xp-372q-xqph https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64118.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;roGA0nQUzXWg+M1vb3jr3g==&#34;: {&#xA;      &#34;id&#34;: &#34;roGA0nQUzXWg+M1vb3jr3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31147&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs when /dev/urandom or RtlGenRandom() are unavailable, c-ares will use rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand(), so it will generate predictable output.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31147 https://bugzilla.redhat.com/show_bug.cgi?id=2209501 https://www.cve.org/CVERecord?id=CVE-2023-31147 https://nvd.nist.gov/vuln/detail/CVE-2023-31147 https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31147.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rpqh6K+YqMAxf172QUbycQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rpqh6K+YqMAxf172QUbycQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rpwsfSDtxz8KgCjcE5LUgg==&#34;: {&#xA;      &#34;id&#34;: &#34;rpwsfSDtxz8KgCjcE5LUgg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29405&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. The go command may execute arbitrary code at build time when using cgo. This can occur when running \&#34;go get\&#34; on a malicious module, or when running any other command which builds untrusted code. This can be triggered by linker flags, specified via a \&#34;#cgo LDFLAGS\&#34; directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29405 https://bugzilla.redhat.com/show_bug.cgi?id=2217569 https://www.cve.org/CVERecord?id=CVE-2023-29405 https://nvd.nist.gov/vuln/detail/CVE-2023-29405 https://go.dev/cl/501224 https://go.dev/issue/60306 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1842 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29405.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rpzV0o5XSSiqAfiLvn+7sw==&#34;: {&#xA;      &#34;id&#34;: &#34;rpzV0o5XSSiqAfiLvn+7sw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Errno&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.30-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rr46XqayJxVyzdN89JIktA==&#34;: {&#xA;      &#34;id&#34;: &#34;rr46XqayJxVyzdN89JIktA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21717&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in V8&#39;s string hashing mechanism within Node.js. A remote attacker can exploit this vulnerability by crafting requests containing integer-like strings. These specially crafted strings cause predictable hash collisions in V8&#39;s internal string table, particularly when processed by functions like JSON.parse() on attacker-controlled input. This can significantly degrade the performance of the Node.js process, leading to a Denial of Service (DoS) condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21717 https://bugzilla.redhat.com/show_bug.cgi?id=2453162 https://www.cve.org/CVERecord?id=CVE-2026-21717 https://nvd.nist.gov/vuln/detail/CVE-2026-21717 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21717.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rtmfAClgZr+pMIYCffofpQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rtmfAClgZr+pMIYCffofpQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4285&#34;,&#xA;      &#34;description&#34;: &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4285 https://bugzilla.redhat.com/show_bug.cgi?id=2150768 https://www.cve.org/CVERecord?id=CVE-2022-4285 https://nvd.nist.gov/vuln/detail/CVE-2022-4285 https://sourceware.org/bugzilla/show_bug.cgi?id=29699 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5c831a3c7f3ca98d6aba1200353311e1a1f84c70 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4285.json https://access.redhat.com/errata/RHSA-2023:6593&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils-gold&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.35.2-42.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ruEPtR2s2d2PTSaLwtf04g==&#34;: {&#xA;      &#34;id&#34;: &#34;ruEPtR2s2d2PTSaLwtf04g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55131&#34;,&#xA;      &#34;description&#34;: &#34;A memory exposure flaw has been discovered in Node.js. A flaw in Node.js&#39;s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55131 https://bugzilla.redhat.com/show_bug.cgi?id=2431350 https://www.cve.org/CVERecord?id=CVE-2025-55131 https://nvd.nist.gov/vuln/detail/CVE-2025-55131 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55131.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ruok+KtL5TC6jhvqLAZEzw==&#34;: {&#xA;      &#34;id&#34;: &#34;ruok+KtL5TC6jhvqLAZEzw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rwC2lB0lflNzttbo5Agt3g==&#34;: {&#xA;      &#34;id&#34;: &#34;rwC2lB0lflNzttbo5Agt3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6845&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils, specifically within the `readelf` utility. This vulnerability allows a local attacker to cause a Denial of Service (DoS) by tricking a user into processing a specially crafted Executable and Linkable Format (ELF) file. The exploitation of this flaw can lead to the system becoming unresponsive due to excessive resource consumption or a program crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6845 https://bugzilla.redhat.com/show_bug.cgi?id=2460012 https://www.cve.org/CVERecord?id=CVE-2026-6845 https://nvd.nist.gov/vuln/detail/CVE-2026-6845 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6845.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rwX0WRiXvDcxdTv5pslgxw==&#34;: {&#xA;      &#34;id&#34;: &#34;rwX0WRiXvDcxdTv5pslgxw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-58183&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T22:10:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-58183 https://bugzilla.redhat.com/show_bug.cgi?id=2407258 https://www.cve.org/CVERecord?id=CVE-2025-58183 https://nvd.nist.gov/vuln/detail/CVE-2025-58183 https://go.dev/cl/709861 https://go.dev/issue/75677 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://pkg.go.dev/vuln/GO-2025-4014 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-58183.json https://access.redhat.com/errata/RHSA-2025:21815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.3-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ryPu/punYtMOzifbFWj3Xg==&#34;: {&#xA;      &#34;id&#34;: &#34;ryPu/punYtMOzifbFWj3Xg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1999&#34;,&#xA;      &#34;description&#34;: &#34;The Mozilla Foundation Security Advisory describes this flaw as:\r\n\r\nA double-free in libwebp could have led to memory corruption and a potentially exploitable crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1999 https://bugzilla.redhat.com/show_bug.cgi?id=2186102 https://www.cve.org/CVERecord?id=CVE-2023-1999 https://nvd.nist.gov/vuln/detail/CVE-2023-1999 https://www.mozilla.org/en-US/security/advisories/mfsa2023-14/#CVE-2023-1999 https://www.mozilla.org/en-US/security/advisories/mfsa2023-15/#CVE-2023-1999 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1999.json https://access.redhat.com/errata/RHSA-2023:2078&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libwebp&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.2.0-6.el9_1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ryv0HUHLJe8DIxGNl9VAgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ryv0HUHLJe8DIxGNl9VAgQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27363&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in FreeType. In affected versions, an out-of-bounds write condition may be triggered when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value, causing it to wrap around and allocate a heap buffer that is too small. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This issue could result in arbitrary code execution or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-11T13:28:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27363 https://bugzilla.redhat.com/show_bug.cgi?id=2351357 https://www.cve.org/CVERecord?id=CVE-2025-27363 https://nvd.nist.gov/vuln/detail/CVE-2025-27363 https://www.facebook.com/security/advisories/cve-2025-27363 https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27363.json https://access.redhat.com/errata/RHSA-2025:3407&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;freetype-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.10.4-10.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;s+/PgMrbczH4dntN+Uku4A==&#34;: {&#xA;      &#34;id&#34;: &#34;s+/PgMrbczH4dntN+Uku4A==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1705&#34;,&#xA;      &#34;description&#34;: &#34;Excessive resource consumption in net/http, net/textproto and mime/multipart&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-05T21:04:39Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/59153 https://go.dev/cl/482076 https://go.dev/cl/482075 https://go.dev/cl/482077 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.8&#34;&#xA;    },&#xA;    &#34;s/wLIAA4VDi9HrbyrnYgbg==&#34;: {&#xA;      &#34;id&#34;: &#34;s/wLIAA4VDi9HrbyrnYgbg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32465&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Git in a full copy of a Git repository. A prerequisite for this vulnerability is for an unauthenticated attacker to place a specialized repository on their target&#39;s local system. If the victim were to clone this repository, it could result in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32465 https://bugzilla.redhat.com/show_bug.cgi?id=2280446 https://www.cve.org/CVERecord?id=CVE-2024-32465 https://nvd.nist.gov/vuln/detail/CVE-2024-32465 https://github.com/git/git/security/advisories/GHSA-vm9j-46j9-qvq4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32465.json https://access.redhat.com/errata/RHSA-2024:4083&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.43.5-1.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;s0BW8R7FNYnFn+nWkJnUqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;s0BW8R7FNYnFn+nWkJnUqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3358&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL, where it incorrectly handles legacy custom ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other similarly named encryption and decryption initialization functions). Instead of using the custom cipher directly, it incorrectly tries to fetch an equivalent cipher from the available providers. An equivalent cipher is found based on the NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a given cipher. However, it is possible for an application to incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef is used this way, the OpenSSL encryption/decryption initialization function will match the NULL cipher as equivalent and fetch this from the available providers. This is successful if the default provider has been loaded (or if a third-party provider has been loaded that offers this cipher). Using the NULL cipher means that the plaintext is emitted as the ciphertext.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3358 https://bugzilla.redhat.com/show_bug.cgi?id=2134740 https://www.cve.org/CVERecord?id=CVE-2022-3358 https://nvd.nist.gov/vuln/detail/CVE-2022-3358 https://www.openssl.org/news/secadv/20221011.txt https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3358.json https://access.redhat.com/errata/RHSA-2023:2523&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-6.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;s0PUMgVnEtuqOkBdJNAqUA==&#34;: {&#xA;      &#34;id&#34;: &#34;s0PUMgVnEtuqOkBdJNAqUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3899&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-22T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3899 https://bugzilla.redhat.com/show_bug.cgi?id=2225407 https://www.cve.org/CVERecord?id=CVE-2023-3899 https://nvd.nist.gov/vuln/detail/CVE-2023-3899 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3899.json https://access.redhat.com/errata/RHSA-2023:4708&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-subscription-manager-rhsm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.29.33.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;s1XSou7D1y9Q5LYLnrc6kw==&#34;: {&#xA;      &#34;id&#34;: &#34;s1XSou7D1y9Q5LYLnrc6kw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:11802&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.2-1.22.16.0.2.module+el9.6.0+23339+d3c8acfa&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;s20Tn7zOYHvK/n/K8/hWrA==&#34;: {&#xA;      &#34;id&#34;: &#34;s20Tn7zOYHvK/n/K8/hWrA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-44487&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as &#39;Important&#39; as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-44487 https://bugzilla.redhat.com/show_bug.cgi?id=2242803 https://access.redhat.com/security/vulnerabilities/RHSB-2023-003 https://www.cve.org/CVERecord?id=CVE-2023-44487 https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://github.com/dotnet/announcements/issues/277 https://pkg.go.dev/vuln/GO-2023-2102 https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-44487.json https://access.redhat.com/errata/RHSA-2023:5838&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.43.0-5.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;s2LBjGccKZbn8OaPObByXw==&#34;: {&#xA;      &#34;id&#34;: &#34;s2LBjGccKZbn8OaPObByXw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:11992&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-8.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;s2uSNGuV+OyVW2eHDGWWKw==&#34;: {&#xA;      &#34;id&#34;: &#34;s2uSNGuV+OyVW2eHDGWWKw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-29768&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim&#39;s zip.vim plugin. This vulnerability allows potential data loss via specially crafted zip files when a user views the archive in Vim and presses &#39;x&#39; on an unusual filename.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-13T17:04:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-29768 https://bugzilla.redhat.com/show_bug.cgi?id=2352418 https://www.cve.org/CVERecord?id=CVE-2025-29768 https://nvd.nist.gov/vuln/detail/CVE-2025-29768 https://github.com/vim/vim/commit/f209dcd3defb95bae21b2740910e6aa7bb940531 https://github.com/vim/vim/security/advisories/GHSA-693p-m996-3rmf https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-29768.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;s4mktw9S/tOEdbFRu8ZxjA==&#34;: {&#xA;      &#34;id&#34;: &#34;s4mktw9S/tOEdbFRu8ZxjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0553&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0553 https://bugzilla.redhat.com/show_bug.cgi?id=2258412 https://www.cve.org/CVERecord?id=CVE-2024-0553 https://nvd.nist.gov/vuln/detail/CVE-2024-0553 https://gitlab.com/gnutls/gnutls/-/issues/1522 https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0553.json https://access.redhat.com/errata/RHSA-2024:0533&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.7.6-23.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;s6kt2DqKLHgzYSGciPtGtQ==&#34;: {&#xA;      &#34;id&#34;: &#34;s6kt2DqKLHgzYSGciPtGtQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-4166&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-12-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-4166 https://bugzilla.redhat.com/show_bug.cgi?id=2035928 https://www.cve.org/CVERecord?id=CVE-2021-4166 https://nvd.nist.gov/vuln/detail/CVE-2021-4166 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-4166.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;s6zRbI6E6xMFwOoLRjlPfw==&#34;: {&#xA;      &#34;id&#34;: &#34;s6zRbI6E6xMFwOoLRjlPfw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26462&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in krb5 in /krb5/src/kdc/ndr.c. This issue can lead to a denial of service through memory exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-26462 https://bugzilla.redhat.com/show_bug.cgi?id=2266742 https://www.cve.org/CVERecord?id=CVE-2024-26462 https://nvd.nist.gov/vuln/detail/CVE-2024-26462 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-26462.json https://access.redhat.com/errata/RHSA-2024:9331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;s7SQVHshgYWyJSuzXO9o6Q==&#34;: {&#xA;      &#34;id&#34;: &#34;s7SQVHshgYWyJSuzXO9o6Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;s9Fn1OI38EWrq2OqjoQ6KQ==&#34;: {&#xA;      &#34;id&#34;: &#34;s9Fn1OI38EWrq2OqjoQ6KQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5642&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Python/CPython that does not disallow configuring an empty list (\&#34;[]\&#34;) for SSLContext.set_npn_protocols(), which is an invalid value for the underlying OpenSSL API. This issue results in a buffer over-read when NPN is used. See CVE -2024-5535 for OpenSSL for more information.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-5642 https://bugzilla.redhat.com/show_bug.cgi?id=2294682 https://www.cve.org/CVERecord?id=CVE-2024-5642 https://nvd.nist.gov/vuln/detail/CVE-2024-5642 https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-5642.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;s9zla+0u22E+Nq1zlK4A0A==&#34;: {&#xA;      &#34;id&#34;: &#34;s9zla+0u22E+Nq1zlK4A0A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22025&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22025 https://bugzilla.redhat.com/show_bug.cgi?id=2270559 https://www.cve.org/CVERecord?id=CVE-2024-22025 https://nvd.nist.gov/vuln/detail/CVE-2024-22025 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22025.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sAlO/t+jkkm59mLcdOgB9w==&#34;: {&#xA;      &#34;id&#34;: &#34;sAlO/t+jkkm59mLcdOgB9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1151&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ld linker utility of GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-10T17:00:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1151 https://bugzilla.redhat.com/show_bug.cgi?id=2344713 https://www.cve.org/CVERecord?id=CVE-2025-1151 https://nvd.nist.gov/vuln/detail/CVE-2025-1151 https://sourceware.org/bugzilla/attachment.cgi?id=15887 https://sourceware.org/bugzilla/show_bug.cgi?id=32576 https://vuldb.com/?ctiid.295055 https://vuldb.com/?id.295055 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1151.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sEXYrXIRghEOX+5cKfh4HA==&#34;: {&#xA;      &#34;id&#34;: &#34;sEXYrXIRghEOX+5cKfh4HA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0524&#34;,&#xA;      &#34;description&#34;: &#34;Stack exhaustion when reading certain archives in compress/gzip&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-20T20:52:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/417067 https://go.googlesource.com/go/+/b2b8872c876201eac2d0707276c6999ff3eb185e https://go.dev/issue/53168 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.4&#34;&#xA;    },&#xA;    &#34;sEY+u8JcXEvFyPiUDTNKow==&#34;: {&#xA;      &#34;id&#34;: &#34;sEY+u8JcXEvFyPiUDTNKow==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sFUeaSTxmIP9ksmZtDFy/w==&#34;: {&#xA;      &#34;id&#34;: &#34;sFUeaSTxmIP9ksmZtDFy/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9301&#34;,&#xA;      &#34;description&#34;: &#34;A reachable assertion flaw has been discovered in the Cmake build system. A local attacker who can construct crafted input could reach this assertion and cause a program crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-21T13:32:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9301 https://bugzilla.redhat.com/show_bug.cgi?id=2390085 https://www.cve.org/CVERecord?id=CVE-2025-9301 https://nvd.nist.gov/vuln/detail/CVE-2025-9301 https://drive.google.com/file/d/1TerUqQB8_lzJTwIBCBmE94zn7n-gOz4f/view?usp=sharing https://gitlab.kitware.com/cmake/cmake/-/commit/37e27f71bc356d880c908040cd0cb68fa2c371b8 https://gitlab.kitware.com/cmake/cmake/-/issues/27135 https://gitlab.kitware.com/cmake/cmake/-/issues/27135#note_1691629 https://vuldb.com/?ctiid.320906 https://vuldb.com/?id.320906 https://vuldb.com/?submit.632369 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9301.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cmake&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sGBviOATX07Y4438NYu+Aw==&#34;: {&#xA;      &#34;id&#34;: &#34;sGBviOATX07Y4438NYu+Aw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4904 https://bugzilla.redhat.com/show_bug.cgi?id=2168631 https://www.cve.org/CVERecord?id=CVE-2022-4904 https://nvd.nist.gov/vuln/detail/CVE-2022-4904 https://github.com/c-ares/c-ares/issues/496 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4904.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sHu0Ihy6+HrKJvDoll9f5g==&#34;: {&#xA;      &#34;id&#34;: &#34;sHu0Ihy6+HrKJvDoll9f5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js package. By embedding non-network imports in data URLs, this flaw allows an attacker to execute arbitrary code, compromising system security.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22020 https://bugzilla.redhat.com/show_bug.cgi?id=2296417 https://www.cve.org/CVERecord?id=CVE-2024-22020 https://nvd.nist.gov/vuln/detail/CVE-2024-22020 https://hackerone.com/reports/2092749 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22020.json https://access.redhat.com/errata/RHSA-2024:6147&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.4-1.module+el9.4.0+22195+c221878e&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sHvGKpRovk0D6WznAeRDaw==&#34;: {&#xA;      &#34;id&#34;: &#34;sHvGKpRovk0D6WznAeRDaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52533&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Glib library. A buffer overflow condition can be triggered in certain conditions due to an off-by-one error in SOCKS4_CONN_MSG_LEN. This issue may lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52533 https://bugzilla.redhat.com/show_bug.cgi?id=2325340 https://www.cve.org/CVERecord?id=CVE-2024-52533 https://nvd.nist.gov/vuln/detail/CVE-2024-52533 https://gitlab.gnome.org/GNOME/glib/-/issues/3461 https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1 https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52533.json https://access.redhat.com/errata/RHSA-2025:11140&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-16.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;: {&#xA;      &#34;id&#34;: &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T13:22:46Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15281 https://bugzilla.redhat.com/show_bug.cgi?id=2431196 https://www.cve.org/CVERecord?id=CVE-2025-15281 https://nvd.nist.gov/vuln/detail/CVE-2025-15281 https://sourceware.org/bugzilla/show_bug.cgi?id=33814 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15281.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sJOXRbCL0QuUC1P4v8JTZA==&#34;: {&#xA;      &#34;id&#34;: &#34;sJOXRbCL0QuUC1P4v8JTZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5535&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the &#39;no overlap&#39; response in ALPN or uses the output as the opportunistic protocol in NPN.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-5535 https://bugzilla.redhat.com/show_bug.cgi?id=2294581 https://www.cve.org/CVERecord?id=CVE-2024-5535 https://nvd.nist.gov/vuln/detail/CVE-2024-5535 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-5535.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sQrexr1vAx+h04KwvoON3w==&#34;: {&#xA;      &#34;id&#34;: &#34;sQrexr1vAx+h04KwvoON3w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38546&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Curl package. This flaw allows an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38546 https://bugzilla.redhat.com/show_bug.cgi?id=2241938 https://access.redhat.com/errata/RHSA-2024:2101 https://www.cve.org/CVERecord?id=CVE-2023-38546 https://nvd.nist.gov/vuln/detail/CVE-2023-38546 https://curl.se/docs/CVE-2023-38546.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38546.json https://access.redhat.com/errata/RHSA-2023:6745&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sQzygdvKruRINz20KeXUpg==&#34;: {&#xA;      &#34;id&#34;: &#34;sQzygdvKruRINz20KeXUpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45285&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Golang package cmd/go. This issue permits the fallback to insecure \&#34;git://\&#34; if trying to fetch a .git module that has no \&#34;https://\&#34; or \&#34;git+ssh://\&#34; available.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45285 https://bugzilla.redhat.com/show_bug.cgi?id=2253323 https://www.cve.org/CVERecord?id=CVE-2023-45285 https://nvd.nist.gov/vuln/detail/CVE-2023-45285 https://pkg.go.dev/vuln/GO-2023-2383 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45285.json https://access.redhat.com/errata/RHSA-2024:1131&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sTJKOfHbxppSoExQl7mYpQ==&#34;: {&#xA;      &#34;id&#34;: &#34;sTJKOfHbxppSoExQl7mYpQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sTWSbUm1UHqZR0zHxPPV1A==&#34;: {&#xA;      &#34;id&#34;: &#34;sTWSbUm1UHqZR0zHxPPV1A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6129&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in in the POLY1305 MAC (message authentication code) implementation in OpenSSL, affecting applications running on PowerPC CPU-based platforms that utilize vector instructions, and has the potential to corrupt the internal state of these applications. If an attacker can manipulate the utilization of the POLY1305 MAC algorithm, it may lead to the corruption of the application state, resulting in various application-dependent consequences, often resulting in a crash and leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6129 https://bugzilla.redhat.com/show_bug.cgi?id=2257571 https://www.cve.org/CVERecord?id=CVE-2023-6129 https://nvd.nist.gov/vuln/detail/CVE-2023-6129 https://www.openssl.org/news/secadv/20240109.txt https://www.openwall.com/lists/oss-security/2024/01/09/1 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6129.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sUwVQqIfYgZ7onTB1NPzvQ==&#34;: {&#xA;      &#34;id&#34;: &#34;sUwVQqIfYgZ7onTB1NPzvQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T17:48:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68121 https://bugzilla.redhat.com/show_bug.cgi?id=2437111 https://www.cve.org/CVERecord?id=CVE-2025-68121 https://nvd.nist.gov/vuln/detail/CVE-2025-68121 https://go.dev/cl/737700 https://go.dev/issue/77217 https://groups.google.com/g/golang-announce/c/K09ubi9FQFk https://pkg.go.dev/vuln/GO-2026-4337 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68121.json https://access.redhat.com/errata/RHSA-2026:3842&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;delve&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.2-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sVTwqtGyRA8GgZdyQgXnqw==&#34;: {&#xA;      &#34;id&#34;: &#34;sVTwqtGyRA8GgZdyQgXnqw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45288&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45288 https://bugzilla.redhat.com/show_bug.cgi?id=2268273 https://www.cve.org/CVERecord?id=CVE-2023-45288 https://nvd.nist.gov/vuln/detail/CVE-2023-45288 https://nowotarski.info/http2-continuation-flood/ https://pkg.go.dev/vuln/GO-2024-2687 https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45288.json https://access.redhat.com/errata/RHSA-2024:1963&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-4.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sWCyUi5vmFbqsTEOh1QQvQ==&#34;: {&#xA;      &#34;id&#34;: &#34;sWCyUi5vmFbqsTEOh1QQvQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-70873&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in SQLite. This information disclosure vulnerability exists within the zipfile extension, specifically in the zipfileInflate function. A remote attacker could exploit this by providing a specially crafted ZIP file. Successful exploitation could lead to the disclosure of sensitive heap memory information.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-70873 https://bugzilla.redhat.com/show_bug.cgi?id=2447086 https://www.cve.org/CVERecord?id=CVE-2025-70873 https://nvd.nist.gov/vuln/detail/CVE-2025-70873 https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054 https://sqlite.org/forum/forumpost/761eac3c82 https://sqlite.org/src/info/3d459f1fb1bd1b5e https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-70873.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sWMKQZ65XKDEmnR/u8vkiw==&#34;: {&#xA;      &#34;id&#34;: &#34;sWMKQZ65XKDEmnR/u8vkiw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59466&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in Node.js error handling where \&#34;Maximum call stack size exceeded\&#34; errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(&#39;uncaughtException&#39;)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59466 https://bugzilla.redhat.com/show_bug.cgi?id=2431343 https://www.cve.org/CVERecord?id=CVE-2025-59466 https://nvd.nist.gov/vuln/detail/CVE-2025-59466 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59466.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.20.0.1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sWPZolO+x42N83xPk/byrw==&#34;: {&#xA;      &#34;id&#34;: &#34;sWPZolO+x42N83xPk/byrw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45288&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45288 https://bugzilla.redhat.com/show_bug.cgi?id=2268273 https://www.cve.org/CVERecord?id=CVE-2023-45288 https://nvd.nist.gov/vuln/detail/CVE-2023-45288 https://nowotarski.info/http2-continuation-flood/ https://pkg.go.dev/vuln/GO-2024-2687 https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45288.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sXReFixXG4Bn4+eq/AJDBA==&#34;: {&#xA;      &#34;id&#34;: &#34;sXReFixXG4Bn4+eq/AJDBA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-51385&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. In certain circumstances, a remote attacker may be able to execute arbitrary OS commands by using expansion tokens, such as %u or %h, with user names or host names that contain shell metacharacters.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-51385 https://bugzilla.redhat.com/show_bug.cgi?id=2255271 https://www.cve.org/CVERecord?id=CVE-2023-51385 https://nvd.nist.gov/vuln/detail/CVE-2023-51385 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-51385.json https://access.redhat.com/errata/RHSA-2024:1130&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-34.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sXnCRVNv4i/ZmrJ0YxWonw==&#34;: {&#xA;      &#34;id&#34;: &#34;sXnCRVNv4i/ZmrJ0YxWonw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30079&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libeconf library. This issue occurs when parsing a specially crafted configuration file, causing a stack-based buffer overflow that results in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30079 https://bugzilla.redhat.com/show_bug.cgi?id=2234595 https://www.cve.org/CVERecord?id=CVE-2023-30079 https://nvd.nist.gov/vuln/detail/CVE-2023-30079 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30079.json https://access.redhat.com/errata/RHSA-2023:4347&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libeconf&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:0.4.1-3.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sa5mIA5TIgDDEs7v0PwTjQ==&#34;: {&#xA;      &#34;id&#34;: &#34;sa5mIA5TIgDDEs7v0PwTjQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29405&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. The go command may execute arbitrary code at build time when using cgo. This can occur when running \&#34;go get\&#34; on a malicious module, or when running any other command which builds untrusted code. This can be triggered by linker flags, specified via a \&#34;#cgo LDFLAGS\&#34; directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29405 https://bugzilla.redhat.com/show_bug.cgi?id=2217569 https://www.cve.org/CVERecord?id=CVE-2023-29405 https://nvd.nist.gov/vuln/detail/CVE-2023-29405 https://go.dev/cl/501224 https://go.dev/issue/60306 https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ https://pkg.go.dev/vuln/GO-2023-1842 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29405.json https://access.redhat.com/errata/RHSA-2023:3923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.10-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;saK0Qxr6f3taAu0dVT0erg==&#34;: {&#xA;      &#34;id&#34;: &#34;saK0Qxr6f3taAu0dVT0erg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35177&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim&#39;s zip.vim plugin. A local user could be tricked into opening a specially crafted zip archive, which would allow a path traversal bypass. This vulnerability enables an attacker to overwrite arbitrary files on the system, potentially leading to data integrity issues or further system compromise.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T17:54:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35177 https://bugzilla.redhat.com/show_bug.cgi?id=2455542 https://www.cve.org/CVERecord?id=CVE-2026-35177 https://nvd.nist.gov/vuln/detail/CVE-2026-35177 https://github.com/vim/vim/security/advisories/GHSA-jc86-w7vm-8p24 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35177.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;scmQI6T6oitCtZW5973ovw==&#34;: {&#xA;      &#34;id&#34;: &#34;scmQI6T6oitCtZW5973ovw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32002&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32002 https://bugzilla.redhat.com/show_bug.cgi?id=2230948 https://www.cve.org/CVERecord?id=CVE-2023-32002 https://nvd.nist.gov/vuln/detail/CVE-2023-32002 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32002.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sfZFr+txEQMBXhlDkKUnmw==&#34;: {&#xA;      &#34;id&#34;: &#34;sfZFr+txEQMBXhlDkKUnmw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61726&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-28T19:30:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61726 https://bugzilla.redhat.com/show_bug.cgi?id=2434432 https://www.cve.org/CVERecord?id=CVE-2025-61726 https://nvd.nist.gov/vuln/detail/CVE-2025-61726 https://go.dev/cl/736712 https://go.dev/issue/77101 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4341 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61726.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sgKxepKQb+uxgfzzrcWS7w==&#34;: {&#xA;      &#34;id&#34;: &#34;sgKxepKQb+uxgfzzrcWS7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43788&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local attacker to trigger an out-of-bounds read error and read the contents of memory on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43788 https://bugzilla.redhat.com/show_bug.cgi?id=2242248 https://www.cve.org/CVERecord?id=CVE-2023-43788 https://nvd.nist.gov/vuln/detail/CVE-2023-43788 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43788.json https://access.redhat.com/errata/RHSA-2024:2146&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libXpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.13-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;shLykdr8yp2VSWaBtoxh7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;shLykdr8yp2VSWaBtoxh7Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-26T01:07:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27904 https://bugzilla.redhat.com/show_bug.cgi?id=2442922 https://www.cve.org/CVERecord?id=CVE-2026-27904 https://nvd.nist.gov/vuln/detail/CVE-2026-27904 https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27904.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;skjryijgaN9YVeVVq8xZmA==&#34;: {&#xA;      &#34;id&#34;: &#34;skjryijgaN9YVeVVq8xZmA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35938&#34;,&#xA;      &#34;description&#34;: &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35938 https://bugzilla.redhat.com/show_bug.cgi?id=1964114 https://www.cve.org/CVERecord?id=CVE-2021-35938 https://nvd.nist.gov/vuln/detail/CVE-2021-35938 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35938.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;smB1yCGhBb8gDhPAER7odg==&#34;: {&#xA;      &#34;id&#34;: &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14524&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14524 https://bugzilla.redhat.com/show_bug.cgi?id=2426407 https://www.cve.org/CVERecord?id=CVE-2025-14524 https://nvd.nist.gov/vuln/detail/CVE-2025-14524 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14524.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sna4IH0E1Ui1jpzpKgnFOg==&#34;: {&#xA;      &#34;id&#34;: &#34;sna4IH0E1Ui1jpzpKgnFOg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-11023&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery&#39;s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004 https://www.cve.org/CVERecord?id=CVE-2020-11023 https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-11023.json https://access.redhat.com/errata/RHSA-2025:1346&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:11.5.0-5.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;srkxdJQ82zHIMw9egdZc5w==&#34;: {&#xA;      &#34;id&#34;: &#34;srkxdJQ82zHIMw9egdZc5w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23918&#34;,&#xA;      &#34;description&#34;: &#34;A privilege escalation vulnerability exists in Node.js \u003c19.6.1, \u003c18.14.1, \u003c16.19.1 and \u003c14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23918 https://bugzilla.redhat.com/show_bug.cgi?id=2171935 https://www.cve.org/CVERecord?id=CVE-2023-23918 https://nvd.nist.gov/vuln/detail/CVE-2023-23918 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23918.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ssYEt3aOFwnaqoufFlsCAw==&#34;: {&#xA;      &#34;id&#34;: &#34;ssYEt3aOFwnaqoufFlsCAw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35938&#34;,&#xA;      &#34;description&#34;: &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35938 https://bugzilla.redhat.com/show_bug.cgi?id=1964114 https://www.cve.org/CVERecord?id=CVE-2021-35938 https://nvd.nist.gov/vuln/detail/CVE-2021-35938 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35938.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-rpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sv+609cXG/bmAhwCPRMNHg==&#34;: {&#xA;      &#34;id&#34;: &#34;sv+609cXG/bmAhwCPRMNHg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. This vulnerability allows a remote attacker to inject malicious data into HTTP headers or prematurely end HTTP requests by sending specially crafted input to the `upgrade` option of `client.request()`. This is possible because undici does not properly validate input for invalid header characters, which could lead to unauthorized information disclosure or bypassing of security controls.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:17:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1527 https://bugzilla.redhat.com/show_bug.cgi?id=2447141 https://www.cve.org/CVERecord?id=CVE-2026-1527 https://nvd.nist.gov/vuln/detail/CVE-2026-1527 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq https://hackerone.com/reports/3487198 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1527.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;svCt47J2Zwa45xj8gn3U/w==&#34;: {&#xA;      &#34;id&#34;: &#34;svCt47J2Zwa45xj8gn3U/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1485&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Glib&#39;s content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1485 https://bugzilla.redhat.com/show_bug.cgi?id=2433325 https://www.cve.org/CVERecord?id=CVE-2026-1485 https://nvd.nist.gov/vuln/detail/CVE-2026-1485 https://gitlab.gnome.org/GNOME/glib/-/issues/3871 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1485.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;svdlbVzNwZE9P/M3GvQ7Xw==&#34;: {&#xA;      &#34;id&#34;: &#34;svdlbVzNwZE9P/M3GvQ7Xw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9355&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum.  It is also possible to force a derived key to be all zeros instead of an unpredictable value.  This may have follow-on implications for the Go TLS stack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-30T20:53:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9355 https://bugzilla.redhat.com/show_bug.cgi?id=2315719 https://www.cve.org/CVERecord?id=CVE-2024-9355 https://nvd.nist.gov/vuln/detail/CVE-2024-9355 https://github.com/golang-fips/openssl/pull/198 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9355.json https://access.redhat.com/errata/RHSA-2024:7550&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-4.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;swCufUgs8xGhLcR4oX101Q==&#34;: {&#xA;      &#34;id&#34;: &#34;swCufUgs8xGhLcR4oX101Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sx5ziSZauoyjmcMB827V/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;sx5ziSZauoyjmcMB827V/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24791&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go. The net/http module mishandles specific server responses from HTTP/1.1 client requests. This issue may render a connection invalid and cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24791 https://bugzilla.redhat.com/show_bug.cgi?id=2295310 https://www.cve.org/CVERecord?id=CVE-2024-24791 https://nvd.nist.gov/vuln/detail/CVE-2024-24791 https://go.dev/cl/591255 https://go.dev/issue/67555 https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24791.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sxcy9NTxyeNn/j3K+DCTCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;sxcy9NTxyeNn/j3K+DCTCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22036&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Undici, an HTTP/1.1 client for Node.js. A remote attacker could exploit this vulnerability by sending a specially crafted HTTP response with an unbounded number of links in the decompression chain. This could lead to high CPU usage and excessive memory allocation, resulting in a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-14T19:07:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22036 https://bugzilla.redhat.com/show_bug.cgi?id=2429741 https://www.cve.org/CVERecord?id=CVE-2026-22036 https://nvd.nist.gov/vuln/detail/CVE-2026-22036 https://github.com/nodejs/undici/commit/b04e3cbb569c1596f86c108e9b52c79d8475dcb3 https://github.com/nodejs/undici/security/advisories/GHSA-g9mf-h72j-4rw9 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22036.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sxxGu02J6Xp0UskX/yPO4w==&#34;: {&#xA;      &#34;id&#34;: &#34;sxxGu02J6Xp0UskX/yPO4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35938&#34;,&#xA;      &#34;description&#34;: &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35938 https://bugzilla.redhat.com/show_bug.cgi?id=1964114 https://www.cve.org/CVERecord?id=CVE-2021-35938 https://nvd.nist.gov/vuln/detail/CVE-2021-35938 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35938.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sykv+pGN4TXggZNIwL/H4g==&#34;: {&#xA;      &#34;id&#34;: &#34;sykv+pGN4TXggZNIwL/H4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5915&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5915 https://bugzilla.redhat.com/show_bug.cgi?id=2370865 https://www.cve.org/CVERecord?id=CVE-2025-5915 https://nvd.nist.gov/vuln/detail/CVE-2025-5915 https://github.com/libarchive/libarchive/pull/2599 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5915.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;szMAuHDpCq8KehOnG/58kg==&#34;: {&#xA;      &#34;id&#34;: &#34;szMAuHDpCq8KehOnG/58kg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-25883&#34;,&#xA;      &#34;description&#34;: &#34;A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the &#39;new Range&#39; function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-25883 https://bugzilla.redhat.com/show_bug.cgi?id=2216475 https://www.cve.org/CVERecord?id=CVE-2022-25883 https://nvd.nist.gov/vuln/detail/CVE-2022-25883 https://github.com/advisories/GHSA-c2qf-rxjj-qqgw https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-25883.json https://access.redhat.com/errata/RHSA-2023:5363&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.17.1-1.module+el9.2.0.z+19753+58118bc0&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;t+vHm4kt0AB+tq2CG41TQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;t+vHm4kt0AB+tq2CG41TQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;t/e+iLCKcOMzXEuhRWry6g==&#34;: {&#xA;      &#34;id&#34;: &#34;t/e+iLCKcOMzXEuhRWry6g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;t0yM+3xw1ZQW3unHh4xTyA==&#34;: {&#xA;      &#34;id&#34;: &#34;t0yM+3xw1ZQW3unHh4xTyA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3198&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU Binutils. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-04T01:31:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3198 https://bugzilla.redhat.com/show_bug.cgi?id=2357358 https://www.cve.org/CVERecord?id=CVE-2025-3198 https://nvd.nist.gov/vuln/detail/CVE-2025-3198 https://sourceware.org/bugzilla/show_bug.cgi?id=32716 https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d https://vuldb.com/?ctiid.303151 https://vuldb.com/?id.303151 https://vuldb.com/?submit.545773 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3198.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;t6Z7F4vRK3+khLx6GFFiJQ==&#34;: {&#xA;      &#34;id&#34;: &#34;t6Z7F4vRK3+khLx6GFFiJQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15367&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the poplib module in the Python standard library. The poplib module does not reject control characters, such as newlines, in user-controlled input passed to POP3 commands. This issue allows an attacker to inject additional commands to be executed in the POP3 server.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:47:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15367 https://bugzilla.redhat.com/show_bug.cgi?id=2431373 https://www.cve.org/CVERecord?id=CVE-2025-15367 https://nvd.nist.gov/vuln/detail/CVE-2025-15367 https://github.com/python/cpython/issues/143923 https://github.com/python/cpython/pull/143924 https://mail.python.org/archives/list/security-announce@python.org/thread/CBFBOWVGGUJFSGITQCCBZS4GEYYZ7ZNE/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15367.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tC2r7U8qVBEhU9NaT3fMVg==&#34;: {&#xA;      &#34;id&#34;: &#34;tC2r7U8qVBEhU9NaT3fMVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-12900&#34;,&#xA;      &#34;description&#34;: &#34;A data integrity error was found in the bzip2 (User-space package) functionality when decompressing. This issue occurs when a user decompresses a particular kind of .bz2 files. A local user could get unexpected results (or corrupted data) as result of decompressing these files.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-15T10:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-12900 https://bugzilla.redhat.com/show_bug.cgi?id=2332075 https://www.cve.org/CVERecord?id=CVE-2019-12900 https://nvd.nist.gov/vuln/detail/CVE-2019-12900 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-12900.json https://access.redhat.com/errata/RHSA-2025:0925&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.0.8-10.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tDVJVtVXjEp2hZmPcOFM9w==&#34;: {&#xA;      &#34;id&#34;: &#34;tDVJVtVXjEp2hZmPcOFM9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0450&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python/CPython &#39;zipfile&#39; that can allow a zip-bomb type of attack. An attacker may craft a zip file format, leading to a Denial of Service when processed.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0450 https://bugzilla.redhat.com/show_bug.cgi?id=2276525 https://www.cve.org/CVERecord?id=CVE-2024-0450 https://nvd.nist.gov/vuln/detail/CVE-2024-0450 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0450.json https://access.redhat.com/errata/RHSA-2024:4078&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tEG4S6zEddB/Fl32LgLV+A==&#34;: {&#xA;      &#34;id&#34;: &#34;tEG4S6zEddB/Fl32LgLV+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3627&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3627 https://bugzilla.redhat.com/show_bug.cgi?id=2142742 https://www.cve.org/CVERecord?id=CVE-2022-3627 https://nvd.nist.gov/vuln/detail/CVE-2022-3627 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3627.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tIZr20KLFTaQt9OBw5SXsA==&#34;: {&#xA;      &#34;id&#34;: &#34;tIZr20KLFTaQt9OBw5SXsA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-61729&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-02T18:54:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-61729 https://bugzilla.redhat.com/show_bug.cgi?id=2418462 https://www.cve.org/CVERecord?id=CVE-2025-61729 https://nvd.nist.gov/vuln/detail/CVE-2025-61729 https://go.dev/cl/725920 https://go.dev/issue/76445 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 https://pkg.go.dev/vuln/GO-2025-4155 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61729.json https://access.redhat.com/errata/RHSA-2026:0923&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.5-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tJJUE3O+B2dj0YzqLSTtDA==&#34;: {&#xA;      &#34;id&#34;: &#34;tJJUE3O+B2dj0YzqLSTtDA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-44638&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in pixman. This issue causes an out-of-bounds write in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y. This can result in data corruption, a crash, or code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-11-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-44638 https://bugzilla.redhat.com/show_bug.cgi?id=2139988 https://www.cve.org/CVERecord?id=CVE-2022-44638 https://nvd.nist.gov/vuln/detail/CVE-2022-44638 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-44638.json https://access.redhat.com/errata/RHSA-2023:7754&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pixman&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:0.40.0-6.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tKVE3VH+DixxL49Cbeit6Q==&#34;: {&#xA;      &#34;id&#34;: &#34;tKVE3VH+DixxL49Cbeit6Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-49043&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2 where improper handling of memory allocation failures in `libxml2` can lead to crashes, memory leaks, or inconsistent states. While an attacker cannot directly control allocation failures, they may trigger denial-of-service conditions under extreme system stress.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-49043 https://bugzilla.redhat.com/show_bug.cgi?id=2342118 https://www.cve.org/CVERecord?id=CVE-2022-49043 https://nvd.nist.gov/vuln/detail/CVE-2022-49043 https://github.com/php/php-src/issues/17467 https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-49043.json https://access.redhat.com/errata/RHSA-2025:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tLSR0X6hQ7hvyPbBXZslBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tLSR0X6hQ7hvyPbBXZslBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2126&#34;,&#xA;      &#34;description&#34;: &#34;Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-06-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2126 https://bugzilla.redhat.com/show_bug.cgi?id=2099596 https://www.cve.org/CVERecord?id=CVE-2022-2126 https://nvd.nist.gov/vuln/detail/CVE-2022-2126 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2126.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tLfvNXQJ1ryG1oIjuKoLPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tLfvNXQJ1ryG1oIjuKoLPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tNFH1YUHHwU3vwUWrO3mLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tNFH1YUHHwU3vwUWrO3mLQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23167&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the HTTP parser of Node.js. This vulnerability allows attackers to perform request smuggling and bypass proxy-based access controls via improperly terminated HTTP/1 headers using \\r\\n\\rX instead of the standard \\r\\n\\r\\n.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23167 https://bugzilla.redhat.com/show_bug.cgi?id=2367167 https://www.cve.org/CVERecord?id=CVE-2025-23167 https://nvd.nist.gov/vuln/detail/CVE-2025-23167 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23167.json https://access.redhat.com/errata/RHSA-2025:8468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.19.2-1.module+el9.6.0+23146+be9976bd&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tQmmf4j1ZMloac9gv7yd7w==&#34;: {&#xA;      &#34;id&#34;: &#34;tQmmf4j1ZMloac9gv7yd7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici package for Node.js. Undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If an app has a mechanism that sends multipart requests to an attacker-controlled website, it can leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T17:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22150 https://bugzilla.redhat.com/show_bug.cgi?id=2339176 https://www.cve.org/CVERecord?id=CVE-2025-22150 https://nvd.nist.gov/vuln/detail/CVE-2025-22150 https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113 https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0 https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385 https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975 https://hackerone.com/reports/2913312 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22150.json https://access.redhat.com/errata/RHSA-2025:1446&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.6-1.module+el9.5.0+22773+9a359385&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tTdsNcqGarFD7KtMB1ag6Q==&#34;: {&#xA;      &#34;id&#34;: &#34;tTdsNcqGarFD7KtMB1ag6Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27533&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27533 https://bugzilla.redhat.com/show_bug.cgi?id=2179062 https://www.cve.org/CVERecord?id=CVE-2023-27533 https://nvd.nist.gov/vuln/detail/CVE-2023-27533 https://curl.se/docs/CVE-2023-27533.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27533.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tVO6+VLrPGQTVjdd/8MBTg==&#34;: {&#xA;      &#34;id&#34;: &#34;tVO6+VLrPGQTVjdd/8MBTg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2229&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client&#39;s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:27:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2229 https://bugzilla.redhat.com/show_bug.cgi?id=2447143 https://www.cve.org/CVERecord?id=CVE-2026-2229 https://nvd.nist.gov/vuln/detail/CVE-2026-2229 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8 https://hackerone.com/reports/3487486 https://nodejs.org/api/zlib.html#class-zlibinflateraw https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2229.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tVQs2LJzOpi0sAtiX4H2oQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tVQs2LJzOpi0sAtiX4H2oQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26996&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-20T03:05:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26996 https://bugzilla.redhat.com/show_bug.cgi?id=2441268 https://www.cve.org/CVERecord?id=CVE-2026-26996 https://nvd.nist.gov/vuln/detail/CVE-2026-26996 https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26996.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tVvgs8QNtuRqLgnWoPIWbw==&#34;: {&#xA;      &#34;id&#34;: &#34;tVvgs8QNtuRqLgnWoPIWbw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-26465&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client&#39;s memory resource first, turning the attack complexity high.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-26465 https://bugzilla.redhat.com/show_bug.cgi?id=2344780 https://www.cve.org/CVERecord?id=CVE-2025-26465 https://nvd.nist.gov/vuln/detail/CVE-2025-26465 https://access.redhat.com/solutions/7109879 https://seclists.org/oss-sec/2025/q1/144 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-26465.json https://access.redhat.com/errata/RHSA-2025:6993&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-45.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tW4ew6Bpf68YpYbdwMyYGA==&#34;: {&#xA;      &#34;id&#34;: &#34;tW4ew6Bpf68YpYbdwMyYGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43789&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43789 https://bugzilla.redhat.com/show_bug.cgi?id=2242249 https://www.cve.org/CVERecord?id=CVE-2023-43789 https://nvd.nist.gov/vuln/detail/CVE-2023-43789 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43789.json https://access.redhat.com/errata/RHSA-2024:2146&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libXpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.13-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tZCJ3EMmfQYEKmNY0R6pgg==&#34;: {&#xA;      &#34;id&#34;: &#34;tZCJ3EMmfQYEKmNY0R6pgg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0397&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Python. A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “get_ca_certs()”. The race condition can be triggered if the methods are called at the same time that certificates are loaded into the SSLContext, such as during the TLS handshake with a  configured certificate directory.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0397 https://bugzilla.redhat.com/show_bug.cgi?id=2301891 https://www.cve.org/CVERecord?id=CVE-2024-0397 https://nvd.nist.gov/vuln/detail/CVE-2024-0397 https://mail.python.org/archives/list/security-announce@python.org/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0397.json https://access.redhat.com/errata/RHSA-2024:10983&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-1.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tZSfr7Q1QfQP2u7Sjxqmrw==&#34;: {&#xA;      &#34;id&#34;: &#34;tZSfr7Q1QfQP2u7Sjxqmrw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0465&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. OpenSSL and other certificate policy checks silently ignore invalid certificate policies in leaf certificates that are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0465 https://bugzilla.redhat.com/show_bug.cgi?id=2182561 https://www.cve.org/CVERecord?id=CVE-2023-0465 https://nvd.nist.gov/vuln/detail/CVE-2023-0465 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0465.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;taWP10HWuyQrPSEFSUjPPw==&#34;: {&#xA;      &#34;id&#34;: &#34;taWP10HWuyQrPSEFSUjPPw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The netgroup cache uses xmalloc/xrealloc and may terminate the process due to a memory allocation failure.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33601 https://bugzilla.redhat.com/show_bug.cgi?id=2277205 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://nvd.nist.gov/vuln/detail/CVE-2024-33601 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33601.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tbhLz74i3ShwS72WbIsoOA==&#34;: {&#xA;      &#34;id&#34;: &#34;tbhLz74i3ShwS72WbIsoOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50495&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the NCurses package, where a segmentation fault may be triggered through _nc_wrap_entry().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-50495 https://bugzilla.redhat.com/show_bug.cgi?id=2254244 https://www.cve.org/CVERecord?id=CVE-2023-50495 https://nvd.nist.gov/vuln/detail/CVE-2023-50495 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-50495.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tbkEtEs3aa+p2/YQaD8BfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tbkEtEs3aa+p2/YQaD8BfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-1972&#34;,&#xA;      &#34;description&#34;: &#34;A potential heap-based buffer overflow was found in binutils in the _bfd_elf_slurp_version_tables() function in bfd/elf.c. This issue may lead to a loss of availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-1972 https://bugzilla.redhat.com/show_bug.cgi?id=2185646 https://www.cve.org/CVERecord?id=CVE-2023-1972 https://nvd.nist.gov/vuln/detail/CVE-2023-1972 https://sourceware.org/bugzilla/show_bug.cgi?id=30285 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1972.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tboTb+/fwz1O/l+3w5n9ew==&#34;: {&#xA;      &#34;id&#34;: &#34;tboTb+/fwz1O/l+3w5n9ew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22019&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js due to a lack of safeguards on chunk extension bytes. The server may read an unbounded number of bytes from a single connection, which can allow an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22019 https://bugzilla.redhat.com/show_bug.cgi?id=2264574 https://www.cve.org/CVERecord?id=CVE-2024-22019 https://nvd.nist.gov/vuln/detail/CVE-2024-22019 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22019.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tc3yI78GS4DzyIWUxAPWyg==&#34;: {&#xA;      &#34;id&#34;: &#34;tc3yI78GS4DzyIWUxAPWyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-65018&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow flaw has been discovered in libpng. There is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:50:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-65018 https://bugzilla.redhat.com/show_bug.cgi?id=2416907 https://www.cve.org/CVERecord?id=CVE-2025-65018 https://nvd.nist.gov/vuln/detail/CVE-2025-65018 https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea https://github.com/pnggroup/libpng/issues/755 https://github.com/pnggroup/libpng/pull/757 https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-65018.json https://access.redhat.com/errata/RHSA-2026:0238&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;te0mQBJAxCZ9Xzg2xrzQcg==&#34;: {&#xA;      &#34;id&#34;: &#34;te0mQBJAxCZ9Xzg2xrzQcg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45490&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat&#39;s xmlparse.c component. This vulnerability allows an attacker to cause improper handling of XML data by providing a negative length value to the XML_ParseBuffer function.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-30T03:15:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45490 https://bugzilla.redhat.com/show_bug.cgi?id=2308615 https://www.cve.org/CVERecord?id=CVE-2024-45490 https://nvd.nist.gov/vuln/detail/CVE-2024-45490 https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes https://github.com/libexpat/libexpat/issues/887 https://github.com/libexpat/libexpat/pull/890 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45490.json https://access.redhat.com/errata/RHSA-2024:6754&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-2.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;teVzqeXKz5qAL9KrVUsKAA==&#34;: {&#xA;      &#34;id&#34;: &#34;teVzqeXKz5qAL9KrVUsKAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-overloading&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:0.02-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tiE5Hgw3cKrNfJ9IvmRV7w==&#34;: {&#xA;      &#34;id&#34;: &#34;tiE5Hgw3cKrNfJ9IvmRV7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2229&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client&#39;s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:27:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2229 https://bugzilla.redhat.com/show_bug.cgi?id=2447143 https://www.cve.org/CVERecord?id=CVE-2026-2229 https://nvd.nist.gov/vuln/detail/CVE-2026-2229 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8 https://hackerone.com/reports/3487486 https://nodejs.org/api/zlib.html#class-zlibinflateraw https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2229.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tjg7NtH3QatPaaScohSsZg==&#34;: {&#xA;      &#34;id&#34;: &#34;tjg7NtH3QatPaaScohSsZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27982&#34;,&#xA;      &#34;description&#34;: &#34;An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27982 https://bugzilla.redhat.com/show_bug.cgi?id=2275392 https://www.cve.org/CVERecord?id=CVE-2024-27982 https://nvd.nist.gov/vuln/detail/CVE-2024-27982 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27982.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tk58DmpOzYRq2tA73Zt4KA==&#34;: {&#xA;      &#34;id&#34;: &#34;tk58DmpOzYRq2tA73Zt4KA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1528&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici&#39;s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:21:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1528 https://bugzilla.redhat.com/show_bug.cgi?id=2447145 https://www.cve.org/CVERecord?id=CVE-2026-1528 https://nvd.nist.gov/vuln/detail/CVE-2026-1528 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj https://hackerone.com/reports/3537648 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1528.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tlbehmhIbT1WwXt6llfQYw==&#34;: {&#xA;      &#34;id&#34;: &#34;tlbehmhIbT1WwXt6llfQYw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0515&#34;,&#xA;      &#34;description&#34;: &#34;Stack exhaustion due to deeply nested types in go/parser&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-20T17:01:45Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/417063 https://go.googlesource.com/go/+/695be961d57508da5a82217f7415200a11845879 https://go.dev/issue/53616 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.4&#34;&#xA;    },&#xA;    &#34;toXp/ZwNqXAUsdXRb/4DVg==&#34;: {&#xA;      &#34;id&#34;: &#34;toXp/ZwNqXAUsdXRb/4DVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22365&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Linux PAM. An unprivileged user that is not yet in a corresponding mount namespace with ~/tmp mounted as a polyinstantiated dir can place a FIFO there, and a subsequent attempt to login as this user with `pam_namespace` configured will cause the `openat()` in `protect_dir()` to block the attempt, causing a local denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22365 https://bugzilla.redhat.com/show_bug.cgi?id=2257722 https://www.cve.org/CVERecord?id=CVE-2024-22365 https://nvd.nist.gov/vuln/detail/CVE-2024-22365 https://www.openwall.com/lists/oss-security/2024/01/18/3 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22365.json https://access.redhat.com/errata/RHSA-2024:2438&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.5.1-19.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;todSxpG0ADSu6dX8ZW+q4A==&#34;: {&#xA;      &#34;id&#34;: &#34;todSxpG0ADSu6dX8ZW+q4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43787&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43787 https://bugzilla.redhat.com/show_bug.cgi?id=2242254 https://www.cve.org/CVERecord?id=CVE-2023-43787 https://nvd.nist.gov/vuln/detail/CVE-2023-43787 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43787.json https://access.redhat.com/errata/RHSA-2024:2145&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;tvq/gvjGf6pzxLuMOglBaw==&#34;: {&#xA;      &#34;id&#34;: &#34;tvq/gvjGf6pzxLuMOglBaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4775&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-24T14:33:35Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4775 https://bugzilla.redhat.com/show_bug.cgi?id=2450768 https://www.cve.org/CVERecord?id=CVE-2026-4775 https://nvd.nist.gov/vuln/detail/CVE-2026-4775 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4775.json https://access.redhat.com/errata/RHSA-2026:12271&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-15.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;u/b1G56mYgMO4E+lYxSxjA==&#34;: {&#xA;      &#34;id&#34;: &#34;u/b1G56mYgMO4E+lYxSxjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31130&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs in the ares_inet_net_pton() function, which is vulnerable to a buffer underflow for certain ipv6 addresses. \&#34;0::00:00:00/2\&#34; in particular was found to cause an issue. C-ares only uses this function internally for configuration purposes, which would require an administrator to configure such an address via ares_set_sortlist().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31130 https://bugzilla.redhat.com/show_bug.cgi?id=2209497 https://www.cve.org/CVERecord?id=CVE-2023-31130 https://nvd.nist.gov/vuln/detail/CVE-2023-31130 https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31130.json https://access.redhat.com/errata/RHSA-2023:3577&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-3.module+el9.2.0.z+18964+42696395&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;u0MfT/CHY1AhIYRRjCtdhw==&#34;: {&#xA;      &#34;id&#34;: &#34;u0MfT/CHY1AhIYRRjCtdhw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23166&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, specifically in the C++ method SignTraits::DeriveBits(). This vulnerability can allow a remote attacker to crash the Node.js runtime via untrusted input, triggering an exception in a background thread.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23166 https://bugzilla.redhat.com/show_bug.cgi?id=2367163 https://www.cve.org/CVERecord?id=CVE-2025-23166 https://nvd.nist.gov/vuln/detail/CVE-2025-23166 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23166.json https://access.redhat.com/errata/RHSA-2025:8467&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.16.0-1.module+el9.6.0+23151+b1496e9d&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;u0cs09LPRVEEfen4PHM6gA==&#34;: {&#xA;      &#34;id&#34;: &#34;u0cs09LPRVEEfen4PHM6gA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0990&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0990 https://bugzilla.redhat.com/show_bug.cgi?id=2429959 https://www.cve.org/CVERecord?id=CVE-2026-0990 https://nvd.nist.gov/vuln/detail/CVE-2026-0990 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0990.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u0i6Tc2zpzW8/pMdj7AH4w==&#34;: {&#xA;      &#34;id&#34;: &#34;u0i6Tc2zpzW8/pMdj7AH4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-46835&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the git GUI package. When a user clones an untrusted repository and edits a file located in a maliciously named directory, git GUI may end up creating or overwriting arbitrary files for the running user has written permission. This flaw allows an attacker to modify the content of target files without the affected user&#39;s intent, resulting in a data integrity issue.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T15:09:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-46835 https://bugzilla.redhat.com/show_bug.cgi?id=2379326 https://www.cve.org/CVERecord?id=CVE-2025-46835 https://nvd.nist.gov/vuln/detail/CVE-2025-46835 https://github.com/j6t/git-gui/compare/dcda716dbc9c90bcac4611bd1076747671ee0906..a437f5bc93330a70b42a230e52f3bd036ca1b1da https://github.com/j6t/git-gui/security/advisories/GHSA-xfx7-68v4-v8fg https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-46835.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;u1EBYvwhn/Xoyt4PDy5M1A==&#34;: {&#xA;      &#34;id&#34;: &#34;u1EBYvwhn/Xoyt4PDy5M1A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45341&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/x509 package of the Golang standard library. A certificate with a URI, which has a IPv6 address with a zone ID, may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI; this issue only affects users of private PKIs that make use of URIs.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45341 https://bugzilla.redhat.com/show_bug.cgi?id=2341750 https://www.cve.org/CVERecord?id=CVE-2024-45341 https://nvd.nist.gov/vuln/detail/CVE-2024-45341 https://github.com/golang/go/commit/2b2314e9f6103de322b2e247387c8b01fd0cd5a4 https://github.com/golang/go/issues/71156 https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45341.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;u1caIbS4Tk6y8c7sz8Hvhw==&#34;: {&#xA;      &#34;id&#34;: &#34;u1caIbS4Tk6y8c7sz8Hvhw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-41957&#34;,&#xA;      &#34;description&#34;: &#34;A double-free and use-after-free vulnerability was found in the Vim editor. This flaw exists due to the corresponding tagstack being used twice when closing the window and if the quick fix list belonging to that window is also cleared using the same tagstack data. In this instance, Vim will try to free the memory again, causing a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-01T20:41:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-41957 https://bugzilla.redhat.com/show_bug.cgi?id=2302418 https://www.cve.org/CVERecord?id=CVE-2024-41957 https://nvd.nist.gov/vuln/detail/CVE-2024-41957 https://github.com/vim/vim/commit/8a0bbe7b8aad6f8da28dee218c01bc8a0185a https://github.com/vim/vim/security/advisories/GHSA-f9cr-gv85-hcr4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41957.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u3VIQ3Bv2EdQNxxr10FAOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;u3VIQ3Bv2EdQNxxr10FAOQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23936&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the fetch API in Node.js that did not prevent CRLF injection in the &#39;host&#39; header. This issue could allow HTTP response splitting and HTTP header injection.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23936 https://bugzilla.redhat.com/show_bug.cgi?id=2172190 https://www.cve.org/CVERecord?id=CVE-2023-23936 https://nvd.nist.gov/vuln/detail/CVE-2023-23936 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23936.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.3-1.16.19.1.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;u6PjuomLq+nVKrTw/0Jyeg==&#34;: {&#xA;      &#34;id&#34;: &#34;u6PjuomLq+nVKrTw/0Jyeg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-28805&#34;,&#xA;      &#34;description&#34;: &#34;A heap buffer-overflow vulnerability was found in Lua. The flaw occurs due to vulnerable code present in the lparser.c function of Lua that allows the execution of untrusted Lua code into a system, resulting in malicious activity.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-28805 https://bugzilla.redhat.com/show_bug.cgi?id=2073884 https://www.cve.org/CVERecord?id=CVE-2022-28805 https://nvd.nist.gov/vuln/detail/CVE-2022-28805 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-28805.json https://access.redhat.com/errata/RHSA-2023:2582&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lua-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:5.4.4-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;u6YfnQt98V+kYlUqAP+rFg==&#34;: {&#xA;      &#34;id&#34;: &#34;u6YfnQt98V+kYlUqAP+rFg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2026-4601&#34;,&#xA;      &#34;description&#34;: &#34;Incorrect parsing of IPv6 host literals in net/url&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:03:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/752180 https://go.dev/issue/77578 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.25.8&#34;&#xA;    },&#xA;    &#34;u71+866Ffd2deSVdosxvJw==&#34;: {&#xA;      &#34;id&#34;: &#34;u71+866Ffd2deSVdosxvJw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59466&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in Node.js error handling where \&#34;Maximum call stack size exceeded\&#34; errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(&#39;uncaughtException&#39;)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59466 https://bugzilla.redhat.com/show_bug.cgi?id=2431343 https://www.cve.org/CVERecord?id=CVE-2025-59466 https://nvd.nist.gov/vuln/detail/CVE-2025-59466 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59466.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uDUK/vmP915z5uyCv2VhVg==&#34;: {&#xA;      &#34;id&#34;: &#34;uDUK/vmP915z5uyCv2VhVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-40217&#34;,&#xA;      &#34;description&#34;: &#34;Python ssl.SSLSocket is vulnerable to a bypass of the TLS handshake in certain instances for HTTPS servers and other server-side protocols that use TLS client authentication such as mTLS. This issue may result in a breach of integrity as its possible to modify or delete resources that are authenticated only by a TLS certificate. No breach of confidentiality is possible.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-40217 https://bugzilla.redhat.com/show_bug.cgi?id=2235789 https://www.cve.org/CVERecord?id=CVE-2023-40217 https://nvd.nist.gov/vuln/detail/CVE-2023-40217 https://github.com/python/cpython/issues/108310 https://github.com/python/cpython/pull/108315 https://mail.python.org/archives/list/security-announce@python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-40217.json https://access.redhat.com/errata/RHSA-2023:5462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.16-1.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uDfc8ZaPfrhTGcFwVaIvAA==&#34;: {&#xA;      &#34;id&#34;: &#34;uDfc8ZaPfrhTGcFwVaIvAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-48706&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free flaw was found in the vim package. When executing a `:s` command for the first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes memory to be freed, which may later then be accessed by the initial `:s` command. This issue may result in Vim crashing.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-48706 https://bugzilla.redhat.com/show_bug.cgi?id=2251118 https://www.cve.org/CVERecord?id=CVE-2023-48706 https://nvd.nist.gov/vuln/detail/CVE-2023-48706 http://www.openwall.com/lists/oss-security/2023/11/22/3 https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48706.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uEn9qA67O/SoYHOtH/EL2w==&#34;: {&#xA;      &#34;id&#34;: &#34;uEn9qA67O/SoYHOtH/EL2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ld linker utility of GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-10T16:31:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1150 https://bugzilla.redhat.com/show_bug.cgi?id=2344681 https://www.cve.org/CVERecord?id=CVE-2025-1150 https://nvd.nist.gov/vuln/detail/CVE-2025-1150 https://sourceware.org/bugzilla/attachment.cgi?id=15887 https://sourceware.org/bugzilla/show_bug.cgi?id=32576 https://vuldb.com/?ctiid.295054 https://vuldb.com/?id.295054 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1150.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uFR2NXYHCgkD0jUkHBTh3g==&#34;: {&#xA;      &#34;id&#34;: &#34;uFR2NXYHCgkD0jUkHBTh3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-7425&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7425 https://bugzilla.redhat.com/show_bug.cgi?id=2379274 https://www.cve.org/CVERecord?id=CVE-2025-7425 https://nvd.nist.gov/vuln/detail/CVE-2025-7425 https://gitlab.gnome.org/GNOME/libxslt/-/issues/140 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7425.json https://access.redhat.com/errata/RHSA-2025:12447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-11.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uFRb2siFSROrNSaSMqsvqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uFRb2siFSROrNSaSMqsvqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39323&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the golang cmd/go standard library. A line directive (\&#34;//line\&#34;) can be used to bypass the restrictions on \&#34;//go:cgo_\&#34; directives, allowing blocked linker and compiler flags to pass during compilation. This can result in the unexpected execution of arbitrary code when running \&#34;go build\&#34;. The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39323 https://bugzilla.redhat.com/show_bug.cgi?id=2242544 https://www.cve.org/CVERecord?id=CVE-2023-39323 https://nvd.nist.gov/vuln/detail/CVE-2023-39323 https://go.dev/cl/533215 https://go.dev/issue/63211 https://groups.google.com/g/golang-announce/c/XBa1oHDevAo https://vuln.go.dev/ID/GO-2023-2095.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39323.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uFXEnN9gepJ4+HtQWdLrOg==&#34;: {&#xA;      &#34;id&#34;: &#34;uFXEnN9gepJ4+HtQWdLrOg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25433&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to a heap-based buffer overflow in the processCropSelections function in tools/tiffcrop.c, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25433 https://bugzilla.redhat.com/show_bug.cgi?id=2218744 https://www.cve.org/CVERecord?id=CVE-2023-25433 https://nvd.nist.gov/vuln/detail/CVE-2023-25433 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25433.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uGPuYR0b3uiHdpdRa97mfw==&#34;: {&#xA;      &#34;id&#34;: &#34;uGPuYR0b3uiHdpdRa97mfw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22017&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, where the setuid() does not affect libuv&#39;s internal io_uring operations if initialized before the call to setuid(). This issue allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22017 https://bugzilla.redhat.com/show_bug.cgi?id=2265727 https://www.cve.org/CVERecord?id=CVE-2024-22017 https://nvd.nist.gov/vuln/detail/CVE-2024-22017 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22017.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uGxAJHfmN99PtsQCJqV/nQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uGxAJHfmN99PtsQCJqV/nQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-36227&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. A missing check of the return value of the calloc function can cause a NULL pointer dereference in an out-of-memory condition or when a memory allocation limit is reached, resulting in the program linked with libarchive to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-36227 https://bugzilla.redhat.com/show_bug.cgi?id=2144972 https://www.cve.org/CVERecord?id=CVE-2022-36227 https://nvd.nist.gov/vuln/detail/CVE-2022-36227 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-36227.json https://access.redhat.com/errata/RHSA-2023:2532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bsdtar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-4.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uHGQ4u2cwHgRGK+9r/8n+w==&#34;: {&#xA;      &#34;id&#34;: &#34;uHGQ4u2cwHgRGK+9r/8n+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55130&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55130 https://bugzilla.redhat.com/show_bug.cgi?id=2431352 https://www.cve.org/CVERecord?id=CVE-2025-55130 https://nvd.nist.gov/vuln/detail/CVE-2025-55130 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55130.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uILMvGS6obqeMj18FLYSbg==&#34;: {&#xA;      &#34;id&#34;: &#34;uILMvGS6obqeMj18FLYSbg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25815&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security flaw occurs when Git compiles with runtime prefix support and runs without translated messages, and it still uses the gettext machinery to display messages, which subsequently looks for translated messages in unexpected places. This flaw allows the malicious placement of crafted messages.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25815 https://bugzilla.redhat.com/show_bug.cgi?id=2188337 https://www.cve.org/CVERecord?id=CVE-2023-25815 https://nvd.nist.gov/vuln/detail/CVE-2023-25815 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25815.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uJDCv1FWYpz7eywFMZ5WnA==&#34;: {&#xA;      &#34;id&#34;: &#34;uJDCv1FWYpz7eywFMZ5WnA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-21892&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. On Linux, Node.js ignores certain environment variables if an unprivileged user has set them while the process is running with elevated privileges, except for CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when other capabilities have been set. This flaw allows unprivileged users to inject code that inherits the process&#39;s elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-21892 https://bugzilla.redhat.com/show_bug.cgi?id=2264582 https://www.cve.org/CVERecord?id=CVE-2024-21892 https://nvd.nist.gov/vuln/detail/CVE-2024-21892 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-21892.json https://access.redhat.com/errata/RHSA-2024:1503&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.19.1-1.module+el9.3.0+21388+22892fb9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uJpX1i+k36BH7BSmiGPDBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uJpX1i+k36BH7BSmiGPDBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32282&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32282 https://bugzilla.redhat.com/show_bug.cgi?id=2456336 https://www.cve.org/CVERecord?id=CVE-2026-32282 https://nvd.nist.gov/vuln/detail/CVE-2026-32282 https://go.dev/cl/763761 https://go.dev/issue/78293 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4864 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32282.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uLJc9xWoMs4KcjASTFLV/A==&#34;: {&#xA;      &#34;id&#34;: &#34;uLJc9xWoMs4KcjASTFLV/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3497&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSH GSSAPI (Generic Security Service Application Program Interface) delta patches, as included in various Linux distributions. A remote attacker could exploit this by sending an unexpected GSSAPI message type during the key exchange process. This occurs because the `sshpkt_disconnect()` function, when called on an error, does not properly terminate the process, leading to the continued execution of the program with uninitialized connection variables. Accessing these uninitialized variables can lead to undefined behavior, potentially resulting in information disclosure or a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T18:27:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3497 https://bugzilla.redhat.com/show_bug.cgi?id=2447085 https://www.cve.org/CVERecord?id=CVE-2026-3497 https://nvd.nist.gov/vuln/detail/CVE-2026-3497 https://ubuntu.com/security/CVE-2026-3497 https://www.openwall.com/lists/oss-security/2026/03/12/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3497.json https://access.redhat.com/errata/RHSA-2026:6462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-48.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uO3OOEY6W3k9QH/tNVK0LQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uO3OOEY6W3k9QH/tNVK0LQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1152&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ld linker utility of GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-10T18:00:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1152 https://bugzilla.redhat.com/show_bug.cgi?id=2344723 https://www.cve.org/CVERecord?id=CVE-2025-1152 https://nvd.nist.gov/vuln/detail/CVE-2025-1152 https://sourceware.org/bugzilla/attachment.cgi?id=15887 https://sourceware.org/bugzilla/show_bug.cgi?id=32576 https://vuldb.com/?ctiid.295056 https://vuldb.com/?id.295056 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1152.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uOeAKP5ZyZtLLU7CjOuFcw==&#34;: {&#xA;      &#34;id&#34;: &#34;uOeAKP5ZyZtLLU7CjOuFcw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30581&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been discovered in Node.js,  where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30581 https://bugzilla.redhat.com/show_bug.cgi?id=2219824 https://www.cve.org/CVERecord?id=CVE-2023-30581 https://nvd.nist.gov/vuln/detail/CVE-2023-30581 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30581.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uPUYRQErrH0+5XWkYAjsjw==&#34;: {&#xA;      &#34;id&#34;: &#34;uPUYRQErrH0+5XWkYAjsjw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uPUnbuUJlh23l0km8iQ2tA==&#34;: {&#xA;      &#34;id&#34;: &#34;uPUnbuUJlh23l0km8iQ2tA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69649&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. Processing a specially crafted ELF binary file containing malformed header fields with the readelf program can trigger a NULL pointer dereference, causing a crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69649 https://bugzilla.redhat.com/show_bug.cgi?id=2445298 https://www.cve.org/CVERecord?id=CVE-2025-69649 https://nvd.nist.gov/vuln/detail/CVE-2025-69649 https://sourceware.org/bugzilla/show_bug.cgi?id=33697 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=66a3492ce68e1ae45b2489bd9a815c39ea5d7f66 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69649.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uRGTeRjJyz2NEeH/TpkK8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;uRGTeRjJyz2NEeH/TpkK8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4435&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython&#39;s tarfile module. This vulnerability allows unauthorized file extraction via crafted tar archives when TarFile.errorlevel=0, bypassing expected filtering mechanisms.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:59:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4435 https://bugzilla.redhat.com/show_bug.cgi?id=2370010 https://www.cve.org/CVERecord?id=CVE-2025-4435 https://nvd.nist.gov/vuln/detail/CVE-2025-4435 https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4435.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uTyk3o8xjznk0cEQXm/ouw==&#34;: {&#xA;      &#34;id&#34;: &#34;uTyk3o8xjznk0cEQXm/ouw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25547&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-04T21:51:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25547 https://bugzilla.redhat.com/show_bug.cgi?id=2436942 https://www.cve.org/CVERecord?id=CVE-2026-25547 https://nvd.nist.gov/vuln/detail/CVE-2026-25547 https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25547.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uW/TgHSIKlO53BnXG1YZSA==&#34;: {&#xA;      &#34;id&#34;: &#34;uW/TgHSIKlO53BnXG1YZSA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32414&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows out-of-bounds memory access due to incorrect handling of return values in xmlPythonFileRead and xmlPythonFileReadRaw. This is caused by a mismatch between the length of the file in bytes vs the length in characters, as unicode characters can occupy up to 4 bytes per character.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32414 https://bugzilla.redhat.com/show_bug.cgi?id=2358121 https://www.cve.org/CVERecord?id=CVE-2025-32414 https://nvd.nist.gov/vuln/detail/CVE-2025-32414 https://gitlab.gnome.org/GNOME/libxml2/-/issues/889 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32414.json https://access.redhat.com/errata/RHSA-2025:13428&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-12.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uWnN7JCvikoCVXMugnDhoA==&#34;: {&#xA;      &#34;id&#34;: &#34;uWnN7JCvikoCVXMugnDhoA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25749&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, an open source, command line text editor. This heap buffer overflow vulnerability exists in the tag file resolution logic when processing the &#39;helpfile&#39; option. A local user could exploit this by providing a specially crafted &#39;helpfile&#39; option value, leading to a heap buffer overflow. This could result in arbitrary code execution or a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-06T22:43:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25749 https://bugzilla.redhat.com/show_bug.cgi?id=2437843 https://www.cve.org/CVERecord?id=CVE-2026-25749 https://nvd.nist.gov/vuln/detail/CVE-2026-25749 https://github.com/vim/vim/commit/0714b15940b245108e6e9d7aa2260dd849a26fa9 https://github.com/vim/vim/releases/tag/v9.1.2132 https://github.com/vim/vim/security/advisories/GHSA-5w93-4g67-mm43 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25749.json https://access.redhat.com/errata/RHSA-2026:5602&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uWvHibmfs86jbjyb5h+qpg==&#34;: {&#xA;      &#34;id&#34;: &#34;uWvHibmfs86jbjyb5h+qpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25136&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSH server (sshd), which introduced a double-free vulnerability during options.kex_algorithms handling. An unauthenticated attacker can trigger the double-free in the default configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25136 https://bugzilla.redhat.com/show_bug.cgi?id=2167636 https://www.cve.org/CVERecord?id=CVE-2023-25136 https://nvd.nist.gov/vuln/detail/CVE-2023-25136 https://bugzilla.mindrot.org/show_bug.cgi?id=3522 https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946 https://www.openwall.com/lists/oss-security/2023/02/02/2 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25136.json https://access.redhat.com/errata/RHSA-2023:2645&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-29.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;: {&#xA;      &#34;id&#34;: &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5435&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. Specifically, deprecated functions responsible for printing TSIG (Transaction Signature) records fail to properly manage memory buffers. This oversight can lead to an out-of-bounds write when processing specially crafted TSIG records. An attacker could exploit this to cause a denial of service or potentially execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-28T11:58:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5435 https://bugzilla.redhat.com/show_bug.cgi?id=2463465 https://www.cve.org/CVERecord?id=CVE-2026-5435 https://nvd.nist.gov/vuln/detail/CVE-2026-5435 https://inbox.sourceware.org/libc-announce/7a655d55-276f-41fe-b550-feb3ebb2ce91@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=34033 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5435.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uXRgwaipa8s2OMXjAf1Thg==&#34;: {&#xA;      &#34;id&#34;: &#34;uXRgwaipa8s2OMXjAf1Thg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6129&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in in the POLY1305 MAC (message authentication code) implementation in OpenSSL, affecting applications running on PowerPC CPU-based platforms that utilize vector instructions, and has the potential to corrupt the internal state of these applications. If an attacker can manipulate the utilization of the POLY1305 MAC algorithm, it may lead to the corruption of the application state, resulting in various application-dependent consequences, often resulting in a crash and leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6129 https://bugzilla.redhat.com/show_bug.cgi?id=2257571 https://www.cve.org/CVERecord?id=CVE-2023-6129 https://nvd.nist.gov/vuln/detail/CVE-2023-6129 https://www.openssl.org/news/secadv/20240109.txt https://www.openwall.com/lists/oss-security/2024/01/09/1 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6129.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ua1shFLPCkFCKWCRwaqUDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ua1shFLPCkFCKWCRwaqUDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-12084&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in cpython. This vulnerability allows impacted availability via a quadratic algorithm in `xml.dom.minidom` methods, such as `appendChild()`, when building excessively nested documents due to a dependency on `_clear_id_cache()`&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-03T18:55:32Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-12084 https://bugzilla.redhat.com/show_bug.cgi?id=2418655 https://www.cve.org/CVERecord?id=CVE-2025-12084 https://nvd.nist.gov/vuln/detail/CVE-2025-12084 https://github.com/python/cpython/issues/142145 https://github.com/python/cpython/pull/142146 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-12084.json https://access.redhat.com/errata/RHSA-2026:1478&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uaetuJImncB6wudykQLpEA==&#34;: {&#xA;      &#34;id&#34;: &#34;uaetuJImncB6wudykQLpEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1632&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the bsdunzip utility of libarchive. In affected versions, a specially crafted file may trigger a null pointer dereference. This issue can lead to an application crash or other unexpected behavior. This bug does not compromise the integrity or availability of the base system.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-24T13:31:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1632 https://bugzilla.redhat.com/show_bug.cgi?id=2347309 https://www.cve.org/CVERecord?id=CVE-2025-1632 https://nvd.nist.gov/vuln/detail/CVE-2025-1632 https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc https://vuldb.com/?ctiid.296619 https://vuldb.com/?id.296619 https://vuldb.com/?submit.496460 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1632.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ueWEd2PE6kwBx153FL1eIA==&#34;: {&#xA;      &#34;id&#34;: &#34;ueWEd2PE6kwBx153FL1eIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0465&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. OpenSSL and other certificate policy checks silently ignore invalid certificate policies in leaf certificates that are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0465 https://bugzilla.redhat.com/show_bug.cgi?id=2182561 https://www.cve.org/CVERecord?id=CVE-2023-0465 https://nvd.nist.gov/vuln/detail/CVE-2023-0465 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0465.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ug2Mk8LI1eIN0hRNT0s8JQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ug2Mk8LI1eIN0hRNT0s8JQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3599&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds read flaw was found in the writeSingleSection function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-02-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3599 https://bugzilla.redhat.com/show_bug.cgi?id=2142740 https://www.cve.org/CVERecord?id=CVE-2022-3599 https://nvd.nist.gov/vuln/detail/CVE-2022-3599 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3599.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ugAB401UYtKGrqztlPOlZA==&#34;: {&#xA;      &#34;id&#34;: &#34;ugAB401UYtKGrqztlPOlZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25193&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found HarfBuzz. This flaw allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25193 https://bugzilla.redhat.com/show_bug.cgi?id=2167254 https://www.cve.org/CVERecord?id=CVE-2023-25193 https://nvd.nist.gov/vuln/detail/CVE-2023-25193 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25193.json https://access.redhat.com/errata/RHSA-2024:2410&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;harfbuzz&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.7.4-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ugk8bc5JAs//Hgj923HTXA==&#34;: {&#xA;      &#34;id&#34;: &#34;ugk8bc5JAs//Hgj923HTXA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43785&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43785 https://bugzilla.redhat.com/show_bug.cgi?id=2242252 https://www.cve.org/CVERecord?id=CVE-2023-43785 https://nvd.nist.gov/vuln/detail/CVE-2023-43785 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43785.json https://access.redhat.com/errata/RHSA-2024:2145&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uglqkYqbcsDd4SCu9NI2Ww==&#34;: {&#xA;      &#34;id&#34;: &#34;uglqkYqbcsDd4SCu9NI2Ww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25435&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to a heap-based buffer overflow in the extractContigSamplesShifted8bits function in tools/tiffcrop.c, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25435 https://bugzilla.redhat.com/show_bug.cgi?id=2216614 https://www.cve.org/CVERecord?id=CVE-2023-25435 https://nvd.nist.gov/vuln/detail/CVE-2023-25435 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25435.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uhGUZtCY1OXgM1L55/upYA==&#34;: {&#xA;      &#34;id&#34;: &#34;uhGUZtCY1OXgM1L55/upYA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ujzNJ5kQVFINisRmEnkrzA==&#34;: {&#xA;      &#34;id&#34;: &#34;ujzNJ5kQVFINisRmEnkrzA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25629&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25629 https://bugzilla.redhat.com/show_bug.cgi?id=2265713 https://www.cve.org/CVERecord?id=CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629 https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25629.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ul9JS7YMI1n2sVUWOX6Hbw==&#34;: {&#xA;      &#34;id&#34;: &#34;ul9JS7YMI1n2sVUWOX6Hbw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6100&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s decompression modules, including `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile`. This vulnerability, a use-after-free, can occur if a program attempts to re-use a decompression object after a memory allocation error, especially when the system is experiencing high memory usage. Exploitation of this flaw could potentially allow an attacker to execute arbitrary code or access sensitive data. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T17:15:47Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6100 https://bugzilla.redhat.com/show_bug.cgi?id=2457932 https://www.cve.org/CVERecord?id=CVE-2026-6100 https://nvd.nist.gov/vuln/detail/CVE-2026-6100 https://github.com/python/cpython/commit/6a5f79c8d7bbf22b083b240910c7a8781a59437d https://github.com/python/cpython/commit/8fc66aef6d7b3ae58f43f5c66f9366cc8cbbfcd2 https://github.com/python/cpython/commit/c3cf71c3366fe49acb776a639405c0eea6169c20 https://github.com/python/cpython/issues/148395 https://github.com/python/cpython/pull/148396 https://mail.python.org/archives/list/security-announce@python.org/thread/HTWB2Z6KT5QQX4RYEZAFININDHNOSIF3/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6100.json https://access.redhat.com/errata/RHSA-2026:10949&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ulsMCA3bm5VANCxYIf54Zw==&#34;: {&#xA;      &#34;id&#34;: &#34;ulsMCA3bm5VANCxYIf54Zw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35938&#34;,&#xA;      &#34;description&#34;: &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35938 https://bugzilla.redhat.com/show_bug.cgi?id=1964114 https://www.cve.org/CVERecord?id=CVE-2021-35938 https://nvd.nist.gov/vuln/detail/CVE-2021-35938 https://rpm.org/wiki/Releases/4.18.0 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35938.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-rpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;urOIF+inUTTF1gL7DeWkzg==&#34;: {&#xA;      &#34;id&#34;: &#34;urOIF+inUTTF1gL7DeWkzg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28322&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free flaw was found in the Curl package. This issue may lead to unintended information disclosure by the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28322 https://bugzilla.redhat.com/show_bug.cgi?id=2196793 https://www.cve.org/CVERecord?id=CVE-2023-28322 https://nvd.nist.gov/vuln/detail/CVE-2023-28322 https://curl.se/docs/CVE-2023-28322.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28322.json https://access.redhat.com/errata/RHSA-2023:4354&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-23.el9_2.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;: {&#xA;      &#34;id&#34;: &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libblkid&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uvaZxZFE7cKBjyjVQ/t6lg==&#34;: {&#xA;      &#34;id&#34;: &#34;uvaZxZFE7cKBjyjVQ/t6lg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38545&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \&#34;let the host resolve the name\&#34; could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38545 https://bugzilla.redhat.com/show_bug.cgi?id=2241933 https://www.cve.org/CVERecord?id=CVE-2023-38545 https://nvd.nist.gov/vuln/detail/CVE-2023-38545 https://curl.se/docs/CVE-2023-38545.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38545.json https://access.redhat.com/errata/RHSA-2023:6745&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;v+VZolEvt4HU4yiZTpFx+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;v+VZolEvt4HU4yiZTpFx+Q==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2024-2687&#34;,&#xA;      &#34;description&#34;: &#34;HTTP/2 CONTINUATION flood in net/http&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T21:12:01Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/65051 https://go.dev/cl/576155 https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.21.9&#34;&#xA;    },&#xA;    &#34;v+qPraJNH1peMhjiTk1OgA==&#34;: {&#xA;      &#34;id&#34;: &#34;v+qPraJNH1peMhjiTk1OgA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-55549&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxslt. This vulnerability allows an attacker to trigger a use-after-free issue by excluding result prefixes.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-55549 https://bugzilla.redhat.com/show_bug.cgi?id=2352484 https://www.cve.org/CVERecord?id=CVE-2024-55549 https://nvd.nist.gov/vuln/detail/CVE-2024-55549 https://gitlab.gnome.org/GNOME/libxslt/-/issues/127 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-55549.json https://access.redhat.com/errata/RHSA-2025:4025&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxslt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.1.34-9.el9_5.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;v/fIHXRO37U49Wniv4Yhsg==&#34;: {&#xA;      &#34;id&#34;: &#34;v/fIHXRO37U49Wniv4Yhsg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8176&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-13T13:51:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-8176 https://bugzilla.redhat.com/show_bug.cgi?id=2310137 https://www.cve.org/CVERecord?id=CVE-2024-8176 https://nvd.nist.gov/vuln/detail/CVE-2024-8176 https://github.com/libexpat/libexpat/issues/893 https://github.com/libexpat/libexpat/pull/973 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8176.json https://access.redhat.com/errata/RHSA-2025:7444&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-5.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;v5GtOUp47xYv9Rr0sFi4PQ==&#34;: {&#xA;      &#34;id&#34;: &#34;v5GtOUp47xYv9Rr0sFi4PQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12797&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL&#39;s RFC7250 Raw Public Key (RPK) authentication. This vulnerability allows man-in-the-middle (MITM) attacks via failure to abort TLS/DTLS handshakes when the server&#39;s RPK does not match the expected key despite the SSL_VERIFY_PEER verification mode being set.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-11T15:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12797 https://bugzilla.redhat.com/show_bug.cgi?id=2342757 https://www.cve.org/CVERecord?id=CVE-2024-12797 https://nvd.nist.gov/vuln/detail/CVE-2024-12797 https://openssl-library.org/news/secadv/20250211.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12797.json https://access.redhat.com/errata/RHSA-2025:1330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;v6t7qJCF3xL8IO0nPwJX1g==&#34;: {&#xA;      &#34;id&#34;: &#34;v6t7qJCF3xL8IO0nPwJX1g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-24537&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-24537 https://bugzilla.redhat.com/show_bug.cgi?id=2184484 https://www.cve.org/CVERecord?id=CVE-2023-24537 https://nvd.nist.gov/vuln/detail/CVE-2023-24537 https://github.com/golang/go/issues/59180 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24537.json https://access.redhat.com/errata/RHSA-2023:3318&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.9-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;v9nWDWoVTUzEu77hVCL+xw==&#34;: {&#xA;      &#34;id&#34;: &#34;v9nWDWoVTUzEu77hVCL+xw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;v9qMLnWqPbLz+WC1hPhb9g==&#34;: {&#xA;      &#34;id&#34;: &#34;v9qMLnWqPbLz+WC1hPhb9g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64506&#34;,&#xA;      &#34;description&#34;: &#34;A buffer over read flaw has been discovered in libpng. A heap buffer over-read vulnerability exists in libpng&#39;s png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:41:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64506 https://bugzilla.redhat.com/show_bug.cgi?id=2416906 https://www.cve.org/CVERecord?id=CVE-2025-64506 https://nvd.nist.gov/vuln/detail/CVE-2025-64506 https://github.com/pnggroup/libpng/commit/2bd84c019c300b78e811743fbcddb67c9d9bf821 https://github.com/pnggroup/libpng/pull/749 https://github.com/pnggroup/libpng/security/advisories/GHSA-qpr4-xm66-hww6 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64506.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vA4lSE/GSHGX0yBPiE7RSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vA4lSE/GSHGX0yBPiE7RSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vAAzy4RBfYsNO+V3LlPJ7A==&#34;: {&#xA;      &#34;id&#34;: &#34;vAAzy4RBfYsNO+V3LlPJ7A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7006&#34;,&#xA;      &#34;description&#34;: &#34;A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7006 https://bugzilla.redhat.com/show_bug.cgi?id=2302996 https://www.cve.org/CVERecord?id=CVE-2024-7006 https://nvd.nist.gov/vuln/detail/CVE-2024-7006 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7006.json https://access.redhat.com/errata/RHSA-2024:8914&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-12.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vBXrhxnu9HxQSmN5xWhZaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vBXrhxnu9HxQSmN5xWhZaQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23166&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, specifically in the C++ method SignTraits::DeriveBits(). This vulnerability can allow a remote attacker to crash the Node.js runtime via untrusted input, triggering an exception in a background thread.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23166 https://bugzilla.redhat.com/show_bug.cgi?id=2367163 https://www.cve.org/CVERecord?id=CVE-2025-23166 https://nvd.nist.gov/vuln/detail/CVE-2025-23166 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23166.json https://access.redhat.com/errata/RHSA-2025:8468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.19.2-1.module+el9.6.0+23146+be9976bd&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vHIEJpBGkCNiUPmahPyLqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vHIEJpBGkCNiUPmahPyLqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the `assert()` function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T13:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-0395 https://bugzilla.redhat.com/show_bug.cgi?id=2339460 https://www.cve.org/CVERecord?id=CVE-2025-0395 https://nvd.nist.gov/vuln/detail/CVE-2025-0395 https://sourceware.org/bugzilla/show_bug.cgi?id=32582 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-0395.json https://access.redhat.com/errata/RHSA-2025:4244&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-125.el9_5.8&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vJceii8mKrpQPBtlAKleGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vJceii8mKrpQPBtlAKleGQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-34969&#34;,&#xA;      &#34;description&#34;: &#34;An assertion failure vulnerability was found in D-Bus. This issue occurs when a privileged monitoring connection (dbus-monitor, busctl monitor, gdbus monitor, or similar) is active, and a message from the bus driver cannot be delivered to a client connection due to \u003cdeny\u003e rules or outgoing message quota. If a privileged user with control over the dbus-daemon is monitoring the message bus traffic using the Monitoring clients like the dbus-monitor or busctl monitor interfaces, then an unprivileged local user with the ability to connect to the same dbus-daemon could send specially crafted request, causing a dbus-daemon to crash, resulting in a denial of service under some circumstances.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-34969 https://bugzilla.redhat.com/show_bug.cgi?id=2213166 https://www.cve.org/CVERecord?id=CVE-2023-34969 https://nvd.nist.gov/vuln/detail/CVE-2023-34969 https://gitlab.freedesktop.org/dbus/dbus/-/issues/457 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-34969.json https://access.redhat.com/errata/RHSA-2023:4569&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:1.12.20-7.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vLDNpmPSXi+t8ebIQHILIw==&#34;: {&#xA;      &#34;id&#34;: &#34;vLDNpmPSXi+t8ebIQHILIw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://www.cve.org/CVERecord?id=CVE-2023-4806 https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4806.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vLLr24Ej4L78gTG08XYkRg==&#34;: {&#xA;      &#34;id&#34;: &#34;vLLr24Ej4L78gTG08XYkRg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2975&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries, which are unauthenticated as a consequence. Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be misled by removing, adding, or reordering such empty entries as these are ignored by the OpenSSL implementation. The AES-SIV algorithm allows for the authentication of multiple associated data entries and encryption. To authenticate empty data, the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with a NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL returns success for such a call instead of performing the associated data authentication operation. Thus, the empty data will not be authenticated.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2975 https://bugzilla.redhat.com/show_bug.cgi?id=2223016 https://www.cve.org/CVERecord?id=CVE-2023-2975 https://nvd.nist.gov/vuln/detail/CVE-2023-2975 https://www.openssl.org/news/secadv/20230714.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2975.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vLgELeoIueNM9KX5ZIMtjg==&#34;: {&#xA;      &#34;id&#34;: &#34;vLgELeoIueNM9KX5ZIMtjg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35937&#34;,&#xA;      &#34;description&#34;: &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35937 https://bugzilla.redhat.com/show_bug.cgi?id=1964125 https://www.cve.org/CVERecord?id=CVE-2021-35937 https://nvd.nist.gov/vuln/detail/CVE-2021-35937 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35937.json https://access.redhat.com/errata/RHSA-2024:0463&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-rpm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.1.3-27.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vM/BpQVYTLnKgFVNAeaxvA==&#34;: {&#xA;      &#34;id&#34;: &#34;vM/BpQVYTLnKgFVNAeaxvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4786&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python webbrowser.open() API. If a specially crafted URL containing \&#34;%action\&#34; is processed, an attacker could bypass a previous mitigation for CVE-2026-4519. This bypass allows for command injection into the underlying shell, potentially leading to arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T21:52:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4786 https://bugzilla.redhat.com/show_bug.cgi?id=2458049 https://www.cve.org/CVERecord?id=CVE-2026-4786 https://nvd.nist.gov/vuln/detail/CVE-2026-4786 https://github.com/python/cpython/issues/148169 https://github.com/python/cpython/pull/148170 https://mail.python.org/archives/list/security-announce@python.org/thread/JQDUNJVB4AQNTJECSUKOBDU3XCJIPSE5/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4786.json https://access.redhat.com/errata/RHSA-2026:10949&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vPDXRcEg4abq9PCqTBFkAg==&#34;: {&#xA;      &#34;id&#34;: &#34;vPDXRcEg4abq9PCqTBFkAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25652&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This security flaw occurs when feeding specially crafted input to `git apply --reject`; a path outside the working tree can be overwritten with partially controlled contents corresponding to the rejected hunk(s) from the given patch.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25652 https://bugzilla.redhat.com/show_bug.cgi?id=2188333 https://www.cve.org/CVERecord?id=CVE-2023-25652 https://nvd.nist.gov/vuln/detail/CVE-2023-25652 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25652.json https://access.redhat.com/errata/RHSA-2023:3245&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.3-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vQedZoMzqBElfCAKIwQo5w==&#34;: {&#xA;      &#34;id&#34;: &#34;vQedZoMzqBElfCAKIwQo5w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32006&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32006 https://bugzilla.redhat.com/show_bug.cgi?id=2230955 https://www.cve.org/CVERecord?id=CVE-2023-32006 https://nvd.nist.gov/vuln/detail/CVE-2023-32006 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32006.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vSLFgRYoehmDve19rxyjcw==&#34;: {&#xA;      &#34;id&#34;: &#34;vSLFgRYoehmDve19rxyjcw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in zlib. An attacker providing specially crafted input to the `crc32_combine64` or `crc32_combine_gen64` functions could trigger an infinite loop within the `x2nmodp` function. This leads to excessive CPU consumption, which can result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-18T02:36:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27171 https://bugzilla.redhat.com/show_bug.cgi?id=2440530 https://www.cve.org/CVERecord?id=CVE-2026-27171 https://nvd.nist.gov/vuln/detail/CVE-2026-27171 https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/ https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf https://github.com/madler/zlib/issues/904 https://github.com/madler/zlib/releases/tag/v1.3.2 https://ostif.org/zlib-audit-complete/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27171.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rsync&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vTajNh0ysqaO8NuTMU//uw==&#34;: {&#xA;      &#34;id&#34;: &#34;vTajNh0ysqaO8NuTMU//uw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2845&#34;,&#xA;      &#34;description&#34;: &#34;Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2845 https://bugzilla.redhat.com/show_bug.cgi?id=2119844 https://www.cve.org/CVERecord?id=CVE-2022-2845 https://nvd.nist.gov/vuln/detail/CVE-2022-2845 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2845.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vWwpCPVTGndMb9IraxXgGg==&#34;: {&#xA;      &#34;id&#34;: &#34;vWwpCPVTGndMb9IraxXgGg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-6228&#34;,&#xA;      &#34;description&#34;: &#34;An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-6228 https://bugzilla.redhat.com/show_bug.cgi?id=2240995 https://www.cve.org/CVERecord?id=CVE-2023-6228 https://nvd.nist.gov/vuln/detail/CVE-2023-6228 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6228.json https://access.redhat.com/errata/RHSA-2024:2289&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-12.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vY8p4yRfnET5EfrovUfwkQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vY8p4yRfnET5EfrovUfwkQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32988&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure.\n\nThis vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-10T07:55:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32988 https://bugzilla.redhat.com/show_bug.cgi?id=2359622 https://www.cve.org/CVERecord?id=CVE-2025-32988 https://nvd.nist.gov/vuln/detail/CVE-2025-32988 https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32988.json https://access.redhat.com/errata/RHSA-2025:16116&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-6.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vZIHu7rsNO8R8If5mjyTiw==&#34;: {&#xA;      &#34;id&#34;: &#34;vZIHu7rsNO8R8If5mjyTiw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69644&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils. A local attacker can exploit a logic flaw in the handling of DWARF (Debugging With Attributed Record Formats) location list headers within the objdump utility. By supplying a crafted binary with malformed debug information, the attacker can cause objdump to enter an unbounded loop, leading to excessive resource consumption and a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69644 https://bugzilla.redhat.com/show_bug.cgi?id=2445263 https://www.cve.org/CVERecord?id=CVE-2025-69644 https://nvd.nist.gov/vuln/detail/CVE-2025-69644 https://sourceware.org/bugzilla/show_bug.cgi?id=33639 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=455446bbdc8675f34808187de2bbad4682016ff7 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69644.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vZf5q9QE5SuB3bMw/VXbtQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vZf5q9QE5SuB3bMw/VXbtQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23085&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23085 https://bugzilla.redhat.com/show_bug.cgi?id=2342618 https://www.cve.org/CVERecord?id=CVE-2025-23085 https://nvd.nist.gov/vuln/detail/CVE-2025-23085 https://nodejs.org/pt/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23085.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.13.1-1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vZzq+XzhXQpcGK6x6C81SQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vZzq+XzhXQpcGK6x6C81SQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-23918&#34;,&#xA;      &#34;description&#34;: &#34;A privilege escalation vulnerability exists in Node.js \u003c19.6.1, \u003c18.14.1, \u003c16.19.1 and \u003c14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-23918 https://bugzilla.redhat.com/show_bug.cgi?id=2171935 https://www.cve.org/CVERecord?id=CVE-2023-23918 https://nvd.nist.gov/vuln/detail/CVE-2023-23918 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-23918.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vagSYtfX2ayPhseLZe8kAA==&#34;: {&#xA;      &#34;id&#34;: &#34;vagSYtfX2ayPhseLZe8kAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46809&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The privateDecrypt() API of the crypto library may allow a covert timing side-channel during PKCS#1 v1.5 padding error handling. This issue revealed significant timing differences in decryption for valid and invalid ciphertexts, which may allow a remote attacker to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing JSON Web Encryption messages.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46809 https://bugzilla.redhat.com/show_bug.cgi?id=2264569 https://www.cve.org/CVERecord?id=CVE-2023-46809 https://nvd.nist.gov/vuln/detail/CVE-2023-46809 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46809.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.11.1-1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vayO6Zpv5fCNARnrSOYfGg==&#34;: {&#xA;      &#34;id&#34;: &#34;vayO6Zpv5fCNARnrSOYfGg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6021&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2&#39;s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6021 https://bugzilla.redhat.com/show_bug.cgi?id=2372406 https://www.cve.org/CVERecord?id=CVE-2025-6021 https://nvd.nist.gov/vuln/detail/CVE-2025-6021 https://gitlab.gnome.org/GNOME/libxml2/-/issues/926 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6021.json https://access.redhat.com/errata/RHSA-2025:10699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vb7DdaxZjPV5NEcCqN9EkQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vb7DdaxZjPV5NEcCqN9EkQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-File-stat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.09-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vbUGycVGGL83rd1I5CfHuQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vbUGycVGGL83rd1I5CfHuQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-49043&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2 where improper handling of memory allocation failures in `libxml2` can lead to crashes, memory leaks, or inconsistent states. While an attacker cannot directly control allocation failures, they may trigger denial-of-service conditions under extreme system stress.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-49043 https://bugzilla.redhat.com/show_bug.cgi?id=2342118 https://www.cve.org/CVERecord?id=CVE-2022-49043 https://nvd.nist.gov/vuln/detail/CVE-2022-49043 https://github.com/php/php-src/issues/17467 https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-49043.json https://access.redhat.com/errata/RHSA-2025:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vc3i6DfzTVpLFX6x0zKE4A==&#34;: {&#xA;      &#34;id&#34;: &#34;vc3i6DfzTVpLFX6x0zKE4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3138&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3138 https://bugzilla.redhat.com/show_bug.cgi?id=2213748 https://www.cve.org/CVERecord?id=CVE-2023-3138 https://nvd.nist.gov/vuln/detail/CVE-2023-3138 https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/304a654a0d57bf0f00d8998185f0360332cfa36c https://lists.x.org/archives/xorg-announce/2023-June/003406.html https://lists.x.org/archives/xorg-announce/2023-June/003407.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3138.json https://access.redhat.com/errata/RHSA-2023:6497&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-8.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vdokiHWKHEv0aYbydeDs5Q==&#34;: {&#xA;      &#34;id&#34;: &#34;vdokiHWKHEv0aYbydeDs5Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43785&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43785 https://bugzilla.redhat.com/show_bug.cgi?id=2242252 https://www.cve.org/CVERecord?id=CVE-2023-43785 https://nvd.nist.gov/vuln/detail/CVE-2023-43785 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43785.json https://access.redhat.com/errata/RHSA-2024:2145&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11-xcb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ve8kNOScD+vxLjbMehgbRA==&#34;: {&#xA;      &#34;id&#34;: &#34;ve8kNOScD+vxLjbMehgbRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32002&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32002 https://bugzilla.redhat.com/show_bug.cgi?id=2230948 https://www.cve.org/CVERecord?id=CVE-2023-32002 https://nvd.nist.gov/vuln/detail/CVE-2023-32002 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32002.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:8.19.4-1.16.20.2.1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vekzBecfH1YN/Zd4MHsZmA==&#34;: {&#xA;      &#34;id&#34;: &#34;vekzBecfH1YN/Zd4MHsZmA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30630&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in dmidecode, which allows -dump-bin to overwrite a local file. This issue may lead to the execution of dmidecode via Sudo.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30630 https://bugzilla.redhat.com/show_bug.cgi?id=2186669 https://www.cve.org/CVERecord?id=CVE-2023-30630 https://nvd.nist.gov/vuln/detail/CVE-2023-30630 https://github.com/adamreiser/dmiwrite https://github.com/advisories/GHSA-9r2p-xmm5-5ppg https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30630.json https://access.redhat.com/errata/RHSA-2023:5061&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dmidecode&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.3-7.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ves1GfNCYjdCXJceNwT2Lw==&#34;: {&#xA;      &#34;id&#34;: &#34;ves1GfNCYjdCXJceNwT2Lw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39326&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Golang net/http/internal package. This issue may allow a malicious user to send an HTTP request and cause the receiver to read more bytes from network than are in the body (up to 1GiB), causing the receiver to fail reading the response, possibly leading to a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39326 https://bugzilla.redhat.com/show_bug.cgi?id=2253330 https://www.cve.org/CVERecord?id=CVE-2023-39326 https://nvd.nist.gov/vuln/detail/CVE-2023-39326 https://pkg.go.dev/vuln/GO-2023-2382 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39326.json https://access.redhat.com/errata/RHSA-2024:1131&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vfap0EiPsFnTW4GzZ53hcA==&#34;: {&#xA;      &#34;id&#34;: &#34;vfap0EiPsFnTW4GzZ53hcA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27144&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the cmd/compile package in the Go standard library. A no-op interface conversion prevented the compiler from correctly identifying non-overlapping memory moves. As a result, the compiler allows unsafe memory move operations to occur at runtime, potentially causing data corruption, memory corruption or unexpected application behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-08T01:06:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27144 https://bugzilla.redhat.com/show_bug.cgi?id=2456340 https://www.cve.org/CVERecord?id=CVE-2026-27144 https://nvd.nist.gov/vuln/detail/CVE-2026-27144 https://go.dev/cl/763764 https://go.dev/issue/78371 https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU https://pkg.go.dev/vuln/GO-2026-4867 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27144.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vgP3FAR9tXjiqUc0mFlRrg==&#34;: {&#xA;      &#34;id&#34;: &#34;vgP3FAR9tXjiqUc0mFlRrg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Symbol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.08-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vhM+rFefbZb+2rYFLcy2+w==&#34;: {&#xA;      &#34;id&#34;: &#34;vhM+rFefbZb+2rYFLcy2+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;viJWUTYaczSUI8knrOEDyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;viJWUTYaczSUI8knrOEDyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3277&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in SQLite’s `concat_ws()` function, where an integer overflow can be triggered. The resulting truncated integer can allocate a buffer. When SQLite writes the resulting string to the buffer, it uses the original, untruncated size, and a wild heap buffer overflow size of around 4GB can occur. This issue can result in arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-14T16:50:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3277 https://bugzilla.redhat.com/show_bug.cgi?id=2359553 https://www.cve.org/CVERecord?id=CVE-2025-3277 https://nvd.nist.gov/vuln/detail/CVE-2025-3277 https://sqlite.org/src/info/498e3f1cf57f164f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3277.json https://access.redhat.com/errata/RHSA-2025:7433&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.15.0-1.module+el9.6.0+23062+9e7801b9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vkypiN/HZjIiT/S9k2qxvA==&#34;: {&#xA;      &#34;id&#34;: &#34;vkypiN/HZjIiT/S9k2qxvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35385&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. When the `scp` command is used by a root user to download a file with the legacy protocol option (`-O`) and without preserving original file permissions (`-p`), the downloaded file can be installed with elevated privileges (setuid or setgid). This unexpected behavior could allow a malicious file to execute with higher permissions than intended, posing a security risk through potential privilege escalation.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:30:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35385 https://bugzilla.redhat.com/show_bug.cgi?id=2454469 https://www.cve.org/CVERecord?id=CVE-2026-35385 https://nvd.nist.gov/vuln/detail/CVE-2026-35385 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35385.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vljECkHLXvnkFYEiPVK0gQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vljECkHLXvnkFYEiPVK0gQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33845&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read. This issue is remotely exploitable and may cause information disclosure or denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-30T17:28:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33845 https://bugzilla.redhat.com/show_bug.cgi?id=2450624 https://www.cve.org/CVERecord?id=CVE-2026-33845 https://nvd.nist.gov/vuln/detail/CVE-2026-33845 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33845.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vn/18J5TIuzcd8MxdMgYlw==&#34;: {&#xA;      &#34;id&#34;: &#34;vn/18J5TIuzcd8MxdMgYlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45285&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Golang package cmd/go. This issue permits the fallback to insecure \&#34;git://\&#34; if trying to fetch a .git module that has no \&#34;https://\&#34; or \&#34;git+ssh://\&#34; available.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45285 https://bugzilla.redhat.com/show_bug.cgi?id=2253323 https://www.cve.org/CVERecord?id=CVE-2023-45285 https://nvd.nist.gov/vuln/detail/CVE-2023-45285 https://pkg.go.dev/vuln/GO-2023-2383 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45285.json https://access.redhat.com/errata/RHSA-2024:1131&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vnBlYA/0lXrfCSSYxgwhSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vnBlYA/0lXrfCSSYxgwhSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-35065&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-35065 https://bugzilla.redhat.com/show_bug.cgi?id=2156324 https://www.cve.org/CVERecord?id=CVE-2021-35065 https://nvd.nist.gov/vuln/detail/CVE-2021-35065 https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-35065.json https://access.redhat.com/errata/RHSA-2023:2654&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.14.2-2.module+el9.2.0.z+18497+a402347c&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vnI8VBZMnSK/Spr6qFIUOA==&#34;: {&#xA;      &#34;id&#34;: &#34;vnI8VBZMnSK/Spr6qFIUOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4873&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. A remote attacker could exploit this by initiating an unencrypted connection (via IMAP, SMTP, or POP3) and then making a subsequent request to the same host that requires Transport Layer Security (TLS). Due to incorrect connection reuse, the subsequent request would bypass the TLS requirement, leading to the transmission of sensitive information in cleartext. This vulnerability, categorized as Cleartext Transmission of Sensitive Information (CWE-319), results in information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4873 https://bugzilla.redhat.com/show_bug.cgi?id=2461200 https://www.cve.org/CVERecord?id=CVE-2026-4873 https://nvd.nist.gov/vuln/detail/CVE-2026-4873 https://curl.se/docs/CVE-2026-4873.html https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4873.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vnQE6sVVricZrrWA9Xv5RQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vnQE6sVVricZrrWA9Xv5RQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-48384&#34;,&#xA;      &#34;description&#34;: &#34;A line-end handling flaw was found in Git. When writing a config entry, values with a trailing carriage return (CR) are not quoted, resulting in the CR being lost when the config is read later. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read, resulting in the submodule being checked out to an incorrect location.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-08T18:23:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-48384 https://bugzilla.redhat.com/show_bug.cgi?id=2378806 https://www.cve.org/CVERecord?id=CVE-2025-48384 https://nvd.nist.gov/vuln/detail/CVE-2025-48384 https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384 https://github.com/git/git/commit/05e9cd64ee23bbadcea6bcffd6660ed02b8eab89 https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9 https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-48384.json https://access.redhat.com/errata/RHSA-2025:11462&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-Git&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.47.3-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vpkqaxRDIkUCRIT3f2sk6Q==&#34;: {&#xA;      &#34;id&#34;: &#34;vpkqaxRDIkUCRIT3f2sk6Q==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2024-2598&#34;,&#xA;      &#34;description&#34;: &#34;Verify panics on certificates with an unknown public key algorithm in crypto/x509&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T22:14:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/65390 https://go.dev/cl/569339 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.21.8&#34;&#xA;    },&#xA;    &#34;vrR+k40GTfXC5FT0h86jIA==&#34;: {&#xA;      &#34;id&#34;: &#34;vrR+k40GTfXC5FT0h86jIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15366&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the imaplib module in the Python standard library. The imaplib module does not reject control characters, such as newlines, in user-controlled input passed to IMAP commands. This issue allows an attacker to inject additional commands to be executed in the IMAP server.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:40:24Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15366 https://bugzilla.redhat.com/show_bug.cgi?id=2431368 https://www.cve.org/CVERecord?id=CVE-2025-15366 https://nvd.nist.gov/vuln/detail/CVE-2025-15366 https://github.com/python/cpython/issues/143921 https://github.com/python/cpython/pull/143922 https://mail.python.org/archives/list/security-announce@python.org/thread/DD7C7JZJYTBXMDOWKCEIEBJLBRU64OMR/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15366.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;: {&#xA;      &#34;id&#34;: &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vu4nws6mMs6GJYT1BNu9DQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vu4nws6mMs6GJYT1BNu9DQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc&#39;s iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=2273404 https://www.cve.org/CVERecord?id=CVE-2024-2961 https://nvd.nist.gov/vuln/detail/CVE-2024-2961 https://www.openwall.com/lists/oss-security/2024/04/17/9 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2961.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vwUe6Dpe5Fb7V8GdyGEhjA==&#34;: {&#xA;      &#34;id&#34;: &#34;vwUe6Dpe5Fb7V8GdyGEhjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vwdkC2aeXSkn642Di7lXbw==&#34;: {&#xA;      &#34;id&#34;: &#34;vwdkC2aeXSkn642Di7lXbw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39615&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Libxml2, where it contains a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a denial of service (DoS) by supplying a crafted XML file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39615 https://bugzilla.redhat.com/show_bug.cgi?id=2235864 https://www.cve.org/CVERecord?id=CVE-2023-39615 https://nvd.nist.gov/vuln/detail/CVE-2023-39615 https://gitlab.gnome.org/GNOME/libxml2/-/issues/535 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39615.json https://access.redhat.com/errata/RHSA-2023:7747&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-5.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vy6yzxdusLc9vaaiu2HI2w==&#34;: {&#xA;      &#34;id&#34;: &#34;vy6yzxdusLc9vaaiu2HI2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7104&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in SQLite3. This issue affects the sessionReadRecord function of the ext/session/sqlite3session.c function in the make alltest Handler component. Manipulation may cause a heap-based buffer overflow to occur.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-7104 https://bugzilla.redhat.com/show_bug.cgi?id=2256194 https://www.cve.org/CVERecord?id=CVE-2023-7104 https://nvd.nist.gov/vuln/detail/CVE-2023-7104 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-7104.json https://access.redhat.com/errata/RHSA-2024:0465&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-7.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vyA1wlYQO8dho14dAhrP+g==&#34;: {&#xA;      &#34;id&#34;: &#34;vyA1wlYQO8dho14dAhrP+g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6176&#34;,&#xA;      &#34;description&#34;: &#34;Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-31T00:00:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6176 https://bugzilla.redhat.com/show_bug.cgi?id=2408762 https://www.cve.org/CVERecord?id=CVE-2025-6176 https://nvd.nist.gov/vuln/detail/CVE-2025-6176 https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6176.json https://access.redhat.com/errata/RHSA-2026:2042&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;brotli-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.0.9-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vz18/+7m2wxxY2NMQUQ6Yg==&#34;: {&#xA;      &#34;id&#34;: &#34;vz18/+7m2wxxY2NMQUQ6Yg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3597&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3597 https://bugzilla.redhat.com/show_bug.cgi?id=2142736 https://www.cve.org/CVERecord?id=CVE-2022-3597 https://nvd.nist.gov/vuln/detail/CVE-2022-3597 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3597.json https://access.redhat.com/errata/RHSA-2023:2340&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-7.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;w/NMuS0o9hChTkNvZhIOtg==&#34;: {&#xA;      &#34;id&#34;: &#34;w/NMuS0o9hChTkNvZhIOtg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38552&#34;,&#xA;      &#34;description&#34;: &#34;When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to node&#39;s policy implementation, thus effectively disabling the integrity check.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38552 https://bugzilla.redhat.com/show_bug.cgi?id=2244415 https://www.cve.org/CVERecord?id=CVE-2023-38552 https://nvd.nist.gov/vuln/detail/CVE-2023-38552 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38552.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;w/qPRfgu7T1MbY4EuhkWZw==&#34;: {&#xA;      &#34;id&#34;: &#34;w/qPRfgu7T1MbY4EuhkWZw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0531&#34;,&#xA;      &#34;description&#34;: &#34;Session tickets lack random ticket_age_add in crypto/tls&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-28T17:24:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/405994 https://go.googlesource.com/go/+/fe4de36198794c447fbd9d7cc2d7199a506c76a5 https://go.dev/issue/52814 https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3&#34;&#xA;    },&#xA;    &#34;w1094TrprBpG+5TZJus6FA==&#34;: {&#xA;      &#34;id&#34;: &#34;w1094TrprBpG+5TZJus6FA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-1674&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference flaw was found in vim&#39;s vim_regexec_string() function in regexp.c file. The issue occurs when the function tries to match the buffer with an invalid pattern. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL pointer dereference that causes an application to crash, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-05-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-1674 https://bugzilla.redhat.com/show_bug.cgi?id=2085393 https://www.cve.org/CVERecord?id=CVE-2022-1674 https://nvd.nist.gov/vuln/detail/CVE-2022-1674 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1674.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;w8af/LTYrBLWhYkZBSi2Lg==&#34;: {&#xA;      &#34;id&#34;: &#34;w8af/LTYrBLWhYkZBSi2Lg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4141&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow vulnerability was found in Vim due to invalid memory access. This issue could allow an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4141 https://bugzilla.redhat.com/show_bug.cgi?id=2148991 https://www.cve.org/CVERecord?id=CVE-2022-4141 https://nvd.nist.gov/vuln/detail/CVE-2022-4141 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4141.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;w8vuCHS+4au/MfXahCBARA==&#34;: {&#xA;      &#34;id&#34;: &#34;w8vuCHS+4au/MfXahCBARA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;w93rRV74Y3Xaae9j4uy2iQ==&#34;: {&#xA;      &#34;id&#34;: &#34;w93rRV74Y3Xaae9j4uy2iQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0801&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds write in the _TIFFmemcpy function in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c, resulting in a Denial of Service and limited data modification.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0801 https://bugzilla.redhat.com/show_bug.cgi?id=2170172 https://www.cve.org/CVERecord?id=CVE-2023-0801 https://nvd.nist.gov/vuln/detail/CVE-2023-0801 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0801.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wBC264S906jsJ9EHip/24A==&#34;: {&#xA;      &#34;id&#34;: &#34;wBC264S906jsJ9EHip/24A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wCSSFNSA2T9dnpBY58W6Yg==&#34;: {&#xA;      &#34;id&#34;: &#34;wCSSFNSA2T9dnpBY58W6Yg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4802 https://bugzilla.redhat.com/show_bug.cgi?id=2367468 https://www.cve.org/CVERecord?id=CVE-2025-4802 https://nvd.nist.gov/vuln/detail/CVE-2025-4802 https://inbox.sourceware.org/libc-announce/3ac997b0-28a5-4129-af53-675efe4c2dec@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=32976 https://www.openwall.com/lists/oss-security/2025/05/16/7 https://www.openwall.com/lists/oss-security/2025/05/17/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4802.json https://access.redhat.com/errata/RHSA-2025:8655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.19&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wCl622H8UElXM4AFHot1bA==&#34;: {&#xA;      &#34;id&#34;: &#34;wCl622H8UElXM4AFHot1bA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-46218&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl that verifies a given cookie domain against the Public Suffix List. This issue could allow a malicious HTTP server to set \&#34;super cookies\&#34; in curl that are passed back to more origins than what is otherwise allowed or possible.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-06T07:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-46218 https://bugzilla.redhat.com/show_bug.cgi?id=2252030 https://www.cve.org/CVERecord?id=CVE-2023-46218 https://nvd.nist.gov/vuln/detail/CVE-2023-46218 https://curl.se/docs/CVE-2023-46218.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46218.json https://access.redhat.com/errata/RHSA-2024:1129&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wEVnFZ6M5zpBHSw+nqU0rg==&#34;: {&#xA;      &#34;id&#34;: &#34;wEVnFZ6M5zpBHSw+nqU0rg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3618&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3618 https://bugzilla.redhat.com/show_bug.cgi?id=2215865 https://www.cve.org/CVERecord?id=CVE-2023-3618 https://nvd.nist.gov/vuln/detail/CVE-2023-3618 https://gitlab.com/libtiff/libtiff/-/issues/529 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3618.json https://access.redhat.com/errata/RHSA-2024:2289&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-12.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wEZLQNUZyYD6Rz0ucz5fzQ==&#34;: {&#xA;      &#34;id&#34;: &#34;wEZLQNUZyYD6Rz0ucz5fzQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-lib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:0.65-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wG1iwTc5HBr1VKWUstaeHw==&#34;: {&#xA;      &#34;id&#34;: &#34;wG1iwTc5HBr1VKWUstaeHw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5678&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL, which caused the generation or checking of long X9.42 DH keys or parameters to be much slower than expected. This issue could lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5678 https://bugzilla.redhat.com/show_bug.cgi?id=2248616 https://www.cve.org/CVERecord?id=CVE-2023-5678 https://nvd.nist.gov/vuln/detail/CVE-2023-5678 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6 https://www.openssl.org/news/secadv/20231106.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5678.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wL88v46Y3XlOQ8xtlmBugA==&#34;: {&#xA;      &#34;id&#34;: &#34;wL88v46Y3XlOQ8xtlmBugA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28834&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-28834 https://bugzilla.redhat.com/show_bug.cgi?id=2269228 https://www.cve.org/CVERecord?id=CVE-2024-28834 https://nvd.nist.gov/vuln/detail/CVE-2024-28834 https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html https://minerva.crocs.fi.muni.cz/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-28834.json https://access.redhat.com/errata/RHSA-2024:1879&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.7.6-23.el9_3.4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wMpTUDltgKPDv4b44/0Spg==&#34;: {&#xA;      &#34;id&#34;: &#34;wMpTUDltgKPDv4b44/0Spg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-03T17:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4911 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://www.cve.org/CVERecord?id=CVE-2023-4911 https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4911.json https://access.redhat.com/errata/RHSA-2023:5453&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-60.el9_2.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wN+C2Zg1myHVbcMR/36bqA==&#34;: {&#xA;      &#34;id&#34;: &#34;wN+C2Zg1myHVbcMR/36bqA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30588&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30588 https://bugzilla.redhat.com/show_bug.cgi?id=2219838 https://www.cve.org/CVERecord?id=CVE-2023-30588 https://nvd.nist.gov/vuln/detail/CVE-2023-30588 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30588.json https://access.redhat.com/errata/RHSA-2023:4331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wO2dcFx5JhDjz2K4QDYydw==&#34;: {&#xA;      &#34;id&#34;: &#34;wO2dcFx5JhDjz2K4QDYydw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22025&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22025 https://bugzilla.redhat.com/show_bug.cgi?id=2270559 https://www.cve.org/CVERecord?id=CVE-2024-22025 https://nvd.nist.gov/vuln/detail/CVE-2024-22025 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22025.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wQvupTbd1tnTVAWewQzJMw==&#34;: {&#xA;      &#34;id&#34;: &#34;wQvupTbd1tnTVAWewQzJMw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33412&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. By including a newline character in a pattern passed to Vim&#39;s glob() function, an attacker may be able to execute arbitrary shell commands. This command injection vulnerability allows for arbitrary code execution, depending on the user&#39;s shell settings.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-24T19:43:07Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33412 https://bugzilla.redhat.com/show_bug.cgi?id=2450907 https://www.cve.org/CVERecord?id=CVE-2026-33412 https://nvd.nist.gov/vuln/detail/CVE-2026-33412 https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a https://github.com/vim/vim/releases/tag/v9.2.0202 https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33412.json https://access.redhat.com/errata/RHSA-2026:8259&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-23.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wT8kuZRd+rqr4JY0ByO9Eg==&#34;: {&#xA;      &#34;id&#34;: &#34;wT8kuZRd+rqr4JY0ByO9Eg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4519&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The `webbrowser.open()` API, used to launch web browsers, does not properly sanitize input. This allows a remote attacker to craft a malicious URL containing leading dashes. When such a URL is opened, certain web browsers may interpret these dashes as command-line options, which could lead to unexpected behavior, information disclosure, or potentially arbitrary code execution, impacting the integrity of the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T15:08:32Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4519 https://bugzilla.redhat.com/show_bug.cgi?id=2449649 https://www.cve.org/CVERecord?id=CVE-2026-4519 https://nvd.nist.gov/vuln/detail/CVE-2026-4519 https://github.com/python/cpython/issues/143930 https://github.com/python/cpython/pull/143931 https://mail.python.org/archives/list/security-announce@python.org/thread/AY5NDSS433JK56Q7Q5IS7B37QFZVVOUS/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4519.json https://access.redhat.com/errata/RHSA-2026:6766&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wTqPXpGv5suIYx7xVHwxzw==&#34;: {&#xA;      &#34;id&#34;: &#34;wTqPXpGv5suIYx7xVHwxzw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45491&#34;,&#xA;      &#34;description&#34;: &#34;An issue was found in libexpat’s internal dtdCopy function in xmlparse.c, It can have an integer overflow for nDefaultAtts on 32-bit platforms where UINT_MAX equals SIZE_MAX.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-30T03:15:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45491 https://bugzilla.redhat.com/show_bug.cgi?id=2308616 https://www.cve.org/CVERecord?id=CVE-2024-45491 https://nvd.nist.gov/vuln/detail/CVE-2024-45491 https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes https://github.com/libexpat/libexpat/issues/888 https://github.com/libexpat/libexpat/pull/891 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45491.json https://access.redhat.com/errata/RHSA-2024:6754&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.5.0-2.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wVu6Drfzxh1KT5UxKndpTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;wVu6Drfzxh1KT5UxKndpTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41725&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption flaw in the net/http and mime/multipart packages. By sending a specially-crafted request, a remote attacker can cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41725 https://bugzilla.redhat.com/show_bug.cgi?id=2178488 https://www.cve.org/CVERecord?id=CVE-2022-41725 https://nvd.nist.gov/vuln/detail/CVE-2022-41725 https://go.dev/cl/468124 https://go.dev/issue/58006 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E https://pkg.go.dev/vuln/GO-2023-1569 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41725.json https://access.redhat.com/errata/RHBA-2023:2181&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.19.6-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;walyEMfvPvVh3KXxCNA/pQ==&#34;: {&#xA;      &#34;id&#34;: &#34;walyEMfvPvVh3KXxCNA/pQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-1751&#34;,&#xA;      &#34;description&#34;: &#34;Improper sanitization of CSS values in html/template&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-05T21:10:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/59720 https://go.dev/cl/491615 https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.19.9&#34;&#xA;    },&#xA;    &#34;wbgbZuReVn7DfcAmqe3XZA==&#34;: {&#xA;      &#34;id&#34;: &#34;wbgbZuReVn7DfcAmqe3XZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-headers&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wc5lIWGg0A45t1Tgl/aghw==&#34;: {&#xA;      &#34;id&#34;: &#34;wc5lIWGg0A45t1Tgl/aghw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22150&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici package for Node.js. Undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If an app has a mechanism that sends multipart requests to an attacker-controlled website, it can leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T17:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22150 https://bugzilla.redhat.com/show_bug.cgi?id=2339176 https://www.cve.org/CVERecord?id=CVE-2025-22150 https://nvd.nist.gov/vuln/detail/CVE-2025-22150 https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113 https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0 https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385 https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975 https://hackerone.com/reports/2913312 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22150.json https://access.redhat.com/errata/RHSA-2025:1613&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.13.1-1.module+el9.5.0+22763+17233acb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wed5fBK5xYyUEx1EpoQtEg==&#34;: {&#xA;      &#34;id&#34;: &#34;wed5fBK5xYyUEx1EpoQtEg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23083&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Node.js diagnostics_channel. This vulnerability allows an attacker to reinstate and misuse worker constructors, potentially bypassing the Permission Model via hooking into events when a worker thread is created.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-22T01:11:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23083 https://bugzilla.redhat.com/show_bug.cgi?id=2339392 https://www.cve.org/CVERecord?id=CVE-2025-23083 https://nvd.nist.gov/vuln/detail/CVE-2025-23083 https://nodejs.org/en/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23083.json https://access.redhat.com/errata/RHSA-2025:1443&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.18.2.1.module+el9.5.0+22758+4ad2c198&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wfyGNkRP1AKTpRqTPf0oQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;wfyGNkRP1AKTpRqTPf0oQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32559&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(&#39;spawn_sync&#39;) to run arbitrary code outside of the limits defined in a policy.json file.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32559 https://bugzilla.redhat.com/show_bug.cgi?id=2230956 https://www.cve.org/CVERecord?id=CVE-2023-32559 https://nvd.nist.gov/vuln/detail/CVE-2023-32559 https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32559.json https://access.redhat.com/errata/RHSA-2023:5532&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.20.2-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wgjZroGG2ECX8FlIRRqZmw==&#34;: {&#xA;      &#34;id&#34;: &#34;wgjZroGG2ECX8FlIRRqZmw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4904&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4904 https://bugzilla.redhat.com/show_bug.cgi?id=2168631 https://www.cve.org/CVERecord?id=CVE-2022-4904 https://nvd.nist.gov/vuln/detail/CVE-2022-4904 https://github.com/c-ares/c-ares/issues/496 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4904.json https://access.redhat.com/errata/RHSA-2023:2655&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-1.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wh2k+ZZKZUi/oRaog5dfGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;wh2k+ZZKZUi/oRaog5dfGQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11083&#34;,&#xA;      &#34;description&#34;: &#34;A head based buffer overflow flaw has been discovered in GNU bin utilities. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-27T23:02:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11083 https://bugzilla.redhat.com/show_bug.cgi?id=2399948 https://www.cve.org/CVERecord?id=CVE-2025-11083 https://nvd.nist.gov/vuln/detail/CVE-2025-11083 https://sourceware.org/bugzilla/attachment.cgi?id=16353 https://sourceware.org/bugzilla/show_bug.cgi?id=33457 https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490 https://vuldb.com/?ctiid.326124 https://vuldb.com/?id.326124 https://vuldb.com/?submit.661277 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11083.json https://access.redhat.com/errata/RHSA-2025:23343&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;binutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.35.2-67.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wh8UL6jE02MHJgululn0nA==&#34;: {&#xA;      &#34;id&#34;: &#34;wh8UL6jE02MHJgululn0nA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2650&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL resulting in a possible denial of service while translating ASN.1 object identifiers. Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience long delays when processing messages, which may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2650 https://bugzilla.redhat.com/show_bug.cgi?id=2207947 https://www.cve.org/CVERecord?id=CVE-2023-2650 https://nvd.nist.gov/vuln/detail/CVE-2023-2650 https://www.openssl.org/news/secadv/20230530.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2650.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;whMVc0u5Lzujkr6AuzQzMw==&#34;: {&#xA;      &#34;id&#34;: &#34;whMVc0u5Lzujkr6AuzQzMw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. The buffer-resizing code in addgetnetgrentX assumes that all string pointers point into the supplied buffer. This can potentially lead to memory corruption and cause a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33602 https://bugzilla.redhat.com/show_bug.cgi?id=2277206 https://www.cve.org/CVERecord?id=CVE-2024-33602 https://nvd.nist.gov/vuln/detail/CVE-2024-33602 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33602.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;whliDdpxFuOM5SHWXrizNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;whliDdpxFuOM5SHWXrizNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6075&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in Python’s os.path.expandvars() function that can cause performance degradation. When processing specially crafted, user-controlled input with nested environment variable patterns, the function exhibits quadratic time complexity, potentially leading to excessive CPU usage and denial of service (DoS) conditions. No code execution or data exposure occurs, so the impact is limited to performance slowdown.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-31T16:41:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6075 https://bugzilla.redhat.com/show_bug.cgi?id=2408891 https://www.cve.org/CVERecord?id=CVE-2025-6075 https://nvd.nist.gov/vuln/detail/CVE-2025-6075 https://github.com/python/cpython/issues/136065 https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6075.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wj5w4kQEe9iH2tb9jj1wEA==&#34;: {&#xA;      &#34;id&#34;: &#34;wj5w4kQEe9iH2tb9jj1wEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39975&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in MIT krb5, where an authenticated attacker can cause a KDC to free the same pointer twice if it can induce a failure in authorization data handling.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39975 https://bugzilla.redhat.com/show_bug.cgi?id=2232682 https://www.cve.org/CVERecord?id=CVE-2023-39975 https://nvd.nist.gov/vuln/detail/CVE-2023-39975 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39975.json https://access.redhat.com/errata/RHSA-2023:6699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wjPVtpb8yNf3j3pc1wfy6A==&#34;: {&#xA;      &#34;id&#34;: &#34;wjPVtpb8yNf3j3pc1wfy6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-38545&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \&#34;let the host resolve the name\&#34; could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-38545 https://bugzilla.redhat.com/show_bug.cgi?id=2241933 https://www.cve.org/CVERecord?id=CVE-2023-38545 https://nvd.nist.gov/vuln/detail/CVE-2023-38545 https://curl.se/docs/CVE-2023-38545.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-38545.json https://access.redhat.com/errata/RHSA-2023:6745&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9_3.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wlPwpwE94ExdZ/N5EaE3ow==&#34;: {&#xA;      &#34;id&#34;: &#34;wlPwpwE94ExdZ/N5EaE3ow==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2491&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \&#34;org-babel-execute:latex\&#34; function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2491 https://bugzilla.redhat.com/show_bug.cgi?id=2192873 https://www.cve.org/CVERecord?id=CVE-2023-2491 https://nvd.nist.gov/vuln/detail/CVE-2023-2491 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2491.json https://access.redhat.com/errata/RHSA-2023:2626&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;emacs-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:27.2-8.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wn4STzMt4ytbVHyERUyNoA==&#34;: {&#xA;      &#34;id&#34;: &#34;wn4STzMt4ytbVHyERUyNoA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3903&#34;,&#xA;      &#34;description&#34;: &#34;vim is vulnerable to Heap-based Buffer Overflow&#34;,&#xA;      &#34;issued&#34;: &#34;2021-10-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3903 https://bugzilla.redhat.com/show_bug.cgi?id=2018558 https://www.cve.org/CVERecord?id=CVE-2021-3903 https://nvd.nist.gov/vuln/detail/CVE-2021-3903 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3903.json https://access.redhat.com/errata/RHSA-2024:9405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-21.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wnOnIN4ZSytFGVwoTjBa6w==&#34;: {&#xA;      &#34;id&#34;: &#34;wnOnIN4ZSytFGVwoTjBa6w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21715&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The Node.js Permission Model, intended to restrict filesystem access, does not properly enforce read permission checks for the `fs.realpathSync.native()` function. This vulnerability allows code operating under `--permission` with restricted `--allow-fs-read` flags to bypass security controls. Consequently, an attacker can use `fs.realpathSync.native()` to determine file existence, resolve symbolic link targets, and enumerate filesystem paths outside of permitted directories, leading to information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21715 https://bugzilla.redhat.com/show_bug.cgi?id=2453152 https://www.cve.org/CVERecord?id=CVE-2026-21715 https://nvd.nist.gov/vuln/detail/CVE-2026-21715 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21715.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wnyL15XgdZxOsCINsou4IQ==&#34;: {&#xA;      &#34;id&#34;: &#34;wnyL15XgdZxOsCINsou4IQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2229&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client&#39;s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:27:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2229 https://bugzilla.redhat.com/show_bug.cgi?id=2447143 https://www.cve.org/CVERecord?id=CVE-2026-2229 https://nvd.nist.gov/vuln/detail/CVE-2026-2229 https://cna.openjsf.org/security-advisories.html https://datatracker.ietf.org/doc/html/rfc7692 https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8 https://hackerone.com/reports/3487486 https://nodejs.org/api/zlib.html#class-zlibinflateraw https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2229.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wqIGHEm21/U4VCTr0VeLVw==&#34;: {&#xA;      &#34;id&#34;: &#34;wqIGHEm21/U4VCTr0VeLVw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ws+M5wSfZVeN7hPLThggdg==&#34;: {&#xA;      &#34;id&#34;: &#34;ws+M5wSfZVeN7hPLThggdg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12133&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-12133 https://bugzilla.redhat.com/show_bug.cgi?id=2344611 https://www.cve.org/CVERecord?id=CVE-2024-12133 https://nvd.nist.gov/vuln/detail/CVE-2024-12133 https://gitlab.com/gnutls/libtasn1/-/blob/master/doc/security/CVE-2024-12133.md https://gitlab.com/gnutls/libtasn1/-/issues/52 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12133.json https://access.redhat.com/errata/RHSA-2025:7077&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.16.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;wzbm6jMqKBEu1w4HpECY6A==&#34;: {&#xA;      &#34;id&#34;: &#34;wzbm6jMqKBEu1w4HpECY6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29458&#34;,&#xA;      &#34;description&#34;: &#34;A segmentation fault vulnerability was found in ncurses&#39;s convert_strings() function of tinfo/read_entry.c file. This flaw occurs due to corrupted terminfo data, triggering an out-of-bounds read error.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-04-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-29458 https://bugzilla.redhat.com/show_bug.cgi?id=2076483 https://www.cve.org/CVERecord?id=CVE-2022-29458 https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-29458.json https://access.redhat.com/errata/RHSA-2025:12876&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:6.2-10.20210508.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;x+9X6oSMihxrE4Tni3a4Zw==&#34;: {&#xA;      &#34;id&#34;: &#34;x+9X6oSMihxrE4Tni3a4Zw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-24785&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s html/template standard library package. If errors returned from MarshalJSON methods contain user-controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing subsequent actions to inject unexpected content into templates.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-24785 https://bugzilla.redhat.com/show_bug.cgi?id=2268022 https://www.cve.org/CVERecord?id=CVE-2024-24785 https://nvd.nist.gov/vuln/detail/CVE-2024-24785 https://go.dev/cl/564196 https://go.dev/issue/65697 https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg https://vuln.go.dev/ID/GO-2024-2610.json https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-24785.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;x+E+r7arkKvVcXf/ay8rdg==&#34;: {&#xA;      &#34;id&#34;: &#34;x+E+r7arkKvVcXf/ay8rdg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32665&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32665 https://bugzilla.redhat.com/show_bug.cgi?id=2211827 https://www.cve.org/CVERecord?id=CVE-2023-32665 https://nvd.nist.gov/vuln/detail/CVE-2023-32665 https://gitlab.gnome.org/GNOME/glib/-/issues/2121 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32665.json https://access.redhat.com/errata/RHSA-2023:6631&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-11.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;x0tnd8GOUfHQCdr5bXMpHA==&#34;: {&#xA;      &#34;id&#34;: &#34;x0tnd8GOUfHQCdr5bXMpHA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-32487&#34;,&#xA;      &#34;description&#34;: &#34;An OS command injection flaw was found in Less. Since quoting is mishandled in filename.c, opening files with attacker-controlled file names can lead to OS command execution. Exploitation requires the LESSOPEN environment variable, which is set by default in many common cases.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-32487 https://bugzilla.redhat.com/show_bug.cgi?id=2274980 https://www.cve.org/CVERecord?id=CVE-2024-32487 https://nvd.nist.gov/vuln/detail/CVE-2024-32487 https://www.openwall.com/lists/oss-security/2024/04/12/5 https://www.openwall.com/lists/oss-security/2024/04/13/2 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-32487.json https://access.redhat.com/errata/RHSA-2024:3513&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;less&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:590-4.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;x4dqDafgKW8Zo/is+xcVZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;x4dqDafgKW8Zo/is+xcVZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-22866&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-06T16:54:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-22866 https://bugzilla.redhat.com/show_bug.cgi?id=2344219 https://www.cve.org/CVERecord?id=CVE-2025-22866 https://nvd.nist.gov/vuln/detail/CVE-2025-22866 https://go.dev/cl/643735 https://go.dev/issue/71383 https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k https://pkg.go.dev/vuln/GO-2025-3447 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22866.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;x4y353xwTKkgu0582Qh5wg==&#34;: {&#xA;      &#34;id&#34;: &#34;x4y353xwTKkgu0582Qh5wg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-11-25T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-47038 https://bugzilla.redhat.com/show_bug.cgi?id=2249523 https://www.cve.org/CVERecord?id=CVE-2023-47038 https://nvd.nist.gov/vuln/detail/CVE-2023-47038 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-47038.json https://access.redhat.com/errata/RHSA-2024:2228&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-File-Basename&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.85-481.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;x5MnAXJPkWBC+zd+i08Svw==&#34;: {&#xA;      &#34;id&#34;: &#34;x5MnAXJPkWBC+zd+i08Svw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-43786&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-43786 https://bugzilla.redhat.com/show_bug.cgi?id=2242253 https://www.cve.org/CVERecord?id=CVE-2023-43786 https://nvd.nist.gov/vuln/detail/CVE-2023-43786 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-43786.json https://access.redhat.com/errata/RHSA-2024:2145&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11-xcb&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-9.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;x80ydqeeoahPQLNiV1VXvQ==&#34;: {&#xA;      &#34;id&#34;: &#34;x80ydqeeoahPQLNiV1VXvQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2025-4014&#34;,&#xA;      &#34;description&#34;: &#34;Unbounded allocation when parsing GNU sparse map in archive/tar&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T21:51:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/709861 https://go.dev/issue/75677 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.24.8&#34;&#xA;    },&#xA;    &#34;xDXpto7iDgv1dyFWeDEVcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;xDXpto7iDgv1dyFWeDEVcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31130&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares. This issue occurs in the ares_inet_net_pton() function, which is vulnerable to a buffer underflow for certain ipv6 addresses. \&#34;0::00:00:00/2\&#34; in particular was found to cause an issue. C-ares only uses this function internally for configuration purposes, which would require an administrator to configure such an address via ares_set_sortlist().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-31130 https://bugzilla.redhat.com/show_bug.cgi?id=2209497 https://www.cve.org/CVERecord?id=CVE-2023-31130 https://nvd.nist.gov/vuln/detail/CVE-2023-31130 https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-31130.json https://access.redhat.com/errata/RHSA-2023:3586&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:16.19.1-2.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xDgXz/CGonIMAByh5y71UA==&#34;: {&#xA;      &#34;id&#34;: &#34;xDgXz/CGonIMAByh5y71UA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21713&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. The HMAC (Hash-based Message Authentication Code) verification process uses a comparison method that does not take a constant amount of time. This non-constant-time comparison can leak timing information, which, under specific conditions where precise timing measurements are possible, could be exploited by a remote attacker. This allows the attacker to infer sensitive HMAC values, leading to information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21713 https://bugzilla.redhat.com/show_bug.cgi?id=2453160 https://www.cve.org/CVERecord?id=CVE-2026-21713 https://nvd.nist.gov/vuln/detail/CVE-2026-21713 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21713.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xEtBJoALTqnQBn0TOsRe9w==&#34;: {&#xA;      &#34;id&#34;: &#34;xEtBJoALTqnQBn0TOsRe9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45288&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45288 https://bugzilla.redhat.com/show_bug.cgi?id=2268273 https://www.cve.org/CVERecord?id=CVE-2023-45288 https://nvd.nist.gov/vuln/detail/CVE-2023-45288 https://nowotarski.info/http2-continuation-flood/ https://pkg.go.dev/vuln/GO-2024-2687 https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45288.json https://access.redhat.com/errata/RHSA-2024:1963&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.12-4.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xF20fK5dvutyLkWcMLVDPw==&#34;: {&#xA;      &#34;id&#34;: &#34;xF20fK5dvutyLkWcMLVDPw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6232&#34;,&#xA;      &#34;description&#34;: &#34;A regular expression denial of service (ReDos) vulnerability was found in Python&#39;s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-03T13:15:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6232 https://bugzilla.redhat.com/show_bug.cgi?id=2309426 https://www.cve.org/CVERecord?id=CVE-2024-6232 https://nvd.nist.gov/vuln/detail/CVE-2024-6232 https://github.com/python/cpython/issues/121285 https://github.com/python/cpython/pull/121286 https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6232.json https://access.redhat.com/errata/RHSA-2024:9468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.19-8.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xIqTu52elcgV5FuN0Fuj4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;xIqTu52elcgV5FuN0Fuj4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3817&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security issue occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3817 https://bugzilla.redhat.com/show_bug.cgi?id=2227852 https://www.cve.org/CVERecord?id=CVE-2023-3817 https://nvd.nist.gov/vuln/detail/CVE-2023-3817 https://www.openssl.org/news/secadv/20230731.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3817.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xKgvhqTYvQwR5QWUkRuf6Q==&#34;: {&#xA;      &#34;id&#34;: &#34;xKgvhqTYvQwR5QWUkRuf6Q==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2022-0526&#34;,&#xA;      &#34;description&#34;: &#34;Stack exhaustion when decoding certain messages in encoding/gob&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-20T20:52:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/cl/417064 https://go.googlesource.com/go/+/6fa37e98ea4382bf881428ee0c150ce591500eb7 https://go.dev/issue/53615 https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.4&#34;&#xA;    },&#xA;    &#34;xNJWUdryH0nBQB/93HRNuw==&#34;: {&#xA;      &#34;id&#34;: &#34;xNJWUdryH0nBQB/93HRNuw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-12900&#34;,&#xA;      &#34;description&#34;: &#34;A data integrity error was found in the bzip2 (User-space package) functionality when decompressing. This issue occurs when a user decompresses a particular kind of .bz2 files. A local user could get unexpected results (or corrupted data) as result of decompressing these files.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-15T10:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-12900 https://bugzilla.redhat.com/show_bug.cgi?id=2332075 https://www.cve.org/CVERecord?id=CVE-2019-12900 https://nvd.nist.gov/vuln/detail/CVE-2019-12900 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-12900.json https://access.redhat.com/errata/RHSA-2025:0925&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.0.8-10.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xNOfe6PszfMbCxNEPk4FCg==&#34;: {&#xA;      &#34;id&#34;: &#34;xNOfe6PszfMbCxNEPk4FCg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-49794&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\&#34;...\&#34;/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program&#39;s crash using libxml or other possible undefined behaviors.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-49794 https://bugzilla.redhat.com/show_bug.cgi?id=2372373 https://www.cve.org/CVERecord?id=CVE-2025-49794 https://nvd.nist.gov/vuln/detail/CVE-2025-49794 https://gitlab.gnome.org/GNOME/libxml2/-/issues/931 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-49794.json https://access.redhat.com/errata/RHSA-2025:10699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-10.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xP/kV8YDeJxssrXaMcjXUg==&#34;: {&#xA;      &#34;id&#34;: &#34;xP/kV8YDeJxssrXaMcjXUg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/go&#34;,&#xA;      &#34;name&#34;: &#34;GO-2023-2375&#34;,&#xA;      &#34;description&#34;: &#34;Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-05T16:16:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://go.dev/issue/20654 https://go.dev/cl/326012/26 https://groups.google.com/g/golang-announce/c/QMK8IQALDvA https://people.redhat.com/~hkario/marvin/&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;stdlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;go&#34;,&#xA;        &#34;uri&#34;: &#34;https://pkg.go.dev/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.20.0&#34;&#xA;    },&#xA;    &#34;xP0q7+9N5MKgQQUq9keq4A==&#34;: {&#xA;      &#34;id&#34;: &#34;xP0q7+9N5MKgQQUq9keq4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23085&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23085 https://bugzilla.redhat.com/show_bug.cgi?id=2342618 https://www.cve.org/CVERecord?id=CVE-2025-23085 https://nvd.nist.gov/vuln/detail/CVE-2025-23085 https://nodejs.org/pt/blog/vulnerability/january-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23085.json https://access.redhat.com/errata/RHSA-2025:1446&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.6-1.module+el9.5.0+22773+9a359385&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xQ6R88+x8IssPvOAavmZXw==&#34;: {&#xA;      &#34;id&#34;: &#34;xQ6R88+x8IssPvOAavmZXw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-0530&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Unzip. The vulnerability occurs during the conversion of a UTF-8 string to a local string that leads to a segmentation fault. This flaw allows an attacker to input a specially crafted zip file, leading to a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-01-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-0530 https://bugzilla.redhat.com/show_bug.cgi?id=2051395 https://www.cve.org/CVERecord?id=CVE-2022-0530 https://nvd.nist.gov/vuln/detail/CVE-2022-0530 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-0530.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;unzip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xU5h/ccSMUFpzLZ+ILu+rg==&#34;: {&#xA;      &#34;id&#34;: &#34;xU5h/ccSMUFpzLZ+ILu+rg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55131&#34;,&#xA;      &#34;description&#34;: &#34;A memory exposure flaw has been discovered in Node.js. A flaw in Node.js&#39;s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55131 https://bugzilla.redhat.com/show_bug.cgi?id=2431350 https://www.cve.org/CVERecord?id=CVE-2025-55131 https://nvd.nist.gov/vuln/detail/CVE-2025-55131 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55131.json https://access.redhat.com/errata/RHSA-2026:2783&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.20.0-1.module+el9.7.0+23895+0637d423&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xUBSdDBs0fiKOh6BCZPXOA==&#34;: {&#xA;      &#34;id&#34;: &#34;xUBSdDBs0fiKOh6BCZPXOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4032&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. The ipaddress module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. Due to this issue, it is possible that values will not be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4032 https://bugzilla.redhat.com/show_bug.cgi?id=2292921 https://www.cve.org/CVERecord?id=CVE-2024-4032 https://nvd.nist.gov/vuln/detail/CVE-2024-4032 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4032.json https://access.redhat.com/errata/RHSA-2024:4779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xVnM1Y5F9hIYQN1//jfY7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;xVnM1Y5F9hIYQN1//jfY7Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22017&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, where the setuid() does not affect libuv&#39;s internal io_uring operations if initialized before the call to setuid(). This issue allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22017 https://bugzilla.redhat.com/show_bug.cgi?id=2265727 https://www.cve.org/CVERecord?id=CVE-2024-22017 https://nvd.nist.gov/vuln/detail/CVE-2024-22017 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22017.json https://access.redhat.com/errata/RHSA-2024:1688&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xWQ3VSY/nFJP/yijxRUoxA==&#34;: {&#xA;      &#34;id&#34;: &#34;xWQ3VSY/nFJP/yijxRUoxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0865&#34;,&#xA;      &#34;description&#34;: &#34;Missing newline filtering has been discovered in Python. User-controlled header names and values containing newlines can allow injecting HTTP headers.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:26:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0865 https://bugzilla.redhat.com/show_bug.cgi?id=2431367 https://www.cve.org/CVERecord?id=CVE-2026-0865 https://nvd.nist.gov/vuln/detail/CVE-2026-0865 https://github.com/python/cpython/issues/143916 https://github.com/python/cpython/pull/143917 https://mail.python.org/archives/list/security-announce@python.org/thread/BJ6QPHNSHJTS3A7CFV6IBMCAP2DWRVNT/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0865.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xYZxVBz2xY/aoDQPqi4nCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;xYZxVBz2xY/aoDQPqi4nCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc netgroup cache. After a failed cache insertion, addgetnetgrentX tries to send the non-existing response after the not-found header. This can lead to a null pointer dereference that causes a crash or exit.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33600 https://bugzilla.redhat.com/show_bug.cgi?id=2277204 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://nvd.nist.gov/vuln/detail/CVE-2024-33600 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33600.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-locale-source&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xZsh7Q9v1lEcCIn4GeJadw==&#34;: {&#xA;      &#34;id&#34;: &#34;xZsh7Q9v1lEcCIn4GeJadw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:11802&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.16.0-2.module+el9.6.0+23339+d3c8acfa&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xcQReVPnPEIim0iMTZWDwA==&#34;: {&#xA;      &#34;id&#34;: &#34;xcQReVPnPEIim0iMTZWDwA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25629&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25629 https://bugzilla.redhat.com/show_bug.cgi?id=2265713 https://www.cve.org/CVERecord?id=CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629 https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25629.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xek4X2TrLxrtYM1HALbG5g==&#34;: {&#xA;      &#34;id&#34;: &#34;xek4X2TrLxrtYM1HALbG5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1525&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \&#34;Content-Length\&#34; and \&#34;content-length\&#34;). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T19:56:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1525 https://bugzilla.redhat.com/show_bug.cgi?id=2447144 https://www.cve.org/CVERecord?id=CVE-2026-1525 https://nvd.nist.gov/vuln/detail/CVE-2026-1525 https://cna.openjsf.org/security-advisories.html https://cwe.mitre.org/data/definitions/444.html https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm https://hackerone.com/reports/3556037 https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1525.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xgLvjf6I20G6RWphhI+SWg==&#34;: {&#xA;      &#34;id&#34;: &#34;xgLvjf6I20G6RWphhI+SWg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json https://access.redhat.com/errata/RHSA-2026:13677&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xh8zszQflFXgahc/vYUUWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;xh8zszQflFXgahc/vYUUWQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32777&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing specially crafted Document Type Definition (DTD) content. This could lead to an infinite loop during parsing, resulting in a Denial of Service (DoS) for the application using libexpat.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T06:58:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32777 https://bugzilla.redhat.com/show_bug.cgi?id=2447890 https://www.cve.org/CVERecord?id=CVE-2026-32777 https://nvd.nist.gov/vuln/detail/CVE-2026-32777 https://github.com/libexpat/libexpat/issues/1161 https://github.com/libexpat/libexpat/pull/1159 https://github.com/libexpat/libexpat/pull/1162 https://issues.oss-fuzz.com/issues/486993411 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32777.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xhnxsdmWc6+n3gUj6yqBpw==&#34;: {&#xA;      &#34;id&#34;: &#34;xhnxsdmWc6+n3gUj6yqBpw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29491&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in ncurses and occurs when used by a setuid application. This flaw allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29491 https://bugzilla.redhat.com/show_bug.cgi?id=2191704 https://www.cve.org/CVERecord?id=CVE-2023-29491 https://nvd.nist.gov/vuln/detail/CVE-2023-29491 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29491.json https://access.redhat.com/errata/RHSA-2023:6698&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:6.2-10.20210508.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xjE2Ua1GOmdwVi+xIIGVeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;xjE2Ua1GOmdwVi+xIIGVeQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0798&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractContigSamplesShifted8bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0798 https://bugzilla.redhat.com/show_bug.cgi?id=2170157 https://www.cve.org/CVERecord?id=CVE-2023-0798 https://nvd.nist.gov/vuln/detail/CVE-2023-0798 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0798.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xmhlBgW9Qhx+a2k3SdfUzA==&#34;: {&#xA;      &#34;id&#34;: &#34;xmhlBgW9Qhx+a2k3SdfUzA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-36054&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the _xdr_kadm5_principal_ent_rec() function in lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (krb5). This issue occurs due to lack of validation in the relationship between n_key_data and the key_data array count, leading to the freeing of uninitialized pointers. This may allow a remote authenticated attacker to send a specially crafted request that causes the kadmind process to crash, resulting in a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-36054 https://bugzilla.redhat.com/show_bug.cgi?id=2230178 https://www.cve.org/CVERecord?id=CVE-2023-36054 https://nvd.nist.gov/vuln/detail/CVE-2023-36054 https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final https://web.mit.edu/kerberos/www/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-36054.json https://access.redhat.com/errata/RHSA-2023:6699&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xmjtcASNDmlJFcM3cVQlVg==&#34;: {&#xA;      &#34;id&#34;: &#34;xmjtcASNDmlJFcM3cVQlVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55130&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55130 https://bugzilla.redhat.com/show_bug.cgi?id=2431352 https://www.cve.org/CVERecord?id=CVE-2025-55130 https://nvd.nist.gov/vuln/detail/CVE-2025-55130 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55130.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xoMyxEWbrnIOZWHnwVuShQ==&#34;: {&#xA;      &#34;id&#34;: &#34;xoMyxEWbrnIOZWHnwVuShQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-28484&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference vulnerability was found in libxml2. This issue occurs when parsing (invalid) XML schemas.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-04-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-28484 https://bugzilla.redhat.com/show_bug.cgi?id=2185994 https://www.cve.org/CVERecord?id=CVE-2023-28484 https://nvd.nist.gov/vuln/detail/CVE-2023-28484 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-28484.json https://access.redhat.com/errata/RHSA-2023:4349&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-3.el9_2.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xqLSmaq+0/3ps+9zoCEL9g==&#34;: {&#xA;      &#34;id&#34;: &#34;xqLSmaq+0/3ps+9zoCEL9g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34155&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the go/parser package of the Golang standard library. Calling any Parse functions on Go source code containing deeply nested literals can cause a panic due to stack exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-09-06T21:15:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34155 https://bugzilla.redhat.com/show_bug.cgi?id=2310527 https://www.cve.org/CVERecord?id=CVE-2024-34155 https://nvd.nist.gov/vuln/detail/CVE-2024-34155 https://go.dev/cl/611238 https://go.dev/issue/69138 https://groups.google.com/g/golang-dev/c/S9POB9NCTdk https://pkg.go.dev/vuln/GO-2024-3105 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34155.json https://access.redhat.com/errata/RHSA-2024:6913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.13-3.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xsP7BCzVmEb3+qivw8mFIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;xsP7BCzVmEb3+qivw8mFIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2511&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A malicious client can trigger an uncontrolled memory consumption, resulting in a Denial of Service. This issue occurs due to OpenSSL&#39;s TLSv1.3 session cache going into an incorrect state, leading to it failing to flush properly as it fills. OpenSSL must be configured with the non-default SSL_OP_NO_TICKET option enabled to be vulnerable. This issue only affects TLSv1.3 servers, while TLS clients are not affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2511 https://bugzilla.redhat.com/show_bug.cgi?id=2274020 https://www.cve.org/CVERecord?id=CVE-2024-2511 https://nvd.nist.gov/vuln/detail/CVE-2024-2511 https://www.openssl.org/news/vulnerabilities.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2511.json https://access.redhat.com/errata/RHSA-2024:9333&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.2.2-6.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xsiKeHcIwwzMLDEPFdNSFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;xsiKeHcIwwzMLDEPFdNSFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-28362&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the math/big package of Go&#39;s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-11-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-28362 https://bugzilla.redhat.com/show_bug.cgi?id=1897635 https://www.cve.org/CVERecord?id=CVE-2020-28362 https://nvd.nist.gov/vuln/detail/CVE-2020-28362 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-28362.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xvZ+aaak6OxbCE7Nu46XhA==&#34;: {&#xA;      &#34;id&#34;: &#34;xvZ+aaak6OxbCE7Nu46XhA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-31498&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This vulnerability allows a remote or local attacker to cause a use-after-free, potentially leading to application-level denial of service or other unexpected behavior via manipulation of DNS responses or network conditions during query processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T13:53:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-31498 https://bugzilla.redhat.com/show_bug.cgi?id=2358271 https://www.cve.org/CVERecord?id=CVE-2025-31498 https://nvd.nist.gov/vuln/detail/CVE-2025-31498 https://github.com/c-ares/c-ares/commit/29d38719112639d8c0ba910254a3dd4f482ea2d1 https://github.com/c-ares/c-ares/pull/821 https://github.com/c-ares/c-ares/security/advisories/GHSA-6hxc-62jh-p29v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-31498.json https://access.redhat.com/errata/RHSA-2025:7433&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.15.0-1.module+el9.6.0+23062+9e7801b9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;: {&#xA;      &#34;id&#34;: &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-60753&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in apply_substitution() function in libarchive&#39;s bsdtar allows crafted -s substitution rules to repeatedly match a zero-length substring and append replacements without advancing the input pointer. When the rule uses the global /g flag (or an explicitly empty pattern), this leads to unbounded output allocation and eventual process OOM (Denial of Service). Upgrade to libarchive 3.8.1 or apply a patch that prevents zero-length match loops or rejects empty patterns.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-60753 https://bugzilla.redhat.com/show_bug.cgi?id=2412648 https://www.cve.org/CVERecord?id=CVE-2025-60753 https://nvd.nist.gov/vuln/detail/CVE-2025-60753 https://github.com/Papya-j/CVE/tree/main/CVE-2025-60753 https://github.com/libarchive/libarchive/issues/2725 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-60753.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xxrk6qwvf/BkNdal8rz/jA==&#34;: {&#xA;      &#34;id&#34;: &#34;xxrk6qwvf/BkNdal8rz/jA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45289&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Go&#39;s net/http/cookiejar standard library package. When following an HTTP redirect to a domain that is not a subdomain match or an exact match of the initial domain, an http.Client does not forward sensitive headers such as \&#34;Authorization\&#34; or \&#34;Cookie\&#34;. For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45289 https://bugzilla.redhat.com/show_bug.cgi?id=2268018 https://www.cve.org/CVERecord?id=CVE-2023-45289 https://nvd.nist.gov/vuln/detail/CVE-2023-45289 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45289.json https://access.redhat.com/errata/RHSA-2024:2562&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.9-2.el9_4&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xzz0v3ajpuFhN3HDJCDDYg==&#34;: {&#xA;      &#34;id&#34;: &#34;xzz0v3ajpuFhN3HDJCDDYg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2650&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL resulting in a possible denial of service while translating ASN.1 object identifiers. Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience long delays when processing messages, which may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2650 https://bugzilla.redhat.com/show_bug.cgi?id=2207947 https://www.cve.org/CVERecord?id=CVE-2023-2650 https://nvd.nist.gov/vuln/detail/CVE-2023-2650 https://www.openssl.org/news/secadv/20230530.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2650.json https://access.redhat.com/errata/RHSA-2023:3722&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-16.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;y+qe2Ltr+Zxrpu9HCascIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;y+qe2Ltr+Zxrpu9HCascIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6020 https://bugzilla.redhat.com/show_bug.cgi?id=2372512 https://www.cve.org/CVERecord?id=CVE-2025-6020 https://nvd.nist.gov/vuln/detail/CVE-2025-6020 https://github.com/linux-pam/linux-pam/security/advisories/GHSA-f9p8-gjr4-j9gx https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6020.json https://access.redhat.com/errata/RHSA-2025:9526&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.5.1-25.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;: {&#xA;      &#34;id&#34;: &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9820 https://bugzilla.redhat.com/show_bug.cgi?id=2392528 https://www.cve.org/CVERecord?id=CVE-2025-9820 https://nvd.nist.gov/vuln/detail/CVE-2025-9820 https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5 https://gitlab.com/gnutls/gnutls/-/issues/1732 https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9820.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;y/vNaOETNDNWhjGaBLNhRA==&#34;: {&#xA;      &#34;id&#34;: &#34;y/vNaOETNDNWhjGaBLNhRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1502&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. This vulnerability allows for the injection of extra information into HTTP communication. Specifically, the system does not properly prevent special characters (carriage return and line feed) from being included in HTTP client proxy tunnel headers or host fields.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-10T17:54:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1502 https://bugzilla.redhat.com/show_bug.cgi?id=2457409 https://www.cve.org/CVERecord?id=CVE-2026-1502 https://nvd.nist.gov/vuln/detail/CVE-2026-1502 https://github.com/python/cpython/commit/05ed7ce7ae9e17c23a04085b2539fe6d6d3cef69 https://github.com/python/cpython/issues/146211 https://github.com/python/cpython/pull/146212 https://mail.python.org/archives/list/security-announce@python.org/thread/2IVPAEQWUJBCTQZEJEVTYCIKSMQPGRZ3/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1502.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3.9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;y0c8SsIbu7kpkqoaDhf8/A==&#34;: {&#xA;      &#34;id&#34;: &#34;y0c8SsIbu7kpkqoaDhf8/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4517&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the CPython tarfile module. This vulnerability allows arbitrary filesystem writes outside the extraction directory via extracting untrusted tar archives using the TarFile.extractall() or TarFile.extract() methods with the extraction filter parameter set to \&#34;data\&#34; or \&#34;tar\&#34;.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-03T12:58:50Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4517 https://bugzilla.redhat.com/show_bug.cgi?id=2370016 https://www.cve.org/CVERecord?id=CVE-2025-4517 https://nvd.nist.gov/vuln/detail/CVE-2025-4517 https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a https://github.com/python/cpython/issues/135034 https://github.com/python/cpython/pull/135037 https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4517.json https://access.redhat.com/errata/RHSA-2025:10136&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.21-2.el9_6.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;y1VRnBNNx34t1XvqjEl7IQ==&#34;: {&#xA;      &#34;id&#34;: &#34;y1VRnBNNx34t1XvqjEl7IQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26461&#34;,&#xA;      &#34;description&#34;: &#34;A memory leak flaw was found in krb5 in /krb5/src/lib/gssapi/krb5/k5sealv3.c. This issue can lead to a denial of service through memory exhaustion.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-26461 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://www.cve.org/CVERecord?id=CVE-2024-26461 https://nvd.nist.gov/vuln/detail/CVE-2024-26461 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-26461.json https://access.redhat.com/errata/RHSA-2024:9331&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.21.1-3.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;y2mXLQnvQEY7S/5iFBq5VQ==&#34;: {&#xA;      &#34;id&#34;: &#34;y2mXLQnvQEY7S/5iFBq5VQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45341&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/x509 package of the Golang standard library. A certificate with a URI, which has a IPv6 address with a zone ID, may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI; this issue only affects users of private PKIs that make use of URIs.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-45341 https://bugzilla.redhat.com/show_bug.cgi?id=2341750 https://www.cve.org/CVERecord?id=CVE-2024-45341 https://nvd.nist.gov/vuln/detail/CVE-2024-45341 https://github.com/golang/go/commit/2b2314e9f6103de322b2e247387c8b01fd0cd5a4 https://github.com/golang/go/issues/71156 https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45341.json https://access.redhat.com/errata/RHSA-2025:3773&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.23.6-2.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;y5N73UEFT/BHwjJkVAx22A==&#34;: {&#xA;      &#34;id&#34;: &#34;y5N73UEFT/BHwjJkVAx22A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;y7I268PAr74OoToX85XE8w==&#34;: {&#xA;      &#34;id&#34;: &#34;y7I268PAr74OoToX85XE8w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;y9E+Lh5SpPDKe0DW19HLjA==&#34;: {&#xA;      &#34;id&#34;: &#34;y9E+Lh5SpPDKe0DW19HLjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4752&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim, where it is vulnerable to a use-after-free in the ins_compl_get_exp function. This flaw allows a specially crafted file to crash software, use unexpected values, or possibly execute code when opened in Vim.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4752 https://bugzilla.redhat.com/show_bug.cgi?id=2237311 https://www.cve.org/CVERecord?id=CVE-2023-4752 https://nvd.nist.gov/vuln/detail/CVE-2023-4752 https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4752.json https://access.redhat.com/errata/RHSA-2025:7440&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim-filesystem&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:8.2.2637-22.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yCrfh+WfD/7UJatf+Ek6jA==&#34;: {&#xA;      &#34;id&#34;: &#34;yCrfh+WfD/7UJatf+Ek6jA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39333&#34;,&#xA;      &#34;description&#34;: &#34;Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39333 https://bugzilla.redhat.com/show_bug.cgi?id=2244418 https://www.cve.org/CVERecord?id=CVE-2023-39333 https://nvd.nist.gov/vuln/detail/CVE-2023-39333 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39333.json https://access.redhat.com/errata/RHSA-2023:5849&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yF/CyvOlKzDmpBu26JCuEg==&#34;: {&#xA;      &#34;id&#34;: &#34;yF/CyvOlKzDmpBu26JCuEg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23166&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js, specifically in the C++ method SignTraits::DeriveBits(). This vulnerability can allow a remote attacker to crash the Node.js runtime via untrusted input, triggering an exception in a background thread.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23166 https://bugzilla.redhat.com/show_bug.cgi?id=2367163 https://www.cve.org/CVERecord?id=CVE-2025-23166 https://nvd.nist.gov/vuln/detail/CVE-2025-23166 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23166.json https://access.redhat.com/errata/RHSA-2025:8467&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.2-1.22.16.0.1.module+el9.6.0+23151+b1496e9d&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yIgeDQgyoDXR+INQbK5bbA==&#34;: {&#xA;      &#34;id&#34;: &#34;yIgeDQgyoDXR+INQbK5bbA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-43548&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in NodeJS. The issue occurs in the Node.js rebinding protector for --inspect that still allows invalid IP addresses, specifically, the octal format. This flaw allows an attacker to perform DNS rebinding and execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-11-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-43548 https://bugzilla.redhat.com/show_bug.cgi?id=2140911 https://www.cve.org/CVERecord?id=CVE-2022-43548 https://nvd.nist.gov/vuln/detail/CVE-2022-43548 https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/#dns-rebinding-in-inspect-via-invalid-octal-ip-address-medium-cve-2022-43548 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-43548.json https://access.redhat.com/errata/RHSA-2022:8832&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.12.1-1.module+el9.1.0.z+17326+318294bb&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yK3vcSC4PlKQSa9IQKCw1w==&#34;: {&#xA;      &#34;id&#34;: &#34;yK3vcSC4PlKQSa9IQKCw1w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;A stack-based buffer overflow flaw was found in the glibc netgroup cache. In certain conditions, its possible to trigger a stack-based buffer overflow condition that can lead to a denial of service and potentially other malicious actions that impact confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-33599 https://bugzilla.redhat.com/show_bug.cgi?id=2277202 https://www.cve.org/CVERecord?id=CVE-2024-33599 https://nvd.nist.gov/vuln/detail/CVE-2024-33599 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-33599.json https://access.redhat.com/errata/RHSA-2024:3339&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9_4.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yKRKMYSzkiSZ6c90bTl6iA==&#34;: {&#xA;      &#34;id&#34;: &#34;yKRKMYSzkiSZ6c90bTl6iA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35387&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability allows the system to use unintended Elliptic Curve Digital Signature Algorithm (ECDSA) algorithms. This occurs because the configuration for accepted public key algorithms is misinterpreted, leading to the use of weaker cryptographic methods than intended. This could potentially allow an attacker to compromise the confidentiality of data.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T16:52:53Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35387 https://bugzilla.redhat.com/show_bug.cgi?id=2454494 https://www.cve.org/CVERecord?id=CVE-2026-35387 https://nvd.nist.gov/vuln/detail/CVE-2026-35387 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35387.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yNIngFjcdt+ETIv0YvW+4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;yNIngFjcdt+ETIv0YvW+4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-49043&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2 where improper handling of memory allocation failures in `libxml2` can lead to crashes, memory leaks, or inconsistent states. While an attacker cannot directly control allocation failures, they may trigger denial-of-service conditions under extreme system stress.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-49043 https://bugzilla.redhat.com/show_bug.cgi?id=2342118 https://www.cve.org/CVERecord?id=CVE-2022-49043 https://nvd.nist.gov/vuln/detail/CVE-2022-49043 https://github.com/php/php-src/issues/17467 https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-49043.json https://access.redhat.com/errata/RHSA-2025:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-6.el9_5.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yOFL3ef2F8Ux3GMySAVXxg==&#34;: {&#xA;      &#34;id&#34;: &#34;yOFL3ef2F8Ux3GMySAVXxg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-58183&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-29T22:10:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-58183 https://bugzilla.redhat.com/show_bug.cgi?id=2407258 https://www.cve.org/CVERecord?id=CVE-2025-58183 https://nvd.nist.gov/vuln/detail/CVE-2025-58183 https://go.dev/cl/709861 https://go.dev/issue/75677 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://pkg.go.dev/vuln/GO-2025-4014 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-58183.json https://access.redhat.com/errata/RHSA-2025:21815&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-bin&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.3-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yOUu4ImaYusi101ZTf86nw==&#34;: {&#xA;      &#34;id&#34;: &#34;yOUu4ImaYusi101ZTf86nw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yR8yQT8vjjYwY0t0RI5P5A==&#34;: {&#xA;      &#34;id&#34;: &#34;yR8yQT8vjjYwY0t0RI5P5A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22695&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a reference library for processing PNG (Portable Network Graphics) image files. A local attacker could exploit a heap buffer over-read vulnerability in the `png_image_finish_read` function by tricking a user into processing a specially crafted interlaced 16-bit PNG file with an 8-bit output format and non-minimal row stride. This could lead to a denial of service (DoS) and potentially information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T22:55:40Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22695 https://bugzilla.redhat.com/show_bug.cgi?id=2428825 https://www.cve.org/CVERecord?id=CVE-2026-22695 https://nvd.nist.gov/vuln/detail/CVE-2026-22695 https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea https://github.com/pnggroup/libpng/commit/e4f7ad4ea2 https://github.com/pnggroup/libpng/issues/778 https://github.com/pnggroup/libpng/security/advisories/GHSA-mmq5-27w3-rxpp https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22695.json https://access.redhat.com/errata/RHSA-2026:3405&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpng-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:1.6.37-12.el9_7.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yUucg71orzE08FiDgaKBPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;yUucg71orzE08FiDgaKBPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yV3QixxBrXQjuo0c4OIL/w==&#34;: {&#xA;      &#34;id&#34;: &#34;yV3QixxBrXQjuo0c4OIL/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27534&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27534 https://bugzilla.redhat.com/show_bug.cgi?id=2179069 https://www.cve.org/CVERecord?id=CVE-2023-27534 https://nvd.nist.gov/vuln/detail/CVE-2023-27534 https://curl.se/docs/CVE-2023-27534.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27534.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yVSbDx471AjTjlaUBaOQ5g==&#34;: {&#xA;      &#34;id&#34;: &#34;yVSbDx471AjTjlaUBaOQ5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4786&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python webbrowser.open() API. If a specially crafted URL containing \&#34;%action\&#34; is processed, an attacker could bypass a previous mitigation for CVE-2026-4519. This bypass allows for command injection into the underlying shell, potentially leading to arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T21:52:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4786 https://bugzilla.redhat.com/show_bug.cgi?id=2458049 https://www.cve.org/CVERecord?id=CVE-2026-4786 https://nvd.nist.gov/vuln/detail/CVE-2026-4786 https://github.com/python/cpython/issues/148169 https://github.com/python/cpython/pull/148170 https://mail.python.org/archives/list/security-announce@python.org/thread/JQDUNJVB4AQNTJECSUKOBDU3XCJIPSE5/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4786.json https://access.redhat.com/errata/RHSA-2026:10949&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yXjhPZPggtyVHOPFjmeHOg==&#34;: {&#xA;      &#34;id&#34;: &#34;yXjhPZPggtyVHOPFjmeHOg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json https://access.redhat.com/errata/RHSA-2026:13677&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ybQbHANLbpeKvvvpnEOh2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;ybQbHANLbpeKvvvpnEOh2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30581&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been discovered in Node.js,  where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30581 https://bugzilla.redhat.com/show_bug.cgi?id=2219824 https://www.cve.org/CVERecord?id=CVE-2023-30581 https://nvd.nist.gov/vuln/detail/CVE-2023-30581 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30581.json https://access.redhat.com/errata/RHSA-2023:4330&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.16.1-1.module+el9.2.0.z+19424+78951f07&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ycihN0043OihPtrAPlFZyA==&#34;: {&#xA;      &#34;id&#34;: &#34;ycihN0043OihPtrAPlFZyA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-SelectSaver&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.02-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ydg80VAiaAwfrueUhGEKNA==&#34;: {&#xA;      &#34;id&#34;: &#34;ydg80VAiaAwfrueUhGEKNA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-10041&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-10-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-10041 https://bugzilla.redhat.com/show_bug.cgi?id=2319212 https://www.cve.org/CVERecord?id=CVE-2024-10041 https://nvd.nist.gov/vuln/detail/CVE-2024-10041 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-10041.json https://access.redhat.com/errata/RHSA-2024:11250&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.5.1-21.el9_5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ygPqOnRCEHz9NjTVM+wIZA==&#34;: {&#xA;      &#34;id&#34;: &#34;ygPqOnRCEHz9NjTVM+wIZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29187&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Git. This flaw occurs due to Git not checking the ownership of directories in a local multi-user system when running commands specified in the local repository configuration. This issue allows the owner of the repository to cause arbitrary commands to be executed by other users who access the repository.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-29187 https://bugzilla.redhat.com/show_bug.cgi?id=2107439 https://www.cve.org/CVERecord?id=CVE-2022-29187 https://nvd.nist.gov/vuln/detail/CVE-2022-29187 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-29187.json https://access.redhat.com/errata/RHSA-2023:2319&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;git-core&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.39.1-1.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yiivq+72Eny8jduuFDoDEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;yiivq+72Eny8jduuFDoDEQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6069&#34;,&#xA;      &#34;description&#34;: &#34;A denial-of-service (DoS) vulnerability has been discovered in Python&#39;s html.parser.HTMLParser class. When processing specially malformed HTML input, the parsing runtime can become quadratic with respect to the input size. This significantly increased processing time can lead to excessive resource consumption, ultimately causing a denial-of-service condition in applications that rely on this parser.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-17T13:39:46Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6069 https://bugzilla.redhat.com/show_bug.cgi?id=2373234 https://www.cve.org/CVERecord?id=CVE-2025-6069 https://nvd.nist.gov/vuln/detail/CVE-2025-6069 https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949 https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41 https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b https://github.com/python/cpython/issues/135462 https://github.com/python/cpython/pull/135464 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6069.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ylg3k+AtgUcIl3hJiXNMlw==&#34;: {&#xA;      &#34;id&#34;: &#34;ylg3k+AtgUcIl3hJiXNMlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2946&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim, where it is vulnerable to a use-after-free in the vim_vsnprintf_typval function. This flaw allows a specially crafted file to crash a program, use unexpected values, or execute code.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-08-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-2946 https://bugzilla.redhat.com/show_bug.cgi?id=2120993 https://www.cve.org/CVERecord?id=CVE-2022-2946 https://nvd.nist.gov/vuln/detail/CVE-2022-2946 https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2946.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ymKqobod4xPivmLT/iq9oQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ymKqobod4xPivmLT/iq9oQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41990&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Libgcrypt. During Dilithium signing operations, the library fails to perform a bounds check when writing to a static array. While the data involved is not directly controlled by an attacker, this vulnerability could lead to memory corruption, potentially resulting in a denial of service (DoS) or affecting data integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-23T04:39:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-41990 https://bugzilla.redhat.com/show_bug.cgi?id=2461068 https://www.cve.org/CVERecord?id=CVE-2026-41990 https://nvd.nist.gov/vuln/detail/CVE-2026-41990 https://dev.gnupg.org/T8208 https://lists.gnupg.org/pipermail/gnupg-announce/2026q2/000503.html https://www.openwall.com/lists/oss-security/2026/04/21/1 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-41990.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ynnULh1l7jTnQPnMak7suQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ynnULh1l7jTnQPnMak7suQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5702&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the optimized strcmp glibc function for the Power10 CPU architecture. GNU C library versions from 2.39 onward overwrite two vector registers in a way that can disrupt the control flow of a program.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-05T18:23:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5702 https://bugzilla.redhat.com/show_bug.cgi?id=2370472 https://www.cve.org/CVERecord?id=CVE-2025-5702 https://nvd.nist.gov/vuln/detail/CVE-2025-5702 https://sourceware.org/bugzilla/show_bug.cgi?id=33056 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5702.json https://access.redhat.com/errata/RHSA-2025:9877&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-gconv-extra&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.20&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yq06et41/lBQ0nsMvLOG/A==&#34;: {&#xA;      &#34;id&#34;: &#34;yq06et41/lBQ0nsMvLOG/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3138&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3138 https://bugzilla.redhat.com/show_bug.cgi?id=2213748 https://www.cve.org/CVERecord?id=CVE-2023-3138 https://nvd.nist.gov/vuln/detail/CVE-2023-3138 https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/304a654a0d57bf0f00d8998185f0360332cfa36c https://lists.x.org/archives/xorg-announce/2023-June/003406.html https://lists.x.org/archives/xorg-announce/2023-June/003407.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3138.json https://access.redhat.com/errata/RHSA-2023:6497&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libX11-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.7.0-8.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yqjwgy5aE2uj+E3fW5VIUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;yqjwgy5aE2uj+E3fW5VIUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yrD0ecVnK2Y23POHVpCwiA==&#34;: {&#xA;      &#34;id&#34;: &#34;yrD0ecVnK2Y23POHVpCwiA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48554&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in file, a program used to identify a particular file according to the type of data contained by the file. This issue occurs when processing a specially crafted file, causing a stack-based buffer over-read, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-01-21T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-48554 https://bugzilla.redhat.com/show_bug.cgi?id=2235714 https://www.cve.org/CVERecord?id=CVE-2022-48554 https://nvd.nist.gov/vuln/detail/CVE-2022-48554 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-48554.json https://access.redhat.com/errata/RHSA-2024:2512&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:5.39-16.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yrkfySEOvQHtbEYpAUNs0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;yrkfySEOvQHtbEYpAUNs0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6923&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the email module that uses Python language. The email module doesn&#39;t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6923 https://bugzilla.redhat.com/show_bug.cgi?id=2302255 https://www.cve.org/CVERecord?id=CVE-2024-6923 https://nvd.nist.gov/vuln/detail/CVE-2024-6923 https://github.com/python/cpython/issues/121650 https://github.com/python/cpython/pull/122233 https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6923.json https://access.redhat.com/errata/RHSA-2024:6163&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.18-3.el9_4.5&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yubezWiwTBzlJyfKBBah5A==&#34;: {&#xA;      &#34;id&#34;: &#34;yubezWiwTBzlJyfKBBah5A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ywuC+FbT7FV6PIDV8mhosw==&#34;: {&#xA;      &#34;id&#34;: &#34;ywuC+FbT7FV6PIDV8mhosw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1527&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in undici, a Node.js HTTP/1.1 client. This vulnerability allows a remote attacker to inject malicious data into HTTP headers or prematurely end HTTP requests by sending specially crafted input to the `upgrade` option of `client.request()`. This is possible because undici does not properly validate input for invalid header characters, which could lead to unauthorized information disclosure or bypassing of security controls.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T20:17:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1527 https://bugzilla.redhat.com/show_bug.cgi?id=2447141 https://www.cve.org/CVERecord?id=CVE-2026-1527 https://nvd.nist.gov/vuln/detail/CVE-2026-1527 https://cna.openjsf.org/security-advisories.html https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq https://hackerone.com/reports/3487198 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1527.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yycUgbk2YE6jCbX68FtPLA==&#34;: {&#xA;      &#34;id&#34;: &#34;yycUgbk2YE6jCbX68FtPLA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-55130&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-55130 https://bugzilla.redhat.com/show_bug.cgi?id=2431352 https://www.cve.org/CVERecord?id=CVE-2025-55130 https://nvd.nist.gov/vuln/detail/CVE-2025-55130 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-55130.json https://access.redhat.com/errata/RHSA-2026:2782&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.0-1.module+el9.7.0+23896+b5802de9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yz/zQzn72boszb6Cab3Y9w==&#34;: {&#xA;      &#34;id&#34;: &#34;yz/zQzn72boszb6Cab3Y9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractContigSamplesShifted24bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0796 https://bugzilla.redhat.com/show_bug.cgi?id=2170146 https://www.cve.org/CVERecord?id=CVE-2023-0796 https://nvd.nist.gov/vuln/detail/CVE-2023-0796 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0796.json https://access.redhat.com/errata/RHSA-2023:3711&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-8.el9_2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yzANls12pwNNRyqxmDGy4g==&#34;: {&#xA;      &#34;id&#34;: &#34;yzANls12pwNNRyqxmDGy4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-7039&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7039 https://bugzilla.redhat.com/show_bug.cgi?id=2392423 https://www.cve.org/CVERecord?id=CVE-2025-7039 https://nvd.nist.gov/vuln/detail/CVE-2025-7039 https://gitlab.gnome.org/GNOME/glib/-/issues/3716 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7039.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yzaTkDwqkUqRGFQFgsnIAA==&#34;: {&#xA;      &#34;id&#34;: &#34;yzaTkDwqkUqRGFQFgsnIAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59466&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in Node.js error handling where \&#34;Maximum call stack size exceeded\&#34; errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(&#39;uncaughtException&#39;)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59466 https://bugzilla.redhat.com/show_bug.cgi?id=2431343 https://www.cve.org/CVERecord?id=CVE-2025-59466 https://nvd.nist.gov/vuln/detail/CVE-2025-59466 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59466.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yzs4f0vIG+ordPdSm2meFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;yzs4f0vIG+ordPdSm2meFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6069&#34;,&#xA;      &#34;description&#34;: &#34;A denial-of-service (DoS) vulnerability has been discovered in Python&#39;s html.parser.HTMLParser class. When processing specially malformed HTML input, the parsing runtime can become quadratic with respect to the input size. This significantly increased processing time can lead to excessive resource consumption, ultimately causing a denial-of-service condition in applications that rely on this parser.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-17T13:39:46Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6069 https://bugzilla.redhat.com/show_bug.cgi?id=2373234 https://www.cve.org/CVERecord?id=CVE-2025-6069 https://nvd.nist.gov/vuln/detail/CVE-2025-6069 https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949 https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41 https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b https://github.com/python/cpython/issues/135462 https://github.com/python/cpython/pull/135464 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6069.json https://access.redhat.com/errata/RHSA-2025:23342&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-2.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;z+NiHm13dFQpx3ZynhKpIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;z+NiHm13dFQpx3ZynhKpIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-05T17:48:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68121 https://bugzilla.redhat.com/show_bug.cgi?id=2437111 https://www.cve.org/CVERecord?id=CVE-2025-68121 https://nvd.nist.gov/vuln/detail/CVE-2025-68121 https://go.dev/cl/737700 https://go.dev/issue/77217 https://groups.google.com/g/golang-announce/c/K09ubi9FQFk https://pkg.go.dev/vuln/GO-2026-4337 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68121.json https://access.redhat.com/errata/RHSA-2026:2709&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.25.7-1.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;z+rEPA1G209OEh34yG1aVQ==&#34;: {&#xA;      &#34;id&#34;: &#34;z+rEPA1G209OEh34yG1aVQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js. A remote attacker can exploit this vulnerability in Node.js HTTP/2 servers by sending specially crafted WINDOW_UPDATE frames on stream 0 (connection-level). These frames can cause the flow control window to exceed its maximum value, leading to a memory leak as Http2Session objects are not properly cleaned up. This can result in resource exhaustion and a Denial of Service (DoS) condition for the server.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T19:07:28Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21714 https://bugzilla.redhat.com/show_bug.cgi?id=2453161 https://www.cve.org/CVERecord?id=CVE-2026-21714 https://nvd.nist.gov/vuln/detail/CVE-2026-21714 https://nodejs.org/en/blog/vulnerability/march-2026-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21714.json https://access.redhat.com/errata/RHSA-2026:7350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-full-i18n&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.14.1-2.module+el9.7.0+24166+51c9666b&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;z/LMTnJeia+du5LSYhMD2w==&#34;: {&#xA;      &#34;id&#34;: &#34;z/LMTnJeia+du5LSYhMD2w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-22745&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tpm2-tss, which is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions, `Tss2_RC_SetHandler` and `Tss2_RC_Decode` index into the `layer_handler` with an 8-bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries. Trying to add a handler for higher-numbered layers or to decode a response code with a layer number, reads/writes past the end of the buffer. This buffer overrun could result in arbitrary code execution. An example attack is a man-in-the-middle (MiTM) bus attack that returns 0xFFFFFFFFFF for the RC. Given the common use case of TPM modules, an attacker must have local access to the target machine with local system privileges, which allows access to the TPM system. Usually, TPM access requires administrative privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-01-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-22745 https://bugzilla.redhat.com/show_bug.cgi?id=2162610 https://www.cve.org/CVERecord?id=CVE-2023-22745 https://nvd.nist.gov/vuln/detail/CVE-2023-22745 https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx67 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-22745.json https://access.redhat.com/errata/RHSA-2023:6685&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tpm2-tss&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.2.2-2.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;: {&#xA;      &#34;id&#34;: &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;z12tQXXi14IQVfwzjztF5Q==&#34;: {&#xA;      &#34;id&#34;: &#34;z12tQXXi14IQVfwzjztF5Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32990&#34;,&#xA;      &#34;description&#34;: &#34;A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-09T07:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-32990 https://bugzilla.redhat.com/show_bug.cgi?id=2359620 https://www.cve.org/CVERecord?id=CVE-2025-32990 https://nvd.nist.gov/vuln/detail/CVE-2025-32990 https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32990.json https://access.redhat.com/errata/RHSA-2025:16116&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-6.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;z1fiDjJjV7T+4MZClzquUA==&#34;: {&#xA;      &#34;id&#34;: &#34;z1fiDjJjV7T+4MZClzquUA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5678&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL, which caused the generation or checking of long X9.42 DH keys or parameters to be much slower than expected. This issue could lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-5678 https://bugzilla.redhat.com/show_bug.cgi?id=2248616 https://www.cve.org/CVERecord?id=CVE-2023-5678 https://nvd.nist.gov/vuln/detail/CVE-2023-5678 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6 https://www.openssl.org/news/secadv/20231106.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5678.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;z1wZ8EsA73QQBAtKsHeNNA==&#34;: {&#xA;      &#34;id&#34;: &#34;z1wZ8EsA73QQBAtKsHeNNA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-25193&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found HarfBuzz. This flaw allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-02-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-25193 https://bugzilla.redhat.com/show_bug.cgi?id=2167254 https://www.cve.org/CVERecord?id=CVE-2023-25193 https://nvd.nist.gov/vuln/detail/CVE-2023-25193 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25193.json https://access.redhat.com/errata/RHSA-2024:2410&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;harfbuzz-icu&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.7.4-10.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;z52r/0OKaWAkLWR5L4SEkQ==&#34;: {&#xA;      &#34;id&#34;: &#34;z52r/0OKaWAkLWR5L4SEkQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-23T19:57:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://www.cve.org/CVERecord?id=CVE-2025-8058 https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8058.json https://access.redhat.com/errata/RHSA-2025:12748&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-common&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-168.el9_6.23&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;z6u9MfxJ5450gPIBXVMBZg==&#34;: {&#xA;      &#34;id&#34;: &#34;z6u9MfxJ5450gPIBXVMBZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-23167&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the HTTP parser of Node.js. This vulnerability allows attackers to perform request smuggling and bypass proxy-based access controls via improperly terminated HTTP/1 headers using \\r\\n\\rX instead of the standard \\r\\n\\r\\n.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T01:25:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-23167 https://bugzilla.redhat.com/show_bug.cgi?id=2367167 https://www.cve.org/CVERecord?id=CVE-2025-23167 https://nvd.nist.gov/vuln/detail/CVE-2025-23167 https://nodejs.org/en/blog/vulnerability/may-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23167.json https://access.redhat.com/errata/RHSA-2025:8468&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.19.2-1.module+el9.6.0+23146+be9976bd&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zAQhwfD+1kpXY0CwZC6HxA==&#34;: {&#xA;      &#34;id&#34;: &#34;zAQhwfD+1kpXY0CwZC6HxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-24014&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Vim. In silent Ex mode (-s -e), Vim typically doesn&#39;t show a screen and operates silently in batch mode, however, it is possible to trigger the function that handles the scrolling of a GUI version of Vim via binary characters. The function that handles the scrolling may trigger a redraw, which will access the ScreenLines pointer and can cause a segmentation fault condition. This may lead to an application crash or other undefined behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-20T22:53:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-24014 https://bugzilla.redhat.com/show_bug.cgi?id=2339074 https://www.cve.org/CVERecord?id=CVE-2025-24014 https://nvd.nist.gov/vuln/detail/CVE-2025-24014 https://github.com/vim/vim/commit/9d1bed5eccdbb46a26b8a484f5e9163c40e63919 https://github.com/vim/vim/security/advisories/GHSA-j3g9-wg22-v955 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-24014.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zBagx41pcIC7Z4HwA6qQbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zBagx41pcIC7Z4HwA6qQbQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-21637&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T20:41:55Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-21637 https://bugzilla.redhat.com/show_bug.cgi?id=2431340 https://www.cve.org/CVERecord?id=CVE-2026-21637 https://nvd.nist.gov/vuln/detail/CVE-2026-21637 https://nodejs.org/en/blog/vulnerability/december-2025-security-releases https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-21637.json https://access.redhat.com/errata/RHSA-2026:2781&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:24.13.0-1.module+el9.7.0+23894+c8377628&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zBm31RctqcDF3ITqeA/9oA==&#34;: {&#xA;      &#34;id&#34;: &#34;zBm31RctqcDF3ITqeA/9oA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-27983&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-27983 https://bugzilla.redhat.com/show_bug.cgi?id=2272764 https://www.cve.org/CVERecord?id=CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983 https://nodejs.org/en/blog/vulnerability/april-2024-security-releases https://nowotarski.info/http2-continuation-flood/ https://www.kb.cert.org/vuls/id/421644 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-27983.json https://access.redhat.com/errata/RHSA-2024:2779&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:18.20.2-2.module+el9.4.0+21742+692df1ea&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zDmU3WG0c3AQYw7NFebUCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zDmU3WG0c3AQYw7NFebUCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3234&#34;,&#xA;      &#34;description&#34;: &#34;Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3234 https://bugzilla.redhat.com/show_bug.cgi?id=2129370 https://www.cve.org/CVERecord?id=CVE-2022-3234 https://nvd.nist.gov/vuln/detail/CVE-2022-3234 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3234.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zE3cPdw4Ma9jQQUVeE/hdg==&#34;: {&#xA;      &#34;id&#34;: &#34;zE3cPdw4Ma9jQQUVeE/hdg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-35414&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSH. This vulnerability arises from the incorrect handling of the authorized_keys principals option in uncommon scenarios. Specifically, when a principals list is used with a Certificate Authority that includes comma characters, OpenSSH may misinterpret the input. This could lead to security bypasses, potentially allowing unintended access or information disclosure in specific authentication contexts.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T17:08:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-35414 https://bugzilla.redhat.com/show_bug.cgi?id=2454490 https://www.cve.org/CVERecord?id=CVE-2026-35414 https://nvd.nist.gov/vuln/detail/CVE-2026-35414 https://marc.info/?l=openssh-unix-dev\u0026m=177513443901484\u0026w=2 https://www.openssh.org/releasenotes.html#10.3p1 https://www.openwall.com/lists/oss-security/2026/04/02/3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-35414.json https://access.redhat.com/errata/RHSA-2026:13381&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh-clients&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-49.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zEKtVLhCQn3xgvKNhFo2bg==&#34;: {&#xA;      &#34;id&#34;: &#34;zEKtVLhCQn3xgvKNhFo2bg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3115&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in golang: cmd/go, in which Go can execute arbitrary commands at build time when cgo is in use on Windows OS. On Linux/Unix, only users who have \&#34;.\&#34; listed explicitly in their PATH variable are affected. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-01-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3115 https://bugzilla.redhat.com/show_bug.cgi?id=1918761 https://www.cve.org/CVERecord?id=CVE-2021-3115 https://nvd.nist.gov/vuln/detail/CVE-2021-3115 https://groups.google.com/g/golang-announce/c/mperVMGa98w https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3115.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zFG8iDklz8FcuYliYZGkqA==&#34;: {&#xA;      &#34;id&#34;: &#34;zFG8iDklz8FcuYliYZGkqA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27533&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27533 https://bugzilla.redhat.com/show_bug.cgi?id=2179062 https://www.cve.org/CVERecord?id=CVE-2023-27533 https://nvd.nist.gov/vuln/detail/CVE-2023-27533 https://curl.se/docs/CVE-2023-27533.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27533.json https://access.redhat.com/errata/RHSA-2023:6679&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-devel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-26.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zFZE1hLph4hR8T7aNvRt0w==&#34;: {&#xA;      &#34;id&#34;: &#34;zFZE1hLph4hR8T7aNvRt0w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-30T12:20:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-40909 https://bugzilla.redhat.com/show_bug.cgi?id=2369407 https://www.cve.org/CVERecord?id=CVE-2025-40909 https://nvd.nist.gov/vuln/detail/CVE-2025-40909 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch https://github.com/Perl/perl5/issues/10387 https://github.com/Perl/perl5/issues/23010 https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads https://www.openwall.com/lists/oss-security/2025/05/22/2 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-40909.json https://access.redhat.com/errata/RHSA-2025:11804&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl-B&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.80-481.1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zH/R3mCgsX+vslxcP7p4cg==&#34;: {&#xA;      &#34;id&#34;: &#34;zH/R3mCgsX+vslxcP7p4cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-6387&#34;,&#xA;      &#34;description&#34;: &#34;A security regression (CVE-2006-5051) was discovered in OpenSSH&#39;s server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-01T08:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-6387 https://bugzilla.redhat.com/show_bug.cgi?id=2294604 https://www.cve.org/CVERecord?id=CVE-2024-6387 https://nvd.nist.gov/vuln/detail/CVE-2024-6387 https://santandersecurityresearch.github.io/blog/sshing_the_masses.html https://www.openssh.com/txt/release-9.8 https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-6387.json https://access.redhat.com/errata/RHSA-2024:4312&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:8.7p1-38.el9_4.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zLUPO/DSeItPLWNqYd2DSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zLUPO/DSeItPLWNqYd2DSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0727&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The optional ContentInfo fields can be set to null, even if the \&#34;type\&#34; is a valid value, which can lead to a null dereference error that may cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0727 https://bugzilla.redhat.com/show_bug.cgi?id=2259944 https://www.cve.org/CVERecord?id=CVE-2024-0727 https://nvd.nist.gov/vuln/detail/CVE-2024-0727 https://github.com/openssl/openssl/pull/23362 https://www.openssl.org/news/secadv/20240125.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0727.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zNwhU1to6ohdg5Ws/JmM/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;zNwhU1to6ohdg5Ws/JmM/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://www.cve.org/CVERecord?id=CVE-2023-4813 https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4813.json https://access.redhat.com/errata/RHBA-2024:2413&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc-langpack-en&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-100.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zRaIctSo0IHgkpOD2xBvHw==&#34;: {&#xA;      &#34;id&#34;: &#34;zRaIctSo0IHgkpOD2xBvHw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-47907&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in database/sql. Concurrent queries can produce unexpected results when a query is cancelled during a Scan method call on returned Rows, creating a race condition. This vulnerability allows an attacker who can initiate and cancel queries to trigger this condition, possibly leading to inconsistent data being returned to the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-08-07T15:25:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-47907 https://bugzilla.redhat.com/show_bug.cgi?id=2387083 https://www.cve.org/CVERecord?id=CVE-2025-47907 https://nvd.nist.gov/vuln/detail/CVE-2025-47907 https://go.dev/cl/693735 https://go.dev/issue/74831 https://groups.google.com/g/golang-announce/c/x5MKroML2yM https://pkg.go.dev/vuln/GO-2025-3849 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-47907.json https://access.redhat.com/errata/RHSA-2025:13935&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang-src&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.24.6-1.el9_6&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zYJDi0K0bIQE0iPOdJilbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zYJDi0K0bIQE0iPOdJilbQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27137&#34;,&#xA;      &#34;description&#34;: &#34;A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:28:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27137 https://bugzilla.redhat.com/show_bug.cgi?id=2445345 https://www.cve.org/CVERecord?id=CVE-2026-27137 https://nvd.nist.gov/vuln/detail/CVE-2026-27137 https://go.dev/cl/752182 https://go.dev/issue/77952 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://pkg.go.dev/vuln/GO-2026-4599 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27137.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-toolset&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zYQmqjwBNORHvvIZjBy6jg==&#34;: {&#xA;      &#34;id&#34;: &#34;zYQmqjwBNORHvvIZjBy6jg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25679&#34;,&#xA;      &#34;description&#34;: &#34;The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-06T21:28:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25679 https://bugzilla.redhat.com/show_bug.cgi?id=2445356 https://www.cve.org/CVERecord?id=CVE-2026-25679 https://nvd.nist.gov/vuln/detail/CVE-2026-25679 https://go.dev/cl/752180 https://go.dev/issue/77578 https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk https://pkg.go.dev/vuln/GO-2026-4601 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25679.json https://access.redhat.com/errata/RHSA-2026:8841&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;go-srpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.6.0-14.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zdrK/Mitm8rUuLp2HwWnmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zdrK/Mitm8rUuLp2HwWnmQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-31498&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This vulnerability allows a remote or local attacker to cause a use-after-free, potentially leading to application-level denial of service or other unexpected behavior via manipulation of DNS responses or network conditions during query processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T13:53:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-31498 https://bugzilla.redhat.com/show_bug.cgi?id=2358271 https://www.cve.org/CVERecord?id=CVE-2025-31498 https://nvd.nist.gov/vuln/detail/CVE-2025-31498 https://github.com/c-ares/c-ares/commit/29d38719112639d8c0ba910254a3dd4f482ea2d1 https://github.com/c-ares/c-ares/pull/821 https://github.com/c-ares/c-ares/security/advisories/GHSA-6hxc-62jh-p29v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-31498.json https://access.redhat.com/errata/RHSA-2025:7426&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.8.2-1.20.19.1.1.module+el9.6.0+23053+4195b0b2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zec/1Gm7Idd0fQLOCpU8jA==&#34;: {&#xA;      &#34;id&#34;: &#34;zec/1Gm7Idd0fQLOCpU8jA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15367&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the poplib module in the Python standard library. The poplib module does not reject control characters, such as newlines, in user-controlled input passed to POP3 commands. This issue allows an attacker to inject additional commands to be executed in the POP3 server.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:47:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15367 https://bugzilla.redhat.com/show_bug.cgi?id=2431373 https://www.cve.org/CVERecord?id=CVE-2025-15367 https://nvd.nist.gov/vuln/detail/CVE-2025-15367 https://github.com/python/cpython/issues/143923 https://github.com/python/cpython/pull/143924 https://mail.python.org/archives/list/security-announce@python.org/thread/CBFBOWVGGUJFSGITQCCBZS4GEYYZ7ZNE/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15367.json https://access.redhat.com/errata/RHSA-2026:4168&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.9.25-3.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zi+zTCtHwI+xWITxpaOJBw==&#34;: {&#xA;      &#34;id&#34;: &#34;zi+zTCtHwI+xWITxpaOJBw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3817&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in OpenSSL. This security issue occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-3817 https://bugzilla.redhat.com/show_bug.cgi?id=2227852 https://www.cve.org/CVERecord?id=CVE-2023-3817 https://nvd.nist.gov/vuln/detail/CVE-2023-3817 https://www.openssl.org/news/secadv/20230731.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3817.json https://access.redhat.com/errata/RHSA-2024:2447&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.0.7-27.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zidvm9MkkP4S62Ofl4+xSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zidvm9MkkP4S62Ofl4+xSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-31498&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in c-ares. This vulnerability allows a remote or local attacker to cause a use-after-free, potentially leading to application-level denial of service or other unexpected behavior via manipulation of DNS responses or network conditions during query processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-08T13:53:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-31498 https://bugzilla.redhat.com/show_bug.cgi?id=2358271 https://www.cve.org/CVERecord?id=CVE-2025-31498 https://nvd.nist.gov/vuln/detail/CVE-2025-31498 https://github.com/c-ares/c-ares/commit/29d38719112639d8c0ba910254a3dd4f482ea2d1 https://github.com/c-ares/c-ares/pull/821 https://github.com/c-ares/c-ares/security/advisories/GHSA-6hxc-62jh-p29v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-31498.json https://access.redhat.com/errata/RHSA-2025:7433&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npm&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:10.9.2-1.22.15.0.1.module+el9.6.0+23062+9e7801b9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zj6YFnKGohJeDG/BPBNZLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zj6YFnKGohJeDG/BPBNZLQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25547&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-04T21:51:17Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25547 https://bugzilla.redhat.com/show_bug.cgi?id=2436942 https://www.cve.org/CVERecord?id=CVE-2026-25547 https://nvd.nist.gov/vuln/detail/CVE-2026-25547 https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25547.json https://access.redhat.com/errata/RHSA-2026:7302&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:22.22.2-1.module+el9.7.0+24157+8ddb2461&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zjZHjKf2l5+qY9/XYdFMQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zjZHjKf2l5+qY9/XYdFMQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39322&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39322 https://bugzilla.redhat.com/show_bug.cgi?id=2237778 https://www.cve.org/CVERecord?id=CVE-2023-39322 https://nvd.nist.gov/vuln/detail/CVE-2023-39322 https://go.dev/cl/523039 https://go.dev/issue/62266 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://vuln.go.dev/ID/GO-2023-2045.json https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39322.json https://access.redhat.com/errata/RHBA-2023:6364&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;golang&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.20.10-1.el9_3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libuuid&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;: {&#xA;      &#34;id&#34;: &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14017&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-08T10:07:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14017 https://bugzilla.redhat.com/show_bug.cgi?id=2427870 https://www.cve.org/CVERecord?id=CVE-2025-14017 https://nvd.nist.gov/vuln/detail/CVE-2025-14017 https://curl.se/docs/CVE-2025-14017.html https://curl.se/docs/CVE-2025-14017.json https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14017.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ztlVnn1P+W74ZN9vh2BisQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ztlVnn1P+W74ZN9vh2BisQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22025&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-22025 https://bugzilla.redhat.com/show_bug.cgi?id=2270559 https://www.cve.org/CVERecord?id=CVE-2024-22025 https://nvd.nist.gov/vuln/detail/CVE-2024-22025 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22025.json https://access.redhat.com/errata/RHSA-2024:2853&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nodejs-docs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;noarch&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:20.12.2-2.module+el9.4.0+21731+46b5b8a7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zwpNi+NBoVUfQ5Ed4vkNug==&#34;: {&#xA;      &#34;id&#34;: &#34;zwpNi+NBoVUfQ5Ed4vkNug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9900&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Libtiff. This vulnerability is a \&#34;write-what-where\&#34; condition, triggered when the library processes a specially crafted TIFF image file.\n\nBy providing an abnormally large image height value in the file&#39;s metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-22T14:29:35Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9900 https://bugzilla.redhat.com/show_bug.cgi?id=2392784 https://www.cve.org/CVERecord?id=CVE-2025-9900 https://nvd.nist.gov/vuln/detail/CVE-2025-9900 https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file https://gitlab.com/libtiff/libtiff/-/issues/704 https://gitlab.com/libtiff/libtiff/-/merge_requests/732 https://libtiff.gitlab.io/libtiff/releases/v4.7.1.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9900.json https://access.redhat.com/errata/RHSA-2025:19113&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtiff&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:4.4.0-13.el9_6.2&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zx97OaxgXH8j+mFWesQySQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zx97OaxgXH8j+mFWesQySQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-1620&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in vim, which is vulnerable to a NULL pointer dereference in vim_regexec_string() of the regexp.c function. This flaw allows a specially crafted file to crash software when opened in vim.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-05-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-1620 https://bugzilla.redhat.com/show_bug.cgi?id=2083029 https://www.cve.org/CVERecord?id=CVE-2022-1620 https://nvd.nist.gov/vuln/detail/CVE-2022-1620 https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51/ https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1620.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;vim&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;package_vulnerabilities&#34;: {&#xA;    &#34;++K+RsmgWfVk2mj1+hzWKA==&#34;: [&#xA;      &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;&#xA;    ],&#xA;    &#34;+LQ46YAn9giMKDZRMCUpfg==&#34;: [&#xA;      &#34;wEZLQNUZyYD6Rz0ucz5fzQ==&#34;,&#xA;      &#34;ZAUFPHu5UQZ+B2n+SrWIqQ==&#34;&#xA;    ],&#xA;    &#34;+Mkqc/Y23wK8i6e0RDbi0w==&#34;: [&#xA;      &#34;FKu6EFoCfpksmq+M7pL02Q==&#34;,&#xA;      &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;      &#34;eDxAdI0cgddAZnBSd4FI0Q==&#34;&#xA;    ],&#xA;    &#34;+yIdH2Pb8SGFuXnry3uK/A==&#34;: [&#xA;      &#34;FpA1FaTnKUwdPkl0KHAbaw==&#34;,&#xA;      &#34;IfJyKZ52fwKruf/mbOKmYg==&#34;,&#xA;      &#34;NCiKXZEXo4Jw5tEf8LgPhA==&#34;,&#xA;      &#34;+56lxqiE6H3D8IED88OxVw==&#34;,&#xA;      &#34;0YTTGmYE/9YKV7yhSG2wCw==&#34;,&#xA;      &#34;ah5gJjq6ntKGHe05l2QLEA==&#34;,&#xA;      &#34;mQgdyTODJZ/UTHC5haonAg==&#34;,&#xA;      &#34;psclC23VyV2exiVERqdTxQ==&#34;,&#xA;      &#34;/ik4PFVpoYSF6+jKJPGHoA==&#34;,&#xA;      &#34;flk8YBa9lwv0ud+syzocqA==&#34;,&#xA;      &#34;TszqopCoskBv4coMA3/peg==&#34;,&#xA;      &#34;0K8l/WAiKh6VWmmuYinJBA==&#34;,&#xA;      &#34;n6coP572PTpURrDz8Q2egA==&#34;,&#xA;      &#34;RxwFiIUPJYMo6r5lfv+sdQ==&#34;,&#xA;      &#34;FCO2B+o+asJ7qjlQcg/SPw==&#34;,&#xA;      &#34;/ZDgobr+usix01fmflBpYg==&#34;,&#xA;      &#34;NWzlm1dQzX7pu+Y8xKgSEw==&#34;,&#xA;      &#34;XWaBdbEJiHpYXT1f1eBk1Q==&#34;,&#xA;      &#34;BbM0NZsMsZnNUi1ybIzssw==&#34;,&#xA;      &#34;IJSMEZBpGJDyClVadkCLsA==&#34;,&#xA;      &#34;OLjLMRdWldBjSuTKpYjduw==&#34;,&#xA;      &#34;G7l0N6DSTPJhrn3beR4QLg==&#34;,&#xA;      &#34;X1UyeDYfkBXcgz2M5KA5LQ==&#34;,&#xA;      &#34;LyQcB6aDtcDf3FmzBVHSKQ==&#34;,&#xA;      &#34;F/boCR7kXAGa4+GAELD7Tg==&#34;,&#xA;      &#34;IvL651FnAzrxSYOiOuXMlw==&#34;,&#xA;      &#34;eFT7gARF6nhlfhMNp4LgNA==&#34;,&#xA;      &#34;t0yM+3xw1ZQW3unHh4xTyA==&#34;,&#xA;      &#34;5LfrNnR/sOzaqKXS35YFOw==&#34;,&#xA;      &#34;55t0Oo9c3cgFDjqyaNS70A==&#34;,&#xA;      &#34;CPaw49wKw01O8KSP+trXbw==&#34;,&#xA;      &#34;7+zZLUPhCOA3BFrcusoKFg==&#34;,&#xA;      &#34;1uk6R7fJdNFj2gxMFc6jOA==&#34;,&#xA;      &#34;by+PAyhAcd2LS2O/tZxbRQ==&#34;,&#xA;      &#34;LJERbH00ig5nWiqOMKw/Xg==&#34;,&#xA;      &#34;nmCFeE95EAFeqYx2GUkIrQ==&#34;,&#xA;      &#34;Lc5MrJdT06D8uHMkpa1+Og==&#34;,&#xA;      &#34;g0XDRtU68aJjKkBv7OKREA==&#34;,&#xA;      &#34;V4GddSO/lMB9AeE2VC0gSA==&#34;,&#xA;      &#34;i1aZclSgDVfSpq3wWatknQ==&#34;&#xA;    ],&#xA;    &#34;/FMjm+UzO0PTaS3Td0lhkw==&#34;: [&#xA;      &#34;j7yoSCks+i8LevHtgFwCwQ==&#34;&#xA;    ],&#xA;    &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: [&#xA;      &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;&#xA;    ],&#xA;    &#34;/t0e+LuglIbDcO/k67Hr2A==&#34;: [&#xA;      &#34;XW4X9/W6MfETfE/VICA4Jw==&#34;,&#xA;      &#34;fSeU4QTAs+fY+ihLpgdM9A==&#34;,&#xA;      &#34;R1x4adkbkgVhxc9hzgUZcA==&#34;,&#xA;      &#34;n39YhRffL6tFFAy/S18A8Q==&#34;&#xA;    ],&#xA;    &#34;/th8aUKrkgR3Sw9KSBM+CA==&#34;: [&#xA;      &#34;s0PUMgVnEtuqOkBdJNAqUA==&#34;&#xA;    ],&#xA;    &#34;0N0D43vK8KV4kQOq2LQn7g==&#34;: [&#xA;      &#34;bKE3ov27WR5dMz8a/M+jUA==&#34;,&#xA;      &#34;whMVc0u5Lzujkr6AuzQzMw==&#34;,&#xA;      &#34;QY4aLgQQjP1oPPp38ArMrQ==&#34;,&#xA;      &#34;uhGUZtCY1OXgM1L55/upYA==&#34;,&#xA;      &#34;xYZxVBz2xY/aoDQPqi4nCQ==&#34;,&#xA;      &#34;PT2kHv2z8lzB78apv1Gy+A==&#34;,&#xA;      &#34;LcEYljn+QTWUC36NwQCf7w==&#34;,&#xA;      &#34;7CqLd0zk1hiFU3yrvTTdyg==&#34;,&#xA;      &#34;IfZDrkeHpfXHfjHzETuKbw==&#34;,&#xA;      &#34;cUH9U4T8Wpzm/UIIektEAQ==&#34;,&#xA;      &#34;DCflC/lDsmgt9IFXJM3PyA==&#34;,&#xA;      &#34;SjbW0rogoRJo0my37ozMDg==&#34;,&#xA;      &#34;2DPl1NLEsHotw7kYOPR/8A==&#34;,&#xA;      &#34;2432H9ZBrMWDJ7HhyQT63A==&#34;,&#xA;      &#34;pwFS1oPwyZIRVgVgtAgSPQ==&#34;,&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;icr9XD5DN3YDWvP3naYL+g==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;Q2+f0ITzWPp+YCesnwp1Ng==&#34;,&#xA;      &#34;O0QnjS+0zUH+vff5xaIpCw==&#34;,&#xA;      &#34;eMVMlNYLRzjk+Xt/peAYqg==&#34;,&#xA;      &#34;AJcMDco3zISLrE/7+42hGA==&#34;,&#xA;      &#34;Rf7m+dbWxZxBNm1A9nfdqg==&#34;,&#xA;      &#34;wCSSFNSA2T9dnpBY58W6Yg==&#34;,&#xA;      &#34;ihcyIiYlnktNuXSrEgrQjg==&#34;,&#xA;      &#34;G77a8vVkDX/8Yt/v29MOhA==&#34;,&#xA;      &#34;glwEUWfaBwNPBrXUJo34tg==&#34;,&#xA;      &#34;GEDO3j20WMwIj0JMNMq5Iw==&#34;,&#xA;      &#34;0UWL07sxLog3CGNaaYYQxQ==&#34;,&#xA;      &#34;G/dmoDOpwh0GrsMovfySVw==&#34;,&#xA;      &#34;CSv4lPWUxMcEgRRI/WkPaA==&#34;,&#xA;      &#34;aQ/ax84rpyWNveVTm/MQww==&#34;,&#xA;      &#34;eOOfcRLf3CHL5spaYEPovQ==&#34;&#xA;    ],&#xA;    &#34;0Yvc2+M8FAry625wuL4S5A==&#34;: [&#xA;      &#34;x0tnd8GOUfHQCdr5bXMpHA==&#34;,&#xA;      &#34;HjJnWaqrr4SaFPjzu8hVkg==&#34;,&#xA;      &#34;8utuZQ/Ix8fDNAmmSZivvQ==&#34;&#xA;    ],&#xA;    &#34;0wIoN0pFyBSc9eVtRdIOWA==&#34;: [&#xA;      &#34;Y7j+Hhv6OMvu2cmEQkev4Q==&#34;,&#xA;      &#34;IsqBfnAxrh9UbW8oQaSR7w==&#34;,&#xA;      &#34;SU1MGh9+Zg3Zuy+khiN0Og==&#34;,&#xA;      &#34;tDVJVtVXjEp2hZmPcOFM9w==&#34;,&#xA;      &#34;J6GavUf0zh8+C0zHHTDYfw==&#34;,&#xA;      &#34;4JIGhO7+fAz+LPTFEuBHUg==&#34;,&#xA;      &#34;WALxwIFXDH8ZvKesDKBFiQ==&#34;,&#xA;      &#34;U61IeOaU1v6bOHJxSPbCCw==&#34;,&#xA;      &#34;tZCJ3EMmfQYEKmNY0R6pgg==&#34;,&#xA;      &#34;eNUwUuL3W5wSpnxJfClXhg==&#34;,&#xA;      &#34;zec/1Gm7Idd0fQLOCpU8jA==&#34;,&#xA;      &#34;wT8kuZRd+rqr4JY0ByO9Eg==&#34;,&#xA;      &#34;XhkP3BSjbvvRVX8X7UztjA==&#34;,&#xA;      &#34;FUR7T9AnekkZ5hPUz2WP6Q==&#34;,&#xA;      &#34;SRL0fsSEDtOf7vYyf/BewQ==&#34;,&#xA;      &#34;O+NG96g+kK1DtaJEFTfwuA==&#34;,&#xA;      &#34;XhhNgYgTJmDdYc90YuE8vw==&#34;,&#xA;      &#34;bpM7BDVV04atOPduc9mI8Q==&#34;,&#xA;      &#34;241S2RmgJzaFxfQcayo1Pw==&#34;,&#xA;      &#34;9EdIuoneTMp3CNIfY+O6eQ==&#34;,&#xA;      &#34;PHRlWl/iCYco+xAVn6SmKQ==&#34;,&#xA;      &#34;JQe3P/odATa/OKbzn309dw==&#34;,&#xA;      &#34;yVSbDx471AjTjlaUBaOQ5g==&#34;,&#xA;      &#34;ny9UQzoPVAr0qIXyPr3Zuw==&#34;,&#xA;      &#34;XL+Z1BeLmN8Pi7RZ6D6z/w==&#34;,&#xA;      &#34;Qp7j7oFs4UbVUHVGblDM1w==&#34;,&#xA;      &#34;yzs4f0vIG+ordPdSm2meFQ==&#34;,&#xA;      &#34;LLwLKTruTLedHaSTZAzh/g==&#34;,&#xA;      &#34;EzveB8rJWscHHRZtJKOdRA==&#34;,&#xA;      &#34;bgGUNdBAEokCVaY0TKwk/w==&#34;,&#xA;      &#34;kRj1Frl5pmWWgd5LR0IPyw==&#34;,&#xA;      &#34;3wnJ6TxCGJITikNK4m6q+g==&#34;,&#xA;      &#34;jbS9IFs59O0uPYg9IZeksQ==&#34;,&#xA;      &#34;ggWNBGsBWwx10iidOhjYcw==&#34;,&#xA;      &#34;Ds5dBDqvRggZONNskvuAwg==&#34;,&#xA;      &#34;m/cpX9gyFETv4B87S/qRxw==&#34;,&#xA;      &#34;lCc1jyHfsFJK2HfULjN8pA==&#34;,&#xA;      &#34;d9oy2JiAKtie2N1lu2J6ew==&#34;,&#xA;      &#34;fuOmX+MQWgJjrWZ2kXbtlQ==&#34;,&#xA;      &#34;V8tjixCGBsaAWvQP5Hvn+A==&#34;,&#xA;      &#34;GW37uYQxwwgJBIDtA/dT2g==&#34;,&#xA;      &#34;V2/vsNJeH5BxrzuVis91/A==&#34;,&#xA;      &#34;EFXoHkta9v8NXWXURLTCBw==&#34;,&#xA;      &#34;OaLF1hM9BwMPMfYWn9kNEA==&#34;,&#xA;      &#34;mZC3gBcn6x1aC7q9hXUpKg==&#34;,&#xA;      &#34;4Ir8FDWM4WPrO3dybbfnYQ==&#34;,&#xA;      &#34;y/vNaOETNDNWhjGaBLNhRA==&#34;,&#xA;      &#34;RxiYxX3H5lL8cc7k0ac/mQ==&#34;,&#xA;      &#34;XoUEjlwE1Uyl1H7Seu8qUw==&#34;,&#xA;      &#34;0Gq5wAUiCXaH50wxZYx9MQ==&#34;,&#xA;      &#34;/+t6edjy50ibBAIw8q+CWg==&#34;,&#xA;      &#34;S2g7delheJOLf2DxVbw0Hg==&#34;,&#xA;      &#34;L04cc8NCPjDZYnxYDnO5+A==&#34;,&#xA;      &#34;8BMA6LbX8vjrr4aUcmHB5w==&#34;,&#xA;      &#34;mUXGZjQ6odB/7zYNoJjJRA==&#34;,&#xA;      &#34;yrkfySEOvQHtbEYpAUNs0Q==&#34;,&#xA;      &#34;qpRD6NPbAOP7sG5S6hInXg==&#34;,&#xA;      &#34;fMQ6kctftYthbGvZli2/sg==&#34;,&#xA;      &#34;dWyG19OuEG5lNCJXvpjTag==&#34;,&#xA;      &#34;NDhUfh7yf3tRc0CV3znIIg==&#34;,&#xA;      &#34;YJjb6TqEvdj0lSF4MHg4+w==&#34;,&#xA;      &#34;y0c8SsIbu7kpkqoaDhf8/A==&#34;,&#xA;      &#34;nNzRt87EkCVymyYuDyEW2w==&#34;,&#xA;      &#34;M9nh4Ryt6GwPUlLoItHqnA==&#34;,&#xA;      &#34;hECLdfUszFQo2UbzQI3BMQ==&#34;,&#xA;      &#34;lJah2RfNfRF+vEQdCucT7w==&#34;,&#xA;      &#34;ul9JS7YMI1n2sVUWOX6Hbw==&#34;,&#xA;      &#34;3DJmtryLboz5D1RmZn6WTw==&#34;,&#xA;      &#34;pd2B9G+4ekvOFTzso0NXCw==&#34;,&#xA;      &#34;FgTFx5g45j7WzA+bfAHPzQ==&#34;,&#xA;      &#34;VMHGA3jL56ecJElCiIU9nQ==&#34;,&#xA;      &#34;a5xKL7Qrgq3D0d3zE8x4RQ==&#34;,&#xA;      &#34;vrR+k40GTfXC5FT0h86jIA==&#34;,&#xA;      &#34;Y3PSsgfYVK7+nWpNGBO9lQ==&#34;,&#xA;      &#34;yiivq+72Eny8jduuFDoDEQ==&#34;,&#xA;      &#34;xWQ3VSY/nFJP/yijxRUoxA==&#34;,&#xA;      &#34;hHQvhYHv8KxCCQMiFpmyWg==&#34;,&#xA;      &#34;whliDdpxFuOM5SHWXrizNQ==&#34;,&#xA;      &#34;84g+WJ21VVZ5YgyE9krInA==&#34;,&#xA;      &#34;Bzc4r1UXMoCf7blNLHkQGw==&#34;,&#xA;      &#34;4K1RYkumn7qw6Pk7lwpfbA==&#34;,&#xA;      &#34;mQwmpMs9V7B+YNSY3NMExw==&#34;&#xA;    ],&#xA;    &#34;13/XvLtRK2RDQlcsZc1BtQ==&#34;: [&#xA;      &#34;FpA1FaTnKUwdPkl0KHAbaw==&#34;,&#xA;      &#34;IfJyKZ52fwKruf/mbOKmYg==&#34;,&#xA;      &#34;NCiKXZEXo4Jw5tEf8LgPhA==&#34;,&#xA;      &#34;+56lxqiE6H3D8IED88OxVw==&#34;,&#xA;      &#34;0YTTGmYE/9YKV7yhSG2wCw==&#34;,&#xA;      &#34;ah5gJjq6ntKGHe05l2QLEA==&#34;,&#xA;      &#34;mQgdyTODJZ/UTHC5haonAg==&#34;,&#xA;      &#34;psclC23VyV2exiVERqdTxQ==&#34;,&#xA;      &#34;/ik4PFVpoYSF6+jKJPGHoA==&#34;,&#xA;      &#34;flk8YBa9lwv0ud+syzocqA==&#34;,&#xA;      &#34;TszqopCoskBv4coMA3/peg==&#34;,&#xA;      &#34;0K8l/WAiKh6VWmmuYinJBA==&#34;,&#xA;      &#34;n6coP572PTpURrDz8Q2egA==&#34;,&#xA;      &#34;RxwFiIUPJYMo6r5lfv+sdQ==&#34;,&#xA;      &#34;FCO2B+o+asJ7qjlQcg/SPw==&#34;,&#xA;      &#34;/ZDgobr+usix01fmflBpYg==&#34;,&#xA;      &#34;NWzlm1dQzX7pu+Y8xKgSEw==&#34;,&#xA;      &#34;XWaBdbEJiHpYXT1f1eBk1Q==&#34;,&#xA;      &#34;BbM0NZsMsZnNUi1ybIzssw==&#34;,&#xA;      &#34;IJSMEZBpGJDyClVadkCLsA==&#34;,&#xA;      &#34;OLjLMRdWldBjSuTKpYjduw==&#34;,&#xA;      &#34;G7l0N6DSTPJhrn3beR4QLg==&#34;,&#xA;      &#34;X1UyeDYfkBXcgz2M5KA5LQ==&#34;,&#xA;      &#34;LyQcB6aDtcDf3FmzBVHSKQ==&#34;,&#xA;      &#34;F/boCR7kXAGa4+GAELD7Tg==&#34;,&#xA;      &#34;IvL651FnAzrxSYOiOuXMlw==&#34;,&#xA;      &#34;eFT7gARF6nhlfhMNp4LgNA==&#34;,&#xA;      &#34;t0yM+3xw1ZQW3unHh4xTyA==&#34;,&#xA;      &#34;5LfrNnR/sOzaqKXS35YFOw==&#34;,&#xA;      &#34;55t0Oo9c3cgFDjqyaNS70A==&#34;,&#xA;      &#34;CPaw49wKw01O8KSP+trXbw==&#34;,&#xA;      &#34;7+zZLUPhCOA3BFrcusoKFg==&#34;,&#xA;      &#34;1uk6R7fJdNFj2gxMFc6jOA==&#34;,&#xA;      &#34;by+PAyhAcd2LS2O/tZxbRQ==&#34;,&#xA;      &#34;LJERbH00ig5nWiqOMKw/Xg==&#34;,&#xA;      &#34;nmCFeE95EAFeqYx2GUkIrQ==&#34;,&#xA;      &#34;Lc5MrJdT06D8uHMkpa1+Og==&#34;,&#xA;      &#34;g0XDRtU68aJjKkBv7OKREA==&#34;,&#xA;      &#34;V4GddSO/lMB9AeE2VC0gSA==&#34;,&#xA;      &#34;ohJ0B7EgOJ9MaxYsbvhjIA==&#34;&#xA;    ],&#xA;    &#34;13i0QoQ6Q4yBI5RUf20lXA==&#34;: [&#xA;      &#34;h7m1EaKKCwaqq30R6Q/BlQ==&#34;,&#xA;      &#34;Uy8P+1ImBLgh4EjZYlMO1Q==&#34;,&#xA;      &#34;7NIMWPjl58dCiuwwIe4bGg==&#34;&#xA;    ],&#xA;    &#34;1GZ5tdSeZY3Wi3x9/AVQ2Q==&#34;: [&#xA;      &#34;eiMh0pZiJlWSr3FHHfVKhg==&#34;,&#xA;      &#34;rtmfAClgZr+pMIYCffofpQ==&#34;,&#xA;      &#34;MMLwOzBcCET4jaa3dPuTwQ==&#34;,&#xA;      &#34;hUC86VV8kD262xFcev0ZiA==&#34;,&#xA;      &#34;RoQvxPrgcpXyTej834bT2Q==&#34;,&#xA;      &#34;5C8DQrs9fwpmV8rRYlvfCQ==&#34;,&#xA;      &#34;uPUnbuUJlh23l0km8iQ2tA==&#34;,&#xA;      &#34;4wegIDtvEZ75QrQWM65auQ==&#34;,&#xA;      &#34;lWdVDKK0NI1ECjrQyrQZhA==&#34;,&#xA;      &#34;MS7UYZB0gpv9XnBQo9QJdA==&#34;,&#xA;      &#34;CQPV/OxtJ+DwYc6C4gniNQ==&#34;,&#xA;      &#34;vZIHu7rsNO8R8If5mjyTiw==&#34;,&#xA;      &#34;guG+lyS5JQIDSZS6MEfIow==&#34;,&#xA;      &#34;lJ8RTw7m+AgAnWW6upSntA==&#34;,&#xA;      &#34;q5joCCZ2cOTa0rXBUtiSpQ==&#34;,&#xA;      &#34;4LZWGm07jnOHHBGX2FzAwg==&#34;,&#xA;      &#34;QaKFgrY/cUPl6Ls/xAwlFQ==&#34;,&#xA;      &#34;1w+glHHFE32ql3XJuIAYWQ==&#34;,&#xA;      &#34;gNGv6C2nj/tHk2ntVJUOWw==&#34;,&#xA;      &#34;4WgtH2AC4w3jDaPCHFqEaw==&#34;,&#xA;      &#34;knUP7wXG3O435cJDvu9Thw==&#34;,&#xA;      &#34;MIaYLvbJRWXm7UR3+CJ1PA==&#34;,&#xA;      &#34;IeTK1HBLKpS1+gfVSPrpvg==&#34;,&#xA;      &#34;sAlO/t+jkkm59mLcdOgB9w==&#34;,&#xA;      &#34;I3+uP7bb+nPtzRYHH2UUgw==&#34;,&#xA;      &#34;cly/G/AvUZQM2J1YMymkpQ==&#34;,&#xA;      &#34;r4Fu2fNYrl5cfm4zX5YpZQ==&#34;,&#xA;      &#34;uEn9qA67O/SoYHOtH/EL2w==&#34;,&#xA;      &#34;Bu9dxnhmsLXDd3x0oRPHfA==&#34;,&#xA;      &#34;e/bnYsWq3UNe4TO8qzzb8A==&#34;,&#xA;      &#34;1CCABRgs/s9xxQcDgxw00A==&#34;,&#xA;      &#34;ElE6r7xQZAfd5MScs95BXQ==&#34;,&#xA;      &#34;rwC2lB0lflNzttbo5Agt3g==&#34;,&#xA;      &#34;oGhsPyoyEtiEHT7/0qF+CQ==&#34;,&#xA;      &#34;k9jtJIr2beiO7DTwypDNWw==&#34;,&#xA;      &#34;RRtBD+EuTLmzasgAaBJyZw==&#34;,&#xA;      &#34;uO3OOEY6W3k9QH/tNVK0LQ==&#34;,&#xA;      &#34;dcH4AHY4X+K0bO3O9nqJrQ==&#34;,&#xA;      &#34;/MgFHW097IAGIZkNc/Fltw==&#34;,&#xA;      &#34;tbkEtEs3aa+p2/YQaD8BfQ==&#34;,&#xA;      &#34;i2CsObRdsFCFCIvnyVzw5g==&#34;,&#xA;      &#34;Kr2KcyJfYQ8J1RDorzTofQ==&#34;,&#xA;      &#34;8XLKalkulxeAh8qfecmGlA==&#34;,&#xA;      &#34;mmFI4mA7exd6BfbwTUwJfQ==&#34;,&#xA;      &#34;FroZeKbNhNx69+bj8o0OqQ==&#34;,&#xA;      &#34;PqOWZHQu7W9hh0UlnMkHAQ==&#34;,&#xA;      &#34;oIBUxFCAPk4vRXBwpcmtFw==&#34;,&#xA;      &#34;BHd7IxntWhEzC1s7XOworQ==&#34;,&#xA;      &#34;eT0Z6G4b2zSUUUSLlyL8Tg==&#34;&#xA;    ],&#xA;    &#34;1XXuvf69/0I2dNHaU2UndQ==&#34;: [&#xA;      &#34;/wfob5jHHezdiyugtfPWjg==&#34;&#xA;    ],&#xA;    &#34;1dO83wB64hDLki3A4eA/Pg==&#34;: [&#xA;      &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;      &#34;HxI42iSjURjRki+uV6q/9w==&#34;,&#xA;      &#34;G4J4D/HzBef3xun2GfNS3g==&#34;,&#xA;      &#34;DhF8bifcikVpxEkzi7eo9A==&#34;,&#xA;      &#34;vy6yzxdusLc9vaaiu2HI2w==&#34;,&#xA;      &#34;hcytdCNWQ/uK0EA5aDrWOQ==&#34;,&#xA;      &#34;yzANls12pwNNRyqxmDGy4g==&#34;,&#xA;      &#34;H4boG/V+MB7stA7jG8O6Tw==&#34;&#xA;    ],&#xA;    &#34;1h9uHE0QiXBO/zpJrT0VjA==&#34;: [&#xA;      &#34;1lRtJofWFCTkQi0dreTmvg==&#34;,&#xA;      &#34;wzbm6jMqKBEu1w4HpECY6A==&#34;,&#xA;      &#34;tbhLz74i3ShwS72WbIsoOA==&#34;,&#xA;      &#34;lKniGV6mBq1xFWJ6V0QVvA==&#34;,&#xA;      &#34;/Hu/RwrxQwmMU70Y0Ls1DA==&#34;&#xA;    ],&#xA;    &#34;1iUaGpv40BOJQUks5I0iYg==&#34;: [&#xA;      &#34;27u7kvLvlu7kh99wyuxQrg==&#34;,&#xA;      &#34;Ag/7bmjihl8O9dsSQf/ivg==&#34;&#xA;    ],&#xA;    &#34;2REYKadw7TKFiuC+OnoHmA==&#34;: [&#xA;      &#34;CH/8kg0DShdiNjzv6+DZnA==&#34;,&#xA;      &#34;ijNNBHI8o+gObvRZ97LRdA==&#34;,&#xA;      &#34;L3Sq7FQbQmRq1R8Dn0eFww==&#34;,&#xA;      &#34;2UhjmcPUkGmILpYJPZEiNQ==&#34;,&#xA;      &#34;JegoLVJD+r1CNqau++1Vlw==&#34;,&#xA;      &#34;UWR5dcXlfiNMz/BIfTGvfQ==&#34;&#xA;    ],&#xA;    &#34;2fg1ZRYCSPKKOgCxCcA36w==&#34;: [&#xA;      &#34;Jo0GiPh7MZcVuLsVDbp7qg==&#34;,&#xA;      &#34;CMGu0bZesU9cyPAc2vK34g==&#34;&#xA;    ],&#xA;    &#34;3688bXyK/nwHthXLLVH24g==&#34;: [&#xA;      &#34;IWplUWF011EXddGnkU5Png==&#34;,&#xA;      &#34;teVzqeXKz5qAL9KrVUsKAA==&#34;&#xA;    ],&#xA;    &#34;3DTA/XNFCCDFf6sfX96bGg==&#34;: [&#xA;      &#34;rpzV0o5XSSiqAfiLvn+7sw==&#34;,&#xA;      &#34;CQY3y5mGXL6FhNg/bhr8Rw==&#34;&#xA;    ],&#xA;    &#34;3RQKCmep11B4hkfn96QJTA==&#34;: [&#xA;      &#34;QNeXj0/uAU3vww6deBbkrw==&#34;,&#xA;      &#34;WxO9le6q4ACTs4KnSuckDw==&#34;&#xA;    ],&#xA;    &#34;3iIPR0bjuCPQ2+48pSdeHg==&#34;: [&#xA;      &#34;4gO4ls/gy0nmsC3NeXvyVQ==&#34;,&#xA;      &#34;+WB02bbxvRVZgJj5gYjJ7w==&#34;&#xA;    ],&#xA;    &#34;4Aph2Qer6+KdCecFsU0TXg==&#34;: [&#xA;      &#34;HT4k6+0VwtXXrNi4IFV2ug==&#34;,&#xA;      &#34;yXjhPZPggtyVHOPFjmeHOg==&#34;,&#xA;      &#34;AILk1bhdEUQriiNdRe9Buw==&#34;,&#xA;      &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;      &#34;0u9BhQlRGnXqmFj5VxmVgw==&#34;,&#xA;      &#34;xgLvjf6I20G6RWphhI+SWg==&#34;,&#xA;      &#34;UCWDKxZlG+RSFVukTFuFFw==&#34;&#xA;    ],&#xA;    &#34;4DM2GB9KLL7/xWypPdz7vA==&#34;: [&#xA;      &#34;8QRmG/+fMsQQzP2maaxOag==&#34;,&#xA;      &#34;5z9ZOzxJREYn5oM+HAm6dA==&#34;,&#xA;      &#34;VGewdTS02tdqYoORYHK7Rg==&#34;,&#xA;      &#34;VgaIsJDFBatjqT1h+RQLFQ==&#34;,&#xA;      &#34;1oKL9ZSv1M4CmxUhNFjpmg==&#34;,&#xA;      &#34;iSsTR9jTS/494HfIgB9pGQ==&#34;,&#xA;      &#34;WIbunUW6+W30QKZc5Tmqzw==&#34;,&#xA;      &#34;JTwzSHX5xKxgTtyprecVew==&#34;,&#xA;      &#34;2k/PqFfUaKNy33VkAbVD6g==&#34;,&#xA;      &#34;S2Vz+b7SfKEl74LFjj2t7Q==&#34;,&#xA;      &#34;m77LjZYd/4k9LSozG2S2mA==&#34;,&#xA;      &#34;3FdyvSRS+ECfT74KYiCcLA==&#34;,&#xA;      &#34;2vidY7qxU0KDMpAzTaXQCw==&#34;,&#xA;      &#34;KJGsgMArislsisVXSZHY4A==&#34;,&#xA;      &#34;qIRy7/v51ILezECGLzLGBw==&#34;,&#xA;      &#34;2VowcBblBj36IfwmFRwcwg==&#34;,&#xA;      &#34;E90jB6HCh1KjzQXtmHMUUg==&#34;,&#xA;      &#34;pr6wo3A29JKUBSVK/BGExw==&#34;,&#xA;      &#34;V9lyeZvue30g1R6RiITjAw==&#34;,&#xA;      &#34;peMVLpnT962hXrm4IDBPqg==&#34;,&#xA;      &#34;9b3CWaJsQwdqnuBJDBMt8g==&#34;,&#xA;      &#34;9UTiJlsfYxfa60iynbYgLg==&#34;,&#xA;      &#34;0PMktbRk+B4fdwvvP1VWUg==&#34;&#xA;    ],&#xA;    &#34;4ImdKzJ7uZoaviIayzuoUg==&#34;: [&#xA;      &#34;/GSEB7NuV5IOBsMvXs0hOw==&#34;,&#xA;      &#34;c95Jb/MAeM4/Wnq2jSIopg==&#34;,&#xA;      &#34;ghVsimzHhtfG91QJVkK8Jg==&#34;,&#xA;      &#34;Aet749oXCwhRnnY9gEGYGw==&#34;,&#xA;      &#34;sWCyUi5vmFbqsTEOh1QQvQ==&#34;,&#xA;      &#34;dNHj9TUgbfnbgJUCEellCw==&#34;,&#xA;      &#34;A3ZYVQ8Z63tDAx8FSltQHw==&#34;,&#xA;      &#34;JVuTqfPwohmj6ucokgM2sQ==&#34;,&#xA;      &#34;GDAkupnsjiTl71rwzH5RJg==&#34;,&#xA;      &#34;VEE7ccbKf4EH2dNVXOf2uA==&#34;,&#xA;      &#34;7jE4UN8ZNzWXfNDZ8BZq3Q==&#34;,&#xA;      &#34;DUP5ugYJi+iUbcfFxoSiig==&#34;,&#xA;      &#34;T8IbBnTK2Iv5YVT88l9ngQ==&#34;,&#xA;      &#34;J1cvee8xy6oZDEdA21dqEg==&#34;,&#xA;      &#34;8TL7OmwuwkB+6m9uO5u62g==&#34;,&#xA;      &#34;sxcy9NTxyeNn/j3K+DCTCQ==&#34;,&#xA;      &#34;k6D6o9qP1X41yPQlNQ8aww==&#34;,&#xA;      &#34;X4CDljJQJsftQ2RA57ftuw==&#34;,&#xA;      &#34;gFgnmTqhW1tr7jmOrXQQQQ==&#34;,&#xA;      &#34;XsxaedsaFYv/ys7GTRoUVw==&#34;,&#xA;      &#34;Ji6OY1u39nJByKzCNwfpIw==&#34;,&#xA;      &#34;1I7VtxkB33ashDX0kB4Teg==&#34;,&#xA;      &#34;+doAGgTwsE0iptDdCED/aA==&#34;,&#xA;      &#34;791CRjnt/pj2GXzRz2PiHg==&#34;,&#xA;      &#34;gx7w+mYZCEGlSNGIkO6bLQ==&#34;,&#xA;      &#34;3skSbDjTQ02+eNiFJz716g==&#34;,&#xA;      &#34;J6JEqF6+PkBwS7J9B0Lefw==&#34;,&#xA;      &#34;JvC/rVWSiuNeMXzeTDRZHQ==&#34;,&#xA;      &#34;nuFsbkH7VzW6LS3WLhSszA==&#34;,&#xA;      &#34;e1tWGyUIVU1QafO75am9CA==&#34;,&#xA;      &#34;lWxwCNVjYSW4SdS9h9uKvg==&#34;,&#xA;      &#34;GR80zW702W+xho6dTSNlyw==&#34;,&#xA;      &#34;MEP8FBVAfPt6fwJRFfcI5w==&#34;,&#xA;      &#34;+govv3Zh4UHQ+P7JiRlanw==&#34;,&#xA;      &#34;HJRWtVFOp4GhofsLDJveWg==&#34;,&#xA;      &#34;7XOAm91CGfyc8WKL2gtbrA==&#34;,&#xA;      &#34;A2AnBV79RO3+WE0eMQnW8Q==&#34;,&#xA;      &#34;0O2I0zrYDyiCiU68WyBLvw==&#34;,&#xA;      &#34;lG2c0hNx+Fgq8Zf8B1rJyw==&#34;,&#xA;      &#34;2j4vw/Ef1McLxa/C6FEQvA==&#34;,&#xA;      &#34;YIgEtVnwIF6/C/aQPFqKxg==&#34;,&#xA;      &#34;GJ6//hGiIsio2zBFuudd/Q==&#34;,&#xA;      &#34;jyRfRwiUvNWAyNlZmv3MkQ==&#34;,&#xA;      &#34;K9Y5KUp7F1q2lsyaUxy23A==&#34;,&#xA;      &#34;AzHq3xNdZjrdl02cKyAV8A==&#34;,&#xA;      &#34;C/qQQwNpHdvLBRbvV/RD1Q==&#34;,&#xA;      &#34;Ira5htRPGofy9veGMRD7Vg==&#34;,&#xA;      &#34;xU5h/ccSMUFpzLZ+ILu+rg==&#34;,&#xA;      &#34;8T8GNMb/g1PeB57LD09kow==&#34;,&#xA;      &#34;fZr2KjiaLrxmLBepxX+epw==&#34;,&#xA;      &#34;TQEoFglRNgkSreqoAySz5A==&#34;,&#xA;      &#34;9NxQaPp619Bd0qky1dvzZg==&#34;,&#xA;      &#34;MVGmB/UrNlB0PqdbI1X5iA==&#34;,&#xA;      &#34;ANxFBq/yNQoElX4dsXb0wA==&#34;,&#xA;      &#34;562erF6ddCIyzi5oV/IzHQ==&#34;,&#xA;      &#34;uJDCv1FWYpz7eywFMZ5WnA==&#34;,&#xA;      &#34;VZxWbc2wJwiwTLhillEtpA==&#34;,&#xA;      &#34;bytYw82gsP7fmiiqIEcGNw==&#34;,&#xA;      &#34;O4VudlVyChnCKHP9qhS59g==&#34;,&#xA;      &#34;/i0rPUB7nJcIUQuikyWxeQ==&#34;,&#xA;      &#34;e67z2nzRKHIRzFxg25zTcA==&#34;,&#xA;      &#34;qEoADqpvCc0dfHbPv1ykKQ==&#34;,&#xA;      &#34;JZIEpU7UdEXuAMj6emkt5A==&#34;,&#xA;      &#34;nKGJQ32gv73mgVLbPDD8Qg==&#34;,&#xA;      &#34;dhk9SR7XgMlUT1SwbOzs0A==&#34;,&#xA;      &#34;ybQbHANLbpeKvvvpnEOh2Q==&#34;,&#xA;      &#34;YwefEcZX3L6SA4VOQcDTlg==&#34;,&#xA;      &#34;rkpLgzhV90FRHYY3ESWHfw==&#34;,&#xA;      &#34;MrRavbeiISRcJtBRJ3ZRsA==&#34;,&#xA;      &#34;YPJKJ4DYdTXL0BJCCS9pgA==&#34;,&#xA;      &#34;eh73UwgswuQUUBPGmZNxLg==&#34;,&#xA;      &#34;bmNjdpodhrAjmmeNv8j2ZA==&#34;,&#xA;      &#34;OOCO13z2+atrfqEfCsJ3/w==&#34;,&#xA;      &#34;UH1xPpnVOud+f1gKl26ATQ==&#34;,&#xA;      &#34;WNRX1UWo4fDLFOhq9mcbIA==&#34;,&#xA;      &#34;NplyvjxiuekBB/5QKoOJbw==&#34;,&#xA;      &#34;cv/HKlhaI7EJMBLIaTimwg==&#34;,&#xA;      &#34;0LvlxzvH25js4ffWzvLRTQ==&#34;,&#xA;      &#34;/U86DUGeHRSAL0GvmlifyA==&#34;,&#xA;      &#34;u71+866Ffd2deSVdosxvJw==&#34;,&#xA;      &#34;e+z5vuxLZ95xajn1dSffxw==&#34;,&#xA;      &#34;mTjHmpUEF29L0I107JlM3Q==&#34;,&#xA;      &#34;H5vm/YCKZciOb4TXZmGZlg==&#34;,&#xA;      &#34;VQ+eWJsUMBep4PD4xfj8Vw==&#34;,&#xA;      &#34;TI1OyePXauC23iR42z7HKg==&#34;,&#xA;      &#34;o6arI4B+lOjvgV6k7kauyw==&#34;,&#xA;      &#34;4ZTG400o6y5du1mo17bLtg==&#34;,&#xA;      &#34;FsYbwBEvKH6FW81JU3KSvw==&#34;,&#xA;      &#34;m2sL00H9lvJ4xs2UqwHxiQ==&#34;,&#xA;      &#34;fezwmAwUNAjVNYh+YY0Wrw==&#34;,&#xA;      &#34;EBopL1hbi9GBQGXZUVNCAA==&#34;,&#xA;      &#34;WLri8p9NfgX8reKybIYziw==&#34;,&#xA;      &#34;3wP/Eggf7Bu35MpzNr1Fog==&#34;,&#xA;      &#34;ToyZiPOtBFPiNJOZ8QaYng==&#34;,&#xA;      &#34;VcgFEXPgpzLsj5tOjILVtw==&#34;,&#xA;      &#34;kBdyi87P4B1cTF5hLS7ByA==&#34;,&#xA;      &#34;71rWwrWl22424P8D9sWBZg==&#34;,&#xA;      &#34;VdMk4kWMgrdK/5+i3n6XhA==&#34;,&#xA;      &#34;fUkL/QrHEZtoCydnxvHQYQ==&#34;,&#xA;      &#34;bb9X6domCAmA+m40PgE/jg==&#34;,&#xA;      &#34;iUURXijANkMZIH/VbXWyYQ==&#34;,&#xA;      &#34;vZzq+XzhXQpcGK6x6C81SQ==&#34;,&#xA;      &#34;bnbyK7dxlE/oYVQQzP4AfQ==&#34;,&#xA;      &#34;k9Yjqv3ifDP4XwsJSZ8XiQ==&#34;,&#xA;      &#34;7TWJhc3cfFgph89dsQ0nBA==&#34;,&#xA;      &#34;dgwlwyboh6/BQfJsyoE8Eg==&#34;,&#xA;      &#34;UhBP4F/rEtGjZG3U8Wvp2Q==&#34;,&#xA;      &#34;49jEi4xCgfg8T8qzhNobIA==&#34;,&#xA;      &#34;8wGYNPE2+g59IfMX+q95UQ==&#34;,&#xA;      &#34;YXzXrFNVRnn1xbJjvqeq+w==&#34;,&#xA;      &#34;ifl87FYu8EGpCz9Lakl+qg==&#34;,&#xA;      &#34;cm3OVRYaWfpGnoqokxyhvA==&#34;,&#xA;      &#34;iL/VOECJBzyFgTCwWDppVw==&#34;,&#xA;      &#34;ITIiuf1dzb05+JHj8h65fg==&#34;,&#xA;      &#34;gCKIolAPxKn/MwnZqQ5viA==&#34;,&#xA;      &#34;r9W84DjqWVoSeRkzoMmOdA==&#34;,&#xA;      &#34;XfjE+J06ONMJAg7vkQ3tbQ==&#34;,&#xA;      &#34;esWNnTXfVcQMP31EwLadpw==&#34;,&#xA;      &#34;osxk1q2jE3TCrr5JCQRhNA==&#34;,&#xA;      &#34;L9hbhq3wsZ5QkKEIo/fhYQ==&#34;,&#xA;      &#34;iE+bfILM7uszXcxvEd6gYA==&#34;,&#xA;      &#34;N0YFziBj+5bn5JQnjfumWQ==&#34;,&#xA;      &#34;wnyL15XgdZxOsCINsou4IQ==&#34;,&#xA;      &#34;z+rEPA1G209OEh34yG1aVQ==&#34;,&#xA;      &#34;uTyk3o8xjznk0cEQXm/ouw==&#34;,&#xA;      &#34;XqfFkzS9GKZn0SPxJdTgfA==&#34;,&#xA;      &#34;keMF1HAI1OIF8MvJtPZQ+g==&#34;,&#xA;      &#34;EXi8j2JWeu5xYuWml6Ellg==&#34;,&#xA;      &#34;iguNGuUCiP6eJSJt14Jo4g==&#34;,&#xA;      &#34;WXqvm+7SM0p2PgR8h/gpvg==&#34;,&#xA;      &#34;X+rjva7ecn1JedeVO9IX9w==&#34;,&#xA;      &#34;7B4LUCjMkCM+NcHtyQXyFA==&#34;,&#xA;      &#34;NfOajNNzWnotxhFpYD5Nfg==&#34;,&#xA;      &#34;ISgjA2mi+Q9vbdNEhDKXOA==&#34;,&#xA;      &#34;3a2lYBlaR2GDen/lmTlCyg==&#34;,&#xA;      &#34;hzkoKs3QdYyXJMnifzGbxA==&#34;,&#xA;      &#34;LkG+n79mbPHrPl1sC2ee1w==&#34;,&#xA;      &#34;pK26sxPUfpa6SjJQHK9XfQ==&#34;,&#xA;      &#34;jZq7+x+5y+AXKvl07ivVBg==&#34;,&#xA;      &#34;xek4X2TrLxrtYM1HALbG5g==&#34;,&#xA;      &#34;9z2MVdoreqGVJcUFUz72OA==&#34;,&#xA;      &#34;am8Nu2Xz4xTgOxf+V74bZg==&#34;,&#xA;      &#34;pTPOuY2Z9zqKtyr33n5ctw==&#34;,&#xA;      &#34;Oqoxq5RsXkX9ZEI9ETDo/w==&#34;,&#xA;      &#34;qTcNeh3tg/7OmxGhGG7cNQ==&#34;,&#xA;      &#34;hizVOzI9X9GcBBCKZH/AIg==&#34;,&#xA;      &#34;IRgMJoQA4x1xizY2hEw96w==&#34;,&#xA;      &#34;9ia70lNV6NYvmzB7WlbYQw==&#34;,&#xA;      &#34;xZsh7Q9v1lEcCIn4GeJadw==&#34;,&#xA;      &#34;fBicZck0jWBRn2U4JNy52w==&#34;,&#xA;      &#34;vhM+rFefbZb+2rYFLcy2+w==&#34;,&#xA;      &#34;Srb0jwMVUQlaoxewBgoI7A==&#34;,&#xA;      &#34;5ZJ6PuXfgRMCarpNow00ew==&#34;,&#xA;      &#34;hMwTXtuK2CPZup51st8vag==&#34;,&#xA;      &#34;xP0q7+9N5MKgQQUq9keq4A==&#34;,&#xA;      &#34;iTrL6dXRPICy+0Wmi1qlPw==&#34;,&#xA;      &#34;vZf5q9QE5SuB3bMw/VXbtQ==&#34;,&#xA;      &#34;nhTPOqyx5Hjq5RaQThVb3A==&#34;,&#xA;      &#34;1SDdOQM609JpOnF4Vx/qwQ==&#34;,&#xA;      &#34;GVXQ1XPPQkuhZ4SIFGoF+w==&#34;,&#xA;      &#34;1QnQnbNEHorQXFc0WpMmGQ==&#34;,&#xA;      &#34;4buHU7VwQZ104Kjv/TKwDg==&#34;,&#xA;      &#34;CBFMybHyX4sHIYPIO6U5nw==&#34;,&#xA;      &#34;iMwaCmNtKHrK2+scb+hkxw==&#34;,&#xA;      &#34;LMcwA00QGnxriAXkZQIhHw==&#34;,&#xA;      &#34;tjg7NtH3QatPaaScohSsZg==&#34;,&#xA;      &#34;YpjyzhR3jAhlzb479lBoJw==&#34;,&#xA;      &#34;ND8tA1FahvMc/ZIGpyoj3g==&#34;,&#xA;      &#34;78Ya60ppwS4OL6ZK9P90Qw==&#34;,&#xA;      &#34;ZCWnPSXILcJ9aE646DCmag==&#34;,&#xA;      &#34;Z064OaMrPYngYTdOmYFpOw==&#34;,&#xA;      &#34;RCa1Bj2enE6hnHOgI0Hpsw==&#34;,&#xA;      &#34;3yaDBYST3GIWj+F89QlkNw==&#34;,&#xA;      &#34;ZELKWqL7/eOb/qnydXpFAg==&#34;,&#xA;      &#34;+3z2iqfNC+87k0NgFEkCCg==&#34;,&#xA;      &#34;KCYwWkMQ7jeCsX2dnrw/9w==&#34;&#xA;    ],&#xA;    &#34;5JeNH+bHiuiK9wwBZqH10A==&#34;: [&#xA;      &#34;sXnCRVNv4i/ZmrJ0YxWonw==&#34;,&#xA;      &#34;Uh6QIejNBmYSJ+kLmnZWzw==&#34;&#xA;    ],&#xA;    &#34;5NZNFErDrBiBoorV+igTjg==&#34;: [&#xA;      &#34;pBJCL45M2NleSRKXAGAPTw==&#34;,&#xA;      &#34;6J86dffyd+kQEKbjTTbD2Q==&#34;,&#xA;      &#34;q4W6wpO2YbOLS87LUXPVBw==&#34;,&#xA;      &#34;TNb7OrRxFn2Bis7zp2oi8A==&#34;,&#xA;      &#34;uFXEnN9gepJ4+HtQWdLrOg==&#34;,&#xA;      &#34;qMBdcJlDiWOfl15fflzyow==&#34;,&#xA;      &#34;abYhvv2PIAbu240JiMWauA==&#34;,&#xA;      &#34;GuM8+Ku1VtBzfPk3/FCgzw==&#34;,&#xA;      &#34;0u2Zo3eZYFAXhVSIZh+vXQ==&#34;,&#xA;      &#34;KC4H6WRPkYrWvXb9OC+odg==&#34;,&#xA;      &#34;Ihq7mkhGM9sf/8QM05o7gw==&#34;,&#xA;      &#34;Ub9JoNToSyT09hD5MOIlGA==&#34;,&#xA;      &#34;uglqkYqbcsDd4SCu9NI2Ww==&#34;,&#xA;      &#34;+o9j0Llb6+ISl2S6vmkRkQ==&#34;,&#xA;      &#34;FAgeMhGaGcH9QOhQHw5rhQ==&#34;,&#xA;      &#34;70HU3efHkL/3G4Y44qZmGA==&#34;,&#xA;      &#34;12PmpsYpKqbguwokcjBXqw==&#34;,&#xA;      &#34;wEVnFZ6M5zpBHSw+nqU0rg==&#34;,&#xA;      &#34;9uaveyIiSEcdU4MrDHbJ2Q==&#34;,&#xA;      &#34;hv1o+8ALinWTDa5cH4j3rA==&#34;,&#xA;      &#34;q6x8gUSR0HLnQLHLmB4Htw==&#34;,&#xA;      &#34;AQa/gDZ0IemFxWbJIsU4yQ==&#34;,&#xA;      &#34;5vR/2ZAfb0swnLBKDl3Bzg==&#34;,&#xA;      &#34;w93rRV74Y3Xaae9j4uy2iQ==&#34;,&#xA;      &#34;quMgsZt2z8hlQ+HzwzaVJQ==&#34;,&#xA;      &#34;qXBiVfXy4luW+BbyG9z9BQ==&#34;,&#xA;      &#34;nD4gdXb8ND61ypX9fYklTQ==&#34;,&#xA;      &#34;GolUr/klMsQNQ9QFMdcAmw==&#34;,&#xA;      &#34;O41Bejc6em2i0QjOrjliKQ==&#34;,&#xA;      &#34;QvPHR+YbqNjRrCZl0Ui1yQ==&#34;,&#xA;      &#34;Geg0mw2hzdsfDbJ9adcmWg==&#34;,&#xA;      &#34;ZeLcisCXFaeQKOi8dej/BQ==&#34;,&#xA;      &#34;1PYvw1fdwe6hM2UBdw4Itw==&#34;,&#xA;      &#34;qdXDrJ7D0lw6kIY2dy+1KQ==&#34;,&#xA;      &#34;1QQmDcMkRqvOte/bR8QEuQ==&#34;,&#xA;      &#34;ug2Mk8LI1eIN0hRNT0s8JQ==&#34;,&#xA;      &#34;X9na4KYJ5u50u+KLDr2iTQ==&#34;,&#xA;      &#34;ZZj+FChMvULXnT4QSAEvQQ==&#34;,&#xA;      &#34;N6xCmSIsupN7OsJaYpsl6Q==&#34;,&#xA;      &#34;ETcQXJZrA6IUPRr4MXFUIw==&#34;,&#xA;      &#34;4K7cGcsZltSw5Ayu8+A5rA==&#34;,&#xA;      &#34;RReWBnQmCp2XJDUh6xioRQ==&#34;,&#xA;      &#34;fUlz8/rwVV2PbflGdFYCdw==&#34;,&#xA;      &#34;LXj+7NB7elh/3U/gcE77cw==&#34;,&#xA;      &#34;tvq/gvjGf6pzxLuMOglBaw==&#34;,&#xA;      &#34;c3eMx85yv79gfxNsxZXPHQ==&#34;,&#xA;      &#34;K0/KdAmlvzyf53kjXgfoRA==&#34;,&#xA;      &#34;VJAm4vMolMmA2ytzFknQUA==&#34;,&#xA;      &#34;vAAzy4RBfYsNO+V3LlPJ7A==&#34;,&#xA;      &#34;XHSXqyF2rScxnK03VnME5Q==&#34;,&#xA;      &#34;QZQvSq0tzcJY8GfiU/aXpg==&#34;,&#xA;      &#34;qLHoaQ/4ax3G7SRd9aV2yg==&#34;,&#xA;      &#34;yz/zQzn72boszb6Cab3Y9w==&#34;,&#xA;      &#34;9M1meEoYiMYlmYR7kKfweg==&#34;,&#xA;      &#34;Oaw7/z6QEDwwzKvMQmdriQ==&#34;,&#xA;      &#34;jY7qsjEMOfcaNJkgI4dijw==&#34;&#xA;    ],&#xA;    &#34;6COiLlB/V7UlOwfuFJy77w==&#34;: [&#xA;      &#34;r3RLKNYtYvKarBqnnrlrew==&#34;,&#xA;      &#34;Z0bbSkX8e3OUKdJa86CbBw==&#34;,&#xA;      &#34;xQ6R88+x8IssPvOAavmZXw==&#34;&#xA;    ],&#xA;    &#34;6G4wapu2zP6UYfTP+Ip2pA==&#34;: [&#xA;      &#34;FpA1FaTnKUwdPkl0KHAbaw==&#34;,&#xA;      &#34;IfJyKZ52fwKruf/mbOKmYg==&#34;,&#xA;      &#34;NCiKXZEXo4Jw5tEf8LgPhA==&#34;,&#xA;      &#34;+56lxqiE6H3D8IED88OxVw==&#34;,&#xA;      &#34;0YTTGmYE/9YKV7yhSG2wCw==&#34;,&#xA;      &#34;ah5gJjq6ntKGHe05l2QLEA==&#34;,&#xA;      &#34;mQgdyTODJZ/UTHC5haonAg==&#34;,&#xA;      &#34;psclC23VyV2exiVERqdTxQ==&#34;,&#xA;      &#34;/ik4PFVpoYSF6+jKJPGHoA==&#34;,&#xA;      &#34;flk8YBa9lwv0ud+syzocqA==&#34;,&#xA;      &#34;TszqopCoskBv4coMA3/peg==&#34;,&#xA;      &#34;0K8l/WAiKh6VWmmuYinJBA==&#34;,&#xA;      &#34;n6coP572PTpURrDz8Q2egA==&#34;,&#xA;      &#34;RxwFiIUPJYMo6r5lfv+sdQ==&#34;,&#xA;      &#34;FCO2B+o+asJ7qjlQcg/SPw==&#34;,&#xA;      &#34;/ZDgobr+usix01fmflBpYg==&#34;,&#xA;      &#34;NWzlm1dQzX7pu+Y8xKgSEw==&#34;,&#xA;      &#34;XWaBdbEJiHpYXT1f1eBk1Q==&#34;,&#xA;      &#34;BbM0NZsMsZnNUi1ybIzssw==&#34;,&#xA;      &#34;IJSMEZBpGJDyClVadkCLsA==&#34;,&#xA;      &#34;OLjLMRdWldBjSuTKpYjduw==&#34;,&#xA;      &#34;G7l0N6DSTPJhrn3beR4QLg==&#34;,&#xA;      &#34;X1UyeDYfkBXcgz2M5KA5LQ==&#34;,&#xA;      &#34;LyQcB6aDtcDf3FmzBVHSKQ==&#34;,&#xA;      &#34;F/boCR7kXAGa4+GAELD7Tg==&#34;,&#xA;      &#34;IvL651FnAzrxSYOiOuXMlw==&#34;,&#xA;      &#34;eFT7gARF6nhlfhMNp4LgNA==&#34;,&#xA;      &#34;t0yM+3xw1ZQW3unHh4xTyA==&#34;,&#xA;      &#34;5LfrNnR/sOzaqKXS35YFOw==&#34;,&#xA;      &#34;55t0Oo9c3cgFDjqyaNS70A==&#34;,&#xA;      &#34;CPaw49wKw01O8KSP+trXbw==&#34;,&#xA;      &#34;7+zZLUPhCOA3BFrcusoKFg==&#34;,&#xA;      &#34;1uk6R7fJdNFj2gxMFc6jOA==&#34;,&#xA;      &#34;by+PAyhAcd2LS2O/tZxbRQ==&#34;,&#xA;      &#34;LJERbH00ig5nWiqOMKw/Xg==&#34;,&#xA;      &#34;nmCFeE95EAFeqYx2GUkIrQ==&#34;,&#xA;      &#34;Lc5MrJdT06D8uHMkpa1+Og==&#34;,&#xA;      &#34;g0XDRtU68aJjKkBv7OKREA==&#34;,&#xA;      &#34;V4GddSO/lMB9AeE2VC0gSA==&#34;,&#xA;      &#34;RUDcnDBVSmf+/LWMe4Tqgw==&#34;&#xA;    ],&#xA;    &#34;6LVRZKaAJH97OKCXsJMDDw==&#34;: [&#xA;      &#34;JSxIEGIOCwboUDoJZgS9fA==&#34;&#xA;    ],&#xA;    &#34;6VAQWTpZhN9PW7YCmVhxsw==&#34;: [&#xA;      &#34;51jf2IrfzMdepCjAvXkPMw==&#34;,&#xA;      &#34;1/PWApRfYh/rLEOR0JZLsw==&#34;,&#xA;      &#34;2bOVXniSdlE0fZB1iot4yQ==&#34;,&#xA;      &#34;wbgbZuReVn7DfcAmqe3XZA==&#34;,&#xA;      &#34;8gQtKtb/Xr3aGfsLtKyetA==&#34;,&#xA;      &#34;b7Ve+kRpf1f/Y0XXi0L2vA==&#34;,&#xA;      &#34;qI12E1AIG5PjZFUHEhSkgw==&#34;,&#xA;      &#34;eqZVUGTs5pHRR/tV2jQA/Q==&#34;,&#xA;      &#34;YnyGgq68v/XTMEk0yU1qsA==&#34;,&#xA;      &#34;vLDNpmPSXi+t8ebIQHILIw==&#34;,&#xA;      &#34;sTJKOfHbxppSoExQl7mYpQ==&#34;,&#xA;      &#34;kJ/PUfmUBn2Ep03yRLItuQ==&#34;,&#xA;      &#34;0P/5eKFuPPXM3bHgeAHWxw==&#34;,&#xA;      &#34;JfmoxvDj+qKmecssvuGVyA==&#34;,&#xA;      &#34;bqEGDVpuXY3j7Kr18B5E4w==&#34;,&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;icr9XD5DN3YDWvP3naYL+g==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;830L36AKCoBHnXPHE6R6uQ==&#34;,&#xA;      &#34;knD9e5c9mhfEteHg6iIbAQ==&#34;,&#xA;      &#34;taWP10HWuyQrPSEFSUjPPw==&#34;,&#xA;      &#34;BfJzk+M/zKnbrBHcCrvIlA==&#34;,&#xA;      &#34;EfJCfNem+1eUwnsxx2dNOg==&#34;,&#xA;      &#34;cC3lPQDv1QQiffpXJ4JvcQ==&#34;,&#xA;      &#34;ljT4JJv6XdYorFfJ6zbfog==&#34;,&#xA;      &#34;lO89yYeT5Xt1E5KBgR1OXw==&#34;,&#xA;      &#34;UuV6vmv/pMSyQBUW2Wn3bA==&#34;,&#xA;      &#34;f5rDGDIgGLk7iLvtlKjm1w==&#34;,&#xA;      &#34;S3c04CkV3MUFBzUssTpBSg==&#34;,&#xA;      &#34;4Uca8szOo7gGoVgv+DjeUA==&#34;,&#xA;      &#34;fcJXnA1/CqZDeUcxpMPyzg==&#34;,&#xA;      &#34;n5bOb2nwIXCE6i6WEpGlzA==&#34;,&#xA;      &#34;ktNuCXztDAtRpUWlUtIWUg==&#34;&#xA;    ],&#xA;    &#34;7JHS+mBQfJeJoy73lvm4lw==&#34;: [&#xA;      &#34;/GSEB7NuV5IOBsMvXs0hOw==&#34;,&#xA;      &#34;c95Jb/MAeM4/Wnq2jSIopg==&#34;,&#xA;      &#34;ghVsimzHhtfG91QJVkK8Jg==&#34;,&#xA;      &#34;Aet749oXCwhRnnY9gEGYGw==&#34;,&#xA;      &#34;sWCyUi5vmFbqsTEOh1QQvQ==&#34;,&#xA;      &#34;dNHj9TUgbfnbgJUCEellCw==&#34;,&#xA;      &#34;A3ZYVQ8Z63tDAx8FSltQHw==&#34;,&#xA;      &#34;JVuTqfPwohmj6ucokgM2sQ==&#34;,&#xA;      &#34;GDAkupnsjiTl71rwzH5RJg==&#34;,&#xA;      &#34;VEE7ccbKf4EH2dNVXOf2uA==&#34;,&#xA;      &#34;7jE4UN8ZNzWXfNDZ8BZq3Q==&#34;,&#xA;      &#34;DUP5ugYJi+iUbcfFxoSiig==&#34;,&#xA;      &#34;T8IbBnTK2Iv5YVT88l9ngQ==&#34;,&#xA;      &#34;J1cvee8xy6oZDEdA21dqEg==&#34;,&#xA;      &#34;8TL7OmwuwkB+6m9uO5u62g==&#34;,&#xA;      &#34;sxcy9NTxyeNn/j3K+DCTCQ==&#34;,&#xA;      &#34;k6D6o9qP1X41yPQlNQ8aww==&#34;,&#xA;      &#34;X4CDljJQJsftQ2RA57ftuw==&#34;,&#xA;      &#34;gFgnmTqhW1tr7jmOrXQQQQ==&#34;,&#xA;      &#34;XsxaedsaFYv/ys7GTRoUVw==&#34;,&#xA;      &#34;Ji6OY1u39nJByKzCNwfpIw==&#34;,&#xA;      &#34;1I7VtxkB33ashDX0kB4Teg==&#34;,&#xA;      &#34;+doAGgTwsE0iptDdCED/aA==&#34;,&#xA;      &#34;791CRjnt/pj2GXzRz2PiHg==&#34;,&#xA;      &#34;gx7w+mYZCEGlSNGIkO6bLQ==&#34;,&#xA;      &#34;3skSbDjTQ02+eNiFJz716g==&#34;,&#xA;      &#34;J6JEqF6+PkBwS7J9B0Lefw==&#34;,&#xA;      &#34;JvC/rVWSiuNeMXzeTDRZHQ==&#34;,&#xA;      &#34;nuFsbkH7VzW6LS3WLhSszA==&#34;,&#xA;      &#34;e1tWGyUIVU1QafO75am9CA==&#34;,&#xA;      &#34;lWxwCNVjYSW4SdS9h9uKvg==&#34;,&#xA;      &#34;GR80zW702W+xho6dTSNlyw==&#34;,&#xA;      &#34;MEP8FBVAfPt6fwJRFfcI5w==&#34;,&#xA;      &#34;+govv3Zh4UHQ+P7JiRlanw==&#34;,&#xA;      &#34;5SopsIUut+H2XaFPAa5Sig==&#34;,&#xA;      &#34;UsE9/aKvx7HhPwZe6KY1zw==&#34;,&#xA;      &#34;1LTKa378StuY8O3o3G26jw==&#34;,&#xA;      &#34;XXaDpMG90Mb3fV4QxoLqXA==&#34;,&#xA;      &#34;H7H9wMobv6DOqzUUAdOqGA==&#34;,&#xA;      &#34;JZouihQMnG3T6XSUXqYbkA==&#34;,&#xA;      &#34;fJ9ZvBhuvQVNdsen0XKxfw==&#34;,&#xA;      &#34;YoJO5p1sMUFmCt+7OiX0ow==&#34;,&#xA;      &#34;hx3c9WG+Xum3pwxo0+FyRQ==&#34;,&#xA;      &#34;d0TdbMsURHlCTk8d2vGLjQ==&#34;,&#xA;      &#34;6qxVoatDqIolfyN1PZUKnw==&#34;,&#xA;      &#34;WnkMM/SD0E+7EEac0/vMVg==&#34;,&#xA;      &#34;tboTb+/fwz1O/l+3w5n9ew==&#34;,&#xA;      &#34;FMzc9QFitxthf16XR1P0QA==&#34;,&#xA;      &#34;McBbvTJIAPyP1aOW8M+hzw==&#34;,&#xA;      &#34;7ZyXE8z7uZKjHitrjhSWQQ==&#34;,&#xA;      &#34;NXkuwjwxMseOUUaLQCgnuQ==&#34;,&#xA;      &#34;/bIhvJWw2AYMGyJtBaoH6A==&#34;,&#xA;      &#34;cNsQU/uNFf7PsCWqaKxjAQ==&#34;,&#xA;      &#34;98vR1ByhE/Y9cvB+lRN3LA==&#34;,&#xA;      &#34;rENFCyvqecBUcAR85/9PBQ==&#34;,&#xA;      &#34;nyAi61ve961xOEKhhdNTkg==&#34;,&#xA;      &#34;T2rcJ7DPtdiGNP7r4L5R2g==&#34;,&#xA;      &#34;pmYCdyBPlSpsjaT+VrrmLg==&#34;,&#xA;      &#34;LUlesLbzv1yf48cLqYDxTg==&#34;,&#xA;      &#34;rct+rak3m0uMzU51NldQpg==&#34;,&#xA;      &#34;QX1bQ/CZA5mRbcqjpTc9aA==&#34;,&#xA;      &#34;IV554NtP1F9KO4IyBit26g==&#34;,&#xA;      &#34;A2YTvJXiGwe7aOSqWlEZhQ==&#34;,&#xA;      &#34;W08Ska67/8hV/b3GYflglQ==&#34;,&#xA;      &#34;9C6WGntg4UmJkjiylWVxnw==&#34;,&#xA;      &#34;7tWeNpgpS6TZ4aQUo8g9NQ==&#34;,&#xA;      &#34;u3VIQ3Bv2EdQNxxr10FAOQ==&#34;,&#xA;      &#34;psR1kVsSZz19yYKHsoaoNg==&#34;,&#xA;      &#34;rWYn/Km2lN55sVL7Ui4zmQ==&#34;,&#xA;      &#34;QqNagWxBuciWgmqsaHDwZw==&#34;,&#xA;      &#34;0ZGrJGNNqDLH/sZXsRkfvA==&#34;,&#xA;      &#34;VyeYHICkBiXwLbWKsz4//A==&#34;,&#xA;      &#34;sWMKQZ65XKDEmnR/u8vkiw==&#34;,&#xA;      &#34;5RkTDL6DiLROYOUsuY5wGA==&#34;,&#xA;      &#34;eh1RT9v3ol1cjACTvuohFQ==&#34;,&#xA;      &#34;SnI5fUbXuT/Xt+VkGvddww==&#34;,&#xA;      &#34;9lOT/bRPy9mu1knhwrLw8Q==&#34;,&#xA;      &#34;/WghVlKV6eiRYf2iGmk9sQ==&#34;,&#xA;      &#34;r+NuuQcHZ5hOWGRHanlG0w==&#34;,&#xA;      &#34;RU6xHn/9SV8lotyX3JW1ZQ==&#34;,&#xA;      &#34;o2RzBkbyaO/aJUexQwQheA==&#34;,&#xA;      &#34;kVJhm1LYIfhvn92InJZLDQ==&#34;,&#xA;      &#34;zdrK/Mitm8rUuLp2HwWnmQ==&#34;,&#xA;      &#34;zidvm9MkkP4S62Ofl4+xSQ==&#34;,&#xA;      &#34;kXL26w3j4LcAqSQ9tOuWMA==&#34;,&#xA;      &#34;fVstMFtDcM3yfjjb8mKxrg==&#34;,&#xA;      &#34;qOdN56IOMUot4YWCQPjPvA==&#34;,&#xA;      &#34;2wnmmIxGcmTTQ7kdV4Q55Q==&#34;,&#xA;      &#34;wed5fBK5xYyUEx1EpoQtEg==&#34;,&#xA;      &#34;+pWnGgJUL0jrC1yhwq+kNw==&#34;,&#xA;      &#34;6bZ4UNaa9jRLVZoZHQgYtQ==&#34;,&#xA;      &#34;oBl0IuwDdaD9PwMwSDcQpg==&#34;,&#xA;      &#34;srkxdJQ82zHIMw9egdZc5w==&#34;,&#xA;      &#34;9PE6ZiUdIaAWtCsUgesEZA==&#34;,&#xA;      &#34;eejojwYHRaSarkdAMLD2OA==&#34;,&#xA;      &#34;j7HjBQaZ5PNpv7JydPZ8OQ==&#34;,&#xA;      &#34;yF/CyvOlKzDmpBu26JCuEg==&#34;,&#xA;      &#34;6fJcYsi1gPQNv5g1ujEPdA==&#34;,&#xA;      &#34;qZtkd3o/RK7ypjgH80sV7A==&#34;,&#xA;      &#34;8CpdPmXa4Bke5riHaKWhcQ==&#34;,&#xA;      &#34;7uj4PEKyThSRh2msjDtceg==&#34;,&#xA;      &#34;s9zla+0u22E+Nq1zlK4A0A==&#34;,&#xA;      &#34;1aPjlkabj3eUY8WGb+gz+g==&#34;,&#xA;      &#34;D1jz5P28B8rwvnVaChXHiw==&#34;,&#xA;      &#34;CW81Lp11K0nBc+3dYegY/g==&#34;,&#xA;      &#34;hlV8M1lvezTjDMlaNPSTvg==&#34;,&#xA;      &#34;OqWPbZZgGqlPCMzbmClfHA==&#34;,&#xA;      &#34;UV2MuUVVyu0L6wfdUc0Qpg==&#34;,&#xA;      &#34;QwkBpizF3mo2JpevPMDeaw==&#34;,&#xA;      &#34;tVO6+VLrPGQTVjdd/8MBTg==&#34;,&#xA;      &#34;STluRm8qQBZc5ygxny9Znw==&#34;,&#xA;      &#34;M4/opsM/3qe/3m0zjGkItQ==&#34;,&#xA;      &#34;Y7ypeGdtYfJMJApDHYX9tg==&#34;,&#xA;      &#34;bELtRRWF07YgwEcu9KD6Jg==&#34;,&#xA;      &#34;k5LjlV1zmKau2rAIOnay6g==&#34;,&#xA;      &#34;edf9qrl//4hhbTQ8nlVN7g==&#34;,&#xA;      &#34;ktZZSLvjrHrh7DYZ23sMhw==&#34;,&#xA;      &#34;rXJvA1HAsx+E4rVQeqU3qQ==&#34;,&#xA;      &#34;BsGuSaqfP6qrCK8KTTY4qw==&#34;,&#xA;      &#34;4eh40PtMaL3JhPlCzb+8jA==&#34;,&#xA;      &#34;7Q0Bus9RTfFy/UrxkfH2sQ==&#34;,&#xA;      &#34;Sgu/tfTuRDchfvDOoiuHSw==&#34;,&#xA;      &#34;ve8kNOScD+vxLjbMehgbRA==&#34;,&#xA;      &#34;o+oNdKG9C3ouEb/OQo1GOQ==&#34;,&#xA;      &#34;c3NVrHAJ0F90wrDIEwTmUw==&#34;,&#xA;      &#34;h4AMnuZWsySyrebCjsjhxA==&#34;,&#xA;      &#34;ZAKrc32qORy4LwsxMQgfrw==&#34;,&#xA;      &#34;jh1Mqm3BaTYV6MdA+4D74g==&#34;,&#xA;      &#34;s1XSou7D1y9Q5LYLnrc6kw==&#34;,&#xA;      &#34;/crHce0F0k12Ag9tTWXgCA==&#34;,&#xA;      &#34;4XOA2zoAqaqRnsk9Cc57Xw==&#34;,&#xA;      &#34;0TUqdQNGOvjHNFjkDen1Sg==&#34;,&#xA;      &#34;63po8QED6nDungBQEqHIyA==&#34;,&#xA;      &#34;W5AFCpfA9GqOU4nKI8CYwQ==&#34;,&#xA;      &#34;TRC0h0EsXNyoIhQGny9CvA==&#34;,&#xA;      &#34;V0Rkaf0QFhuzPUd+sx60Og==&#34;,&#xA;      &#34;9gB7mQN0y1Zy9EiaXIHFew==&#34;,&#xA;      &#34;jecTmyeay6DKd/7zioYjow==&#34;,&#xA;      &#34;xVnM1Y5F9hIYQN1//jfY7Q==&#34;,&#xA;      &#34;injDY40WUdFqTiXseelJog==&#34;,&#xA;      &#34;cS/0ymtIhJJUkn3i2OVYww==&#34;,&#xA;      &#34;JXQAkdur2asBQ4qeq789Ew==&#34;,&#xA;      &#34;pNsmsBM6zioL8gqkR9CNUA==&#34;,&#xA;      &#34;bjkXZ4ZTp29EFzF+wMw4xw==&#34;,&#xA;      &#34;c4b8AyMPp1ls7ClKiTCbAg==&#34;,&#xA;      &#34;ftPQfiVA8qRKJwxT2xcXRw==&#34;,&#xA;      &#34;/G3xQo8kmNMyu7hycZYF/A==&#34;,&#xA;      &#34;06GjiUkv66Ek9Iq8u3SFSA==&#34;,&#xA;      &#34;Seg9bNv2Tp+fFcixDR+uTQ==&#34;,&#xA;      &#34;shLykdr8yp2VSWaBtoxh7Q==&#34;,&#xA;      &#34;5dsQlAsI3nHmxcFSn4q9Fw==&#34;,&#xA;      &#34;88J81+RFP5n56+M0nMV4iQ==&#34;&#xA;    ],&#xA;    &#34;7ZWYFE98hi9HyU5Q68Jgsw==&#34;: [&#xA;      &#34;cbNKZbfbJhPfPLHi6va27w==&#34;,&#xA;      &#34;TEg+H5IUFEuL8/4VudXtEg==&#34;,&#xA;      &#34;/E8Khm0ZXy1gRiDom4c+aw==&#34;,&#xA;      &#34;29Fo/GOP7MILPepOrnMgjA==&#34;,&#xA;      &#34;q9L+6bHSCCXbReRfXEPeTg==&#34;,&#xA;      &#34;yq06et41/lBQ0nsMvLOG/A==&#34;&#xA;    ],&#xA;    &#34;7qAMBOvJ2FYxpK9n05pI7Q==&#34;: [&#xA;      &#34;v9qMLnWqPbLz+WC1hPhb9g==&#34;,&#xA;      &#34;3AbYXrLwWtddQg0NqJQudw==&#34;,&#xA;      &#34;4os+HU28VQ7buZvoEKQ/kg==&#34;,&#xA;      &#34;W4i+1AnMm5l6mD/A/2lJnQ==&#34;,&#xA;      &#34;SSReN3l+Qu29CQbqRghmtA==&#34;,&#xA;      &#34;Xms/F5NRiyBcCNuPxw8aoA==&#34;,&#xA;      &#34;a8lEoliaJpwjl9bCwQSdLA==&#34;,&#xA;      &#34;GMnASWjZHihDlhJdlv57Iw==&#34;,&#xA;      &#34;CDo6xcGHS8cRMMAj5ptO4w==&#34;,&#xA;      &#34;Vwf+9XwzpTrnxfhej9q9cg==&#34;,&#xA;      &#34;kjz43GS3cPffEnOhzwtYDQ==&#34;,&#xA;      &#34;r3kgi4w3ZfbkZqbg7eV+tg==&#34;,&#xA;      &#34;W1tMz8vPaPxg0wpYqAjagA==&#34;,&#xA;      &#34;ZEQbZFnaRO71DxSveNx3og==&#34;,&#xA;      &#34;A0davrN208bKuUZqpayi4g==&#34;,&#xA;      &#34;MjFiN4irFT7ilUN8ogYBww==&#34;,&#xA;      &#34;LvLSBTmw++OZNe7y3SPjew==&#34;,&#xA;      &#34;quiQlBj9HjhLTEeBMkOGxA==&#34;,&#xA;      &#34;8I+OMKXto/vUm6tBBR6EYQ==&#34;,&#xA;      &#34;1xlP6pB26ufMu9nE2My5Iw==&#34;&#xA;    ],&#xA;    &#34;84WodsWNE9m9GIrBiKl02g==&#34;: [&#xA;      &#34;XctMW4QJZO0RsDAv/VoABQ==&#34;&#xA;    ],&#xA;    &#34;8Ky53YwzOPM2pkEIVuuuBg==&#34;: [&#xA;      &#34;B1gQIzGtgKR02WiRgVPUgQ==&#34;,&#xA;      &#34;F2QVfam7Idr3v4Y7g3wf/Q==&#34;,&#xA;      &#34;GoHsuuxRgbGb3lm852rQmg==&#34;,&#xA;      &#34;ynnULh1l7jTnQPnMak7suQ==&#34;,&#xA;      &#34;mL/QvlBQrld+4EwXWLYTNQ==&#34;,&#xA;      &#34;Jvht/v3kohSHL0Dt4OmS+g==&#34;,&#xA;      &#34;n+8zHdzpUdNYaOfjqM+rvQ==&#34;,&#xA;      &#34;uPUYRQErrH0+5XWkYAjsjw==&#34;,&#xA;      &#34;v9nWDWoVTUzEu77hVCL+xw==&#34;,&#xA;      &#34;c/+IhJOZwrUFnxH/AA8NiA==&#34;,&#xA;      &#34;YJkc0fG7G+dwREiIQihS/A==&#34;,&#xA;      &#34;QireWdVPs8MzNOJ1scQvdA==&#34;,&#xA;      &#34;T9nCb/lA5TdipGMhtb6HJA==&#34;,&#xA;      &#34;FnsKxnhjNS+E4Y6hrazjUQ==&#34;,&#xA;      &#34;TUvm6koxiDQRc/8CJ4TCOA==&#34;,&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;icr9XD5DN3YDWvP3naYL+g==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;V9f8Tc0z/tWsm1egJDudPA==&#34;,&#xA;      &#34;nLbsKQgcqXqFJTjqeQs6Vg==&#34;,&#xA;      &#34;t+vHm4kt0AB+tq2CG41TQQ==&#34;,&#xA;      &#34;CXlZx/1BY/yqrUCuQlON2w==&#34;,&#xA;      &#34;ixlSuy1zsWjDOO7lFuUNAQ==&#34;,&#xA;      &#34;SsDTRy6ZHTEEM+UFVh6QDQ==&#34;,&#xA;      &#34;ENoYJ+9TEzYG+jTQB5meaw==&#34;,&#xA;      &#34;JtCpNcg8egZjbdozD9CAJQ==&#34;,&#xA;      &#34;IzDqrZ8Ru35rI4iCSSk/pw==&#34;,&#xA;      &#34;HxiMqPnG14UzA9oHqqI6Ng==&#34;,&#xA;      &#34;rRfIMqTlNWlpWE9Bi6NGYw==&#34;,&#xA;      &#34;vu4nws6mMs6GJYT1BNu9DQ==&#34;,&#xA;      &#34;FlgtpglQEkjGT66EnFUHMg==&#34;,&#xA;      &#34;n6Vm6uSXhVeVnZmJCVL4pw==&#34;,&#xA;      &#34;+rCn8yfwQj/rMH9c7+J0ww==&#34;&#xA;    ],&#xA;    &#34;8Q+4qMpgUhvMDCe2QUBIuQ==&#34;: [&#xA;      &#34;Fi7GXCkkqJvYQw6Co8Nk7A==&#34;,&#xA;      &#34;QsR+n6O0ULfYayvahAaltg==&#34;&#xA;    ],&#xA;    &#34;9WzsXAqqRoLidXM4HaB8/w==&#34;: [&#xA;      &#34;oNps3pS/KBKadK++zlgktA==&#34;,&#xA;      &#34;VnqYDU7XWi+aYnVQJuYtxQ==&#34;,&#xA;      &#34;sUwVQqIfYgZ7onTB1NPzvQ==&#34;,&#xA;      &#34;G33a+jVnMZNg6liymp9Lyg==&#34;,&#xA;      &#34;I4HPpXHWYdmlm5nIZYX2Zw==&#34;,&#xA;      &#34;7U+8ffRP7ahu1ot4Zj5Zlw==&#34;&#xA;    ],&#xA;    &#34;9hWn3VgLVkzmMJln7S0UCQ==&#34;: [&#xA;      &#34;oUbBUuaPbKO68xR8hm0EKg==&#34;,&#xA;      &#34;QjS6b4li9vRMvS2l49iyfw==&#34;,&#xA;      &#34;pwNeC1oSJCRKeW3NQ1Zwmw==&#34;,&#xA;      &#34;EZo12eG9Obl1kmhRKBmcvA==&#34;,&#xA;      &#34;76ytKtBeQe8L2T7nxeVp/g==&#34;,&#xA;      &#34;4PXcy6CSX2EaPwYEdLkfbw==&#34;,&#xA;      &#34;DQIgoLb/8+6+HRbr8B6wHw==&#34;,&#xA;      &#34;6WQjHZdyTC+aVOSwNc3+BQ==&#34;,&#xA;      &#34;pxuVFZsuUa8YFBkmcjpnxQ==&#34;,&#xA;      &#34;dXgWtIQra5a7FOM/lmTQMQ==&#34;,&#xA;      &#34;IGsR1pj6qXRBH+0hYVXsew==&#34;,&#xA;      &#34;J5i8I5ZRQGDUXQI4WkC0FQ==&#34;,&#xA;      &#34;rFWIZJAOzhCWoZKNelyFsQ==&#34;,&#xA;      &#34;AI5OCFigX+y57buhAMK1UA==&#34;,&#xA;      &#34;Jq9s0m8iiaLnslijc1N/kw==&#34;,&#xA;      &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;,&#xA;      &#34;a7WPDd2/UqA1rqbo6pjM9Q==&#34;,&#xA;      &#34;H1wshPoazj8pmzsnWAztZA==&#34;,&#xA;      &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;      &#34;X4Ym25zfqcH7/samBN+yPw==&#34;,&#xA;      &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;      &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;,&#xA;      &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;      &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;      &#34;vnI8VBZMnSK/Spr6qFIUOA==&#34;,&#xA;      &#34;IFUwSX5dX69QHRHfvOeQDg==&#34;,&#xA;      &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;      &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;      &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;      &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;      &#34;d0nPfXoEZybRuV9TMDY3YQ==&#34;,&#xA;      &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;      &#34;+TrS27bZKgEeir9pISurnQ==&#34;,&#xA;      &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;      &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;      &#34;/+enDTB16pRyR8XOMcf3ug==&#34;,&#xA;      &#34;J1SK5zSFZI94azX3jybBbw==&#34;,&#xA;      &#34;wCl622H8UElXM4AFHot1bA==&#34;,&#xA;      &#34;oAa5rQ+ettvHgaEihiWA9A==&#34;,&#xA;      &#34;sQrexr1vAx+h04KwvoON3w==&#34;,&#xA;      &#34;748UmdVwB73z0xvCImrQmA==&#34;,&#xA;      &#34;Ewdn+P1XzA/h+WRvejvm/Q==&#34;,&#xA;      &#34;4RaJ63cwUpp+QWj0IKysEw==&#34;,&#xA;      &#34;WVkwWFZlIInzrX99VsKBBQ==&#34;,&#xA;      &#34;Cbqd4MLPHY6FcToWh7U3IA==&#34;,&#xA;      &#34;ItuvzyMGym4CNyVuxWwH3w==&#34;,&#xA;      &#34;DrL6S4TbqHyLJh/Go9vALA==&#34;,&#xA;      &#34;oXbtPoAI0xd/D3jVRZ8E8Q==&#34;,&#xA;      &#34;24Paca4PaySz9eM+VJu4ew==&#34;,&#xA;      &#34;tTdsNcqGarFD7KtMB1ag6Q==&#34;,&#xA;      &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;,&#xA;      &#34;M5aJiMv2/MaWINKfor0BrQ==&#34;&#xA;    ],&#xA;    &#34;AOquy/6bQ9axg0KRp6hMjg==&#34;: [&#xA;      &#34;b+WKHvVRvScXQjTpsI/dQA==&#34;,&#xA;      &#34;U6XBHhWp5n1+o2ZlJ9FraQ==&#34;&#xA;    ],&#xA;    &#34;ARxZCHzD7KB2Pu4aHl7POw==&#34;: [&#xA;      &#34;YXlS56JkLiuXwjbDNwkvdw==&#34;,&#xA;      &#34;N6/VXIOitxRZPgnZMgm+4A==&#34;,&#xA;      &#34;ZMp4FVCkBvOUuQnhgF/KRQ==&#34;,&#xA;      &#34;W9Pcn9xdPg78KgFAK5oOyQ==&#34;,&#xA;      &#34;Lw4KgrwWujzRmDjtibR3+Q==&#34;,&#xA;      &#34;3BY1OD4rYtX6LEFO6X+/Yw==&#34;,&#xA;      &#34;a7PsXEXsbw8aTCMWFxM9mg==&#34;,&#xA;      &#34;2M5CwoqtCrF9ix+6ghISOg==&#34;,&#xA;      &#34;ntPgpTaOsf+PmS8l/Ba/Gw==&#34;,&#xA;      &#34;GbZa+XIQtfFHtHWs5gm0wg==&#34;,&#xA;      &#34;4TbG63vud59mo+N/aCOqpg==&#34;,&#xA;      &#34;4H2TsDPy1XcHidTqNqeZpg==&#34;,&#xA;      &#34;TT6ujth4uzblGI4VcnKBOw==&#34;,&#xA;      &#34;Gn9qNy1ITVhOKz+nUviaSg==&#34;,&#xA;      &#34;plTl3JV8fPj1sUiMh31FmQ==&#34;,&#xA;      &#34;MvPzfqdptyOBxzxR1iCL3g==&#34;,&#xA;      &#34;OoUkTYhn9kcAyWK8OpWEvg==&#34;,&#xA;      &#34;xF20fK5dvutyLkWcMLVDPw==&#34;,&#xA;      &#34;ZhTLRTlcbZumWmiritxOAw==&#34;,&#xA;      &#34;aqmerajri2owkCLHieW70w==&#34;,&#xA;      &#34;72/cPQH5mNLd1/e3j2Vn+Q==&#34;,&#xA;      &#34;2QjZksAOTEJVwk59l2QYOQ==&#34;,&#xA;      &#34;SfJy5i/9nh3s5fpZxZDQCg==&#34;,&#xA;      &#34;Lr5d+BjmGHyC+AWnFQJRTA==&#34;,&#xA;      &#34;B+E5cjNC599y+nmprS3J2Q==&#34;,&#xA;      &#34;JLdsQ9mzV76+v5Ttq5j2hA==&#34;,&#xA;      &#34;Fw+ArhlgBhD30C7D93vYhg==&#34;,&#xA;      &#34;/eHyvb2Yvu/vFkWHODEbfw==&#34;,&#xA;      &#34;f9AAdWBkmOO1/+acrJji3Q==&#34;,&#xA;      &#34;VwRZMkFc1pqkTIff/cjZtQ==&#34;,&#xA;      &#34;uRGTeRjJyz2NEeH/TpkK8Q==&#34;,&#xA;      &#34;qaC6F9Z9j5kAaiDeRwL7nA==&#34;,&#xA;      &#34;HmZXdUV/ycFcRK+m71pC+w==&#34;,&#xA;      &#34;2Yo5V5wVVXhJ0VU+H57P9g==&#34;,&#xA;      &#34;Ds5dBDqvRggZONNskvuAwg==&#34;,&#xA;      &#34;m/cpX9gyFETv4B87S/qRxw==&#34;,&#xA;      &#34;lCc1jyHfsFJK2HfULjN8pA==&#34;,&#xA;      &#34;d9oy2JiAKtie2N1lu2J6ew==&#34;,&#xA;      &#34;fuOmX+MQWgJjrWZ2kXbtlQ==&#34;,&#xA;      &#34;V8tjixCGBsaAWvQP5Hvn+A==&#34;,&#xA;      &#34;GW37uYQxwwgJBIDtA/dT2g==&#34;,&#xA;      &#34;V2/vsNJeH5BxrzuVis91/A==&#34;,&#xA;      &#34;EFXoHkta9v8NXWXURLTCBw==&#34;,&#xA;      &#34;OaLF1hM9BwMPMfYWn9kNEA==&#34;,&#xA;      &#34;mZC3gBcn6x1aC7q9hXUpKg==&#34;,&#xA;      &#34;4Ir8FDWM4WPrO3dybbfnYQ==&#34;,&#xA;      &#34;y/vNaOETNDNWhjGaBLNhRA==&#34;,&#xA;      &#34;RxiYxX3H5lL8cc7k0ac/mQ==&#34;,&#xA;      &#34;s9Fn1OI38EWrq2OqjoQ6KQ==&#34;,&#xA;      &#34;3CUrg7YVjtx0L5aX+iMRxA==&#34;,&#xA;      &#34;6miUB07ljV2HaYX/rZ1yjg==&#34;,&#xA;      &#34;kVjUyjaMJ0bXnwb03Ksw3A==&#34;,&#xA;      &#34;uDUK/vmP915z5uyCv2VhVg==&#34;,&#xA;      &#34;9fvqDo3ARbJLIgwR1oX6QQ==&#34;,&#xA;      &#34;VDdxJUjxgL4zXvGWC/1xnw==&#34;,&#xA;      &#34;9oQBIjmHHZP7ZEjuqVHO7Q==&#34;,&#xA;      &#34;MrpKafmPiKoIdSrqC/r3Sg==&#34;,&#xA;      &#34;WCZXmTnbo+2lbMuZdpH8NA==&#34;,&#xA;      &#34;t6Z7F4vRK3+khLx6GFFiJQ==&#34;,&#xA;      &#34;Gs2+AgmYyHSIFlXrCWZVZQ==&#34;,&#xA;      &#34;ua1shFLPCkFCKWCRwaqUDQ==&#34;,&#xA;      &#34;bOMmd0jIpY2e7Cl4owS24g==&#34;,&#xA;      &#34;Wv5rERdynoJ/gHM2CtgXiw==&#34;,&#xA;      &#34;Q9syyD8a/4l/mc50UAvBnQ==&#34;,&#xA;      &#34;JiPLnE3IM4/yPxZ8earXLg==&#34;,&#xA;      &#34;U31VkPC5v6K7XIsRFDo19w==&#34;,&#xA;      &#34;dgb3Uq6TqRF91f0NcIu0Uw==&#34;,&#xA;      &#34;/+Tfrcve2y5Ca3irhvwHVA==&#34;,&#xA;      &#34;+do0gu6vrF3ZT5my5V6+CQ==&#34;,&#xA;      &#34;+Q1v3N9+IP1xQOJnmQWDyQ==&#34;,&#xA;      &#34;vM/BpQVYTLnKgFVNAeaxvA==&#34;,&#xA;      &#34;MqCQLlgAJiW3Q42ssHKybw==&#34;,&#xA;      &#34;+sWeYS6ySa1XLsRNuvvO3Q==&#34;,&#xA;      &#34;xUBSdDBs0fiKOh6BCZPXOA==&#34;,&#xA;      &#34;cHe6S9cCUDaq9usM0j2CnQ==&#34;,&#xA;      &#34;l91ZStS7zd83ItxB5JiNAw==&#34;,&#xA;      &#34;6q1zANz+NJU+U0TPL1Xa2g==&#34;,&#xA;      &#34;7XSgHUx9G277ukge5cFkHw==&#34;,&#xA;      &#34;DZWopkvTJiWmVsAADTNOUw==&#34;,&#xA;      &#34;gZKcOjx7BKTLxDMH6ZvfGw==&#34;,&#xA;      &#34;qV/TxipuOJ9b9a/x4IT2cw==&#34;,&#xA;      &#34;ZyINijq7IMSOcH4xz5eNoQ==&#34;&#xA;    ],&#xA;    &#34;AdRs6lk9yzTM3HvjeEThKA==&#34;: [&#xA;      &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;      &#34;4JsZIRvQ+13IMgBIUPH0jA==&#34;,&#xA;      &#34;dZ7ryQ0b1w50+eNxXX/Jcg==&#34;,&#xA;      &#34;bZGx+ktPNqzyr9hXBoIOTA==&#34;,&#xA;      &#34;P2LAyAbSFxWVwlNB9c/A2g==&#34;,&#xA;      &#34;djVJ3xutTQUXY8g8Nh3rxg==&#34;,&#xA;      &#34;+JeSB99qGv/68TsolLxJ1A==&#34;&#xA;    ],&#xA;    &#34;AnHvlYoTKSxzg0JMVMiJkg==&#34;: [&#xA;      &#34;d/522T+B/ARMNSG+3QfAWA==&#34;&#xA;    ],&#xA;    &#34;AxTxyAHzdLVnUL9t8+ZYmg==&#34;: [&#xA;      &#34;kkBeA26IUhnokem2LDfx1A==&#34;,&#xA;      &#34;7T9qiwKBE1swIXuW9Zvewg==&#34;,&#xA;      &#34;RPlldG/r8WWd2UCSZ1vzsg==&#34;,&#xA;      &#34;QHS4gwmQURKolJEnj/ZMHw==&#34;,&#xA;      &#34;p2D36zAi5tbYfUPJhBVLhg==&#34;,&#xA;      &#34;urOIF+inUTTF1gL7DeWkzg==&#34;,&#xA;      &#34;L2l/2cM7p8mbRx8/RerNPg==&#34;,&#xA;      &#34;uvaZxZFE7cKBjyjVQ/t6lg==&#34;,&#xA;      &#34;WGccGAwrqbQSNjycPuaPsA==&#34;,&#xA;      &#34;aR+DKIj7GETMsDtNSfYXNA==&#34;,&#xA;      &#34;fEW9HCDGh5vauL1jhvKpFQ==&#34;,&#xA;      &#34;pT+67u2xHyxzA5Cl+Ui55Q==&#34;,&#xA;      &#34;3D/COcmVFbxgINNliqKHgw==&#34;,&#xA;      &#34;HfjDJmml2JYJ9YjdaPe+zQ==&#34;,&#xA;      &#34;HS96brYtpBiaYpW7OxT5Wg==&#34;,&#xA;      &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;,&#xA;      &#34;M1Z06nydk707qbRpFiKmaA==&#34;,&#xA;      &#34;H1wshPoazj8pmzsnWAztZA==&#34;,&#xA;      &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;      &#34;X4Ym25zfqcH7/samBN+yPw==&#34;,&#xA;      &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;      &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;,&#xA;      &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;      &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;      &#34;vnI8VBZMnSK/Spr6qFIUOA==&#34;,&#xA;      &#34;IFUwSX5dX69QHRHfvOeQDg==&#34;,&#xA;      &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;      &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;      &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;      &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;      &#34;d0nPfXoEZybRuV9TMDY3YQ==&#34;,&#xA;      &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;      &#34;+TrS27bZKgEeir9pISurnQ==&#34;,&#xA;      &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;      &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;      &#34;EYkM0DDu8tbFKzGysEiO0Q==&#34;,&#xA;      &#34;KXzUsn7IGL3ZRMjBL3QOng==&#34;,&#xA;      &#34;PdGhfwK5tePs8ngzFuopoA==&#34;,&#xA;      &#34;++J1c+9mFiyHFShlJEQFeA==&#34;,&#xA;      &#34;H+x0VPepDcitQiESaSwIwQ==&#34;,&#xA;      &#34;ETjF+btf4DIblmTTbHaZSA==&#34;,&#xA;      &#34;1nX4t0Z3G1H45fqJox3f4Q==&#34;,&#xA;      &#34;67Q/SCDsFWutXyKWQ9JQdQ==&#34;,&#xA;      &#34;NNyvMdW5UTPp1jGH161XDQ==&#34;,&#xA;      &#34;be+F+Fkt9wYh4z6YwfNqdw==&#34;,&#xA;      &#34;gR+h15dyWueqbKII4cPOWg==&#34;,&#xA;      &#34;0LMSjLLjEqlpe4LAE1rWJA==&#34;,&#xA;      &#34;ff3woW6bpDBZXooXnBPlNQ==&#34;,&#xA;      &#34;qMnTnRnGw88RiTP1PFxynA==&#34;,&#xA;      &#34;dqYoyBWLAQszVE/IX85oqg==&#34;,&#xA;      &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;,&#xA;      &#34;NJhwMDbt0IMvlSLLB4cUVA==&#34;&#xA;    ],&#xA;    &#34;C3QbGupU53FFTX0pkfNLrA==&#34;: [&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;      &#34;+4boUUXSpak/++mwJDcv/A==&#34;,&#xA;      &#34;okR1HNl+O4zCKuv8Joeqcg==&#34;&#xA;    ],&#xA;    &#34;C7VGVckK0YZj4RiVmStEsA==&#34;: [&#xA;      &#34;LElGnvRnV9StufJdr+3D9g==&#34;,&#xA;      &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;,&#xA;      &#34;Mgu68G03r/7Tj/zMomkJZw==&#34;,&#xA;      &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;      &#34;HxI42iSjURjRki+uV6q/9w==&#34;,&#xA;      &#34;s2LBjGccKZbn8OaPObByXw==&#34;,&#xA;      &#34;LeWRqc+lggRL8KnG53e6CA==&#34;,&#xA;      &#34;8Efa1m3XsyOFY5vSd2fHNQ==&#34;&#xA;    ],&#xA;    &#34;CjFzfz4zBZj7fcwIrVHCRA==&#34;: [&#xA;      &#34;FjB9AnugxBHu7Kwf86C67w==&#34;,&#xA;      &#34;GtECMHzRoeZKh1TLvpCt+A==&#34;&#xA;    ],&#xA;    &#34;CpC5etTxiNuDvBGQesJNDg==&#34;: [&#xA;      &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;      &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;&#xA;    ],&#xA;    &#34;Ct/46Ed7Asmqt98kLc0FLw==&#34;: [&#xA;      &#34;vgP3FAR9tXjiqUc0mFlRrg==&#34;,&#xA;      &#34;kQq8hvN2yLWiupMaLbRduA==&#34;&#xA;    ],&#xA;    &#34;D/XNnExpupd1bO9ZIJIE9w==&#34;: [&#xA;      &#34;JsF5ac8+OAOWxsV80iUiIw==&#34;,&#xA;      &#34;0W0/E/g2cPvxNF42LmIwRg==&#34;&#xA;    ],&#xA;    &#34;D0GGDit/UxegO+/A5R03SA==&#34;: [&#xA;      &#34;XW4X9/W6MfETfE/VICA4Jw==&#34;,&#xA;      &#34;fSeU4QTAs+fY+ihLpgdM9A==&#34;,&#xA;      &#34;R1x4adkbkgVhxc9hzgUZcA==&#34;,&#xA;      &#34;n39YhRffL6tFFAy/S18A8Q==&#34;&#xA;    ],&#xA;    &#34;E2+Fh4utKcr7Wyiwzh2bYw==&#34;: [&#xA;      &#34;ae3lHA7MmabWs4AIbhandQ==&#34;,&#xA;      &#34;k2PJBnbhSab9fWak/vBKbQ==&#34;,&#xA;      &#34;66LeUA2b+ILx/Qsv0eSJ5w==&#34;,&#xA;      &#34;vljECkHLXvnkFYEiPVK0gQ==&#34;,&#xA;      &#34;PMaPI3hRDt0vFaerryvY/g==&#34;,&#xA;      &#34;vY8p4yRfnET5EfrovUfwkQ==&#34;,&#xA;      &#34;wL88v46Y3XlOQ8xtlmBugA==&#34;,&#xA;      &#34;15uVNLTcXPHEO0XVoOOwZw==&#34;,&#xA;      &#34;EE23Ay78OLUGxmoM3vXPbA==&#34;,&#xA;      &#34;DGdHlHvCVlJgbLPDhdwSoA==&#34;,&#xA;      &#34;f6oGdnhZomBa/bs3snB3kA==&#34;,&#xA;      &#34;V+7K8Rg1uux3xnVmyH12/A==&#34;,&#xA;      &#34;OxOc7/P4x7mjEZNhGnABDA==&#34;,&#xA;      &#34;W3qe9/KhW5BUF2s+kXxVcA==&#34;,&#xA;      &#34;z12tQXXi14IQVfwzjztF5Q==&#34;,&#xA;      &#34;s4mktw9S/tOEdbFRu8ZxjA==&#34;,&#xA;      &#34;POcCjok8El2qPlKNKRD9WQ==&#34;,&#xA;      &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;,&#xA;      &#34;jtuaBa5xeKFbUsOxJOGtDQ==&#34;,&#xA;      &#34;O0ZHj1wCkn8EgvHd15dYqA==&#34;,&#xA;      &#34;TA2J/BLShfgMiVMvb2bFmA==&#34;,&#xA;      &#34;mpDlR2Lk6PsJrTVRdAvAng==&#34;,&#xA;      &#34;+ieGB56AL1fLbXEZaHIRig==&#34;,&#xA;      &#34;HnNhAdInEg3yPEHYo7Hl+Q==&#34;,&#xA;      &#34;7UXEplX43qBZDj2wJI621A==&#34;,&#xA;      &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;,&#xA;      &#34;nRYrn2tFn8hdV0x+2YRPYQ==&#34;,&#xA;      &#34;5j7D/WXFLHsZYUeUrskpMA==&#34;,&#xA;      &#34;hazOAbpBSQ6ZcoEMkq6UhQ==&#34;,&#xA;      &#34;I2RIq/DddjMUlHYGWhmsEQ==&#34;,&#xA;      &#34;R6drGbgnzqKGDiX/RNUdqw==&#34;,&#xA;      &#34;Ldf0SBs4F44XtkmDr6o4kQ==&#34;,&#xA;      &#34;1/8/Mjb4nleg0SsOivHAww==&#34;,&#xA;      &#34;rUdPv86F0f314ayFTA1g0w==&#34;&#xA;    ],&#xA;    &#34;E7ikPxWehuEw+6yIZODYlQ==&#34;: [&#xA;      &#34;Tz9Z9WUqfvL0BrLTJjlG5g==&#34;,&#xA;      &#34;13Dkon5caDMIMuKn79Qskg==&#34;,&#xA;      &#34;jujfK7kvNttCHbG9Y1cEjw==&#34;,&#xA;      &#34;+QQwOZo/9naGhbYAyaOr+w==&#34;,&#xA;      &#34;OSUAY4vX1mm91uqYY2QyKA==&#34;,&#xA;      &#34;mjI/WzMYY52AQdc1No8ugQ==&#34;,&#xA;      &#34;ZZYlhV9nOBPxmh+lN8Wzlg==&#34;,&#xA;      &#34;WGwIYJUrzsJ4/8TTyxMGGQ==&#34;,&#xA;      &#34;3UFdmogC8LxBJ8vh97CLKg==&#34;,&#xA;      &#34;4ZcrBE+d85+98j2eHMpVTQ==&#34;,&#xA;      &#34;C+zOyZD8CwAZei0FDIvlTA==&#34;,&#xA;      &#34;qAjJcUd7scO8lHObIc+8TA==&#34;,&#xA;      &#34;pLMgO5RHEs1yrujEkb226g==&#34;,&#xA;      &#34;/w1B4Q4YhRhn+C15Pv2Mlg==&#34;,&#xA;      &#34;Xo53LSQ1UPT3k4c2guU75Q==&#34;,&#xA;      &#34;4PIM0/eLiUwExdFACTKEEw==&#34;,&#xA;      &#34;zEKtVLhCQn3xgvKNhFo2bg==&#34;,&#xA;      &#34;WlLXHoXR9O8Ph+uSZ6aDCg==&#34;,&#xA;      &#34;LTObsRKzbMcDf7ZCch9lsA==&#34;,&#xA;      &#34;CfhyOTUZXzyZ1gBqX8Jz5Q==&#34;,&#xA;      &#34;ab/GKLlj0s6Lkn9DyDnUUQ==&#34;,&#xA;      &#34;3A/kVsDzDDwZXdM+JpfWlA==&#34;,&#xA;      &#34;uFRb2siFSROrNSaSMqsvqQ==&#34;,&#xA;      &#34;2/tA0uwDqjzRb7JZP+f4Mw==&#34;,&#xA;      &#34;QMVQFQxQO9E+szLpK5nZ9w==&#34;,&#xA;      &#34;2usQa32fSqIDVo0qKM7RFA==&#34;,&#xA;      &#34;x4dqDafgKW8Zo/is+xcVZQ==&#34;,&#xA;      &#34;ves1GfNCYjdCXJceNwT2Lw==&#34;,&#xA;      &#34;6VA82zmenvpHf3qd7c6BQg==&#34;,&#xA;      &#34;IERk9xwccKWSGr20Hb5U6g==&#34;,&#xA;      &#34;zjZHjKf2l5+qY9/XYdFMQQ==&#34;,&#xA;      &#34;N6yyVyHeduwThpSSvA2dVQ==&#34;,&#xA;      &#34;Us6zMNu9gwaRC0UH2SSoQw==&#34;,&#xA;      &#34;n2MoI6iOOGKJg6CiwpZkxg==&#34;,&#xA;      &#34;UPjX59r3QHIaBVa54cqtzA==&#34;,&#xA;      &#34;mypK4Oz3YEbjmcF//Lb3ug==&#34;,&#xA;      &#34;JrT9jqBaZlLgPCS0RLnpPQ==&#34;,&#xA;      &#34;b/JoMKSdjTg9hoFgyAsYGg==&#34;,&#xA;      &#34;QBD2bakyMRLlWNUWb7c8Ng==&#34;,&#xA;      &#34;FtF7hWwlQYu4clVsrpBd0Q==&#34;,&#xA;      &#34;1ICypZP/7UrDVdoDevopUA==&#34;,&#xA;      &#34;5dIAtetRd+EnRw+FudplXw==&#34;,&#xA;      &#34;6MrPfKc4s7QjoixYMvK5aQ==&#34;,&#xA;      &#34;SS38Q6SbT7pMry4emWgqdg==&#34;,&#xA;      &#34;WOmMgxwwjpbn/RLQX8HPBg==&#34;,&#xA;      &#34;9HK6XfbtFUbx1tNKJlBYeg==&#34;,&#xA;      &#34;pIJllB0DitFR4biXCLWlfQ==&#34;,&#xA;      &#34;nqEvJfkqmt5u+8eh9j8mMA==&#34;,&#xA;      &#34;LyEH4RIrJnMwmS9bxL322w==&#34;,&#xA;      &#34;vn/18J5TIuzcd8MxdMgYlw==&#34;,&#xA;      &#34;tIZr20KLFTaQt9OBw5SXsA==&#34;,&#xA;      &#34;3w8o+aWAdmG4VgeVZcWXSQ==&#34;,&#xA;      &#34;09S7nCU8PMWz5tWquOFCaQ==&#34;,&#xA;      &#34;SIPkCsjtWsrsJnfVRjxnKA==&#34;,&#xA;      &#34;Mhh/p16eoRFTSGC5EJRZEw==&#34;,&#xA;      &#34;BzOgc4nzX2HHoodQY6X6vQ==&#34;,&#xA;      &#34;2/I3PyWTnfJdMedKAemp8Q==&#34;,&#xA;      &#34;rpwsfSDtxz8KgCjcE5LUgg==&#34;,&#xA;      &#34;lVjWozUTbgE/Ed14ZW1okw==&#34;,&#xA;      &#34;mk/9oG3VlXeyR83vbnlC7g==&#34;,&#xA;      &#34;KBpYoBBh5AFRsvma/sImeA==&#34;,&#xA;      &#34;PAVfrfQyg9ezKUDPbI/Nmw==&#34;,&#xA;      &#34;0kDaqIpbO93XpnbaK6KFUg==&#34;,&#xA;      &#34;wVu6Drfzxh1KT5UxKndpTQ==&#34;,&#xA;      &#34;0MVVcjDKfdLbs80csEfrOw==&#34;,&#xA;      &#34;NpKL2jmktUTvYJUFA1mjww==&#34;,&#xA;      &#34;2y2LXrQ+Jdr+fioSazFF4w==&#34;,&#xA;      &#34;r8kk8OjPGZXkalD/ogI9TQ==&#34;,&#xA;      &#34;HeemEcWe2JVMYkjGWbuiFA==&#34;,&#xA;      &#34;+Q9jA+OXah1xDhJvsj+1OQ==&#34;,&#xA;      &#34;X9G3TF69Pz3xUY5yIPno7w==&#34;,&#xA;      &#34;6K5O0xmJnJtZcGmUaZ+P/w==&#34;,&#xA;      &#34;qhl/5MtAFFjdvINFEhyFsg==&#34;,&#xA;      &#34;RA9ILX3H27ou2ro1GzHq8Q==&#34;,&#xA;      &#34;miA8N3aOifbt6s11v8VS/A==&#34;,&#xA;      &#34;SjRIPS8zwG2cWHBok+S2aw==&#34;,&#xA;      &#34;QDYJ95dZNazClKtqoRJQeQ==&#34;,&#xA;      &#34;l5Fb8T5ynp1oelRWVY+EaQ==&#34;,&#xA;      &#34;UdpGJo841LNQDU8fdaEoEQ==&#34;,&#xA;      &#34;svdlbVzNwZE9P/M3GvQ7Xw==&#34;,&#xA;      &#34;SsNZleqCp7tmOqFZQ6ZaBA==&#34;,&#xA;      &#34;pwSWzlcJAuR/J5zikGUxiw==&#34;,&#xA;      &#34;29JfppZedoclZHW2coehcQ==&#34;,&#xA;      &#34;q29SxeDdhfgnRkudvf3mdA==&#34;,&#xA;      &#34;GwJvkFMzYrKrZEvvNMbc6A==&#34;,&#xA;      &#34;OuZBWnWNFHYdTgntdOB15Q==&#34;&#xA;    ],&#xA;    &#34;EgjLGZKjPtqIaFVLlFAAPg==&#34;: [&#xA;      &#34;hK/f5zoJDHjYWcidbJwYsg==&#34;,&#xA;      &#34;j3PAipb/hCxnbdoUmJvkNQ==&#34;,&#xA;      &#34;vkypiN/HZjIiT/S9k2qxvA==&#34;,&#xA;      &#34;j8SFSR8BZ09zBKgRkzC7Jg==&#34;,&#xA;      &#34;D17rv5OxhiqZrK+otc1Xcg==&#34;,&#xA;      &#34;87p97+dH2sU2JVQ8vQ+Xuw==&#34;,&#xA;      &#34;zE3cPdw4Ma9jQQUVeE/hdg==&#34;,&#xA;      &#34;7QBYsSaCu8T87GZR3WHxyw==&#34;,&#xA;      &#34;tVvgs8QNtuRqLgnWoPIWbw==&#34;,&#xA;      &#34;BBNgt41sCJ+dkDLhh8RM2Q==&#34;,&#xA;      &#34;NrNei+pIM0R36v4Js8XxAg==&#34;,&#xA;      &#34;FInGJTEa3gToUzpaoDNNQw==&#34;,&#xA;      &#34;gchW+O287jwZk0Cnma5sKw==&#34;,&#xA;      &#34;YKgthSAonF3epY42eqsMRw==&#34;,&#xA;      &#34;p8XKlr7C/uFXLykQP2132Q==&#34;,&#xA;      &#34;bf41zTvm6HAv6xdiXpwGWQ==&#34;,&#xA;      &#34;bpwdCug2xQZhmaazCqwIew==&#34;,&#xA;      &#34;ikYp9FVR/trdSFxeYpqAcA==&#34;,&#xA;      &#34;/mkayEGPyxm+Oz1uU7VxhQ==&#34;,&#xA;      &#34;LKchwuMyQH4TU0LwtP5Jcg==&#34;,&#xA;      &#34;N7PASlSPc3vUrDZEkY1NrA==&#34;,&#xA;      &#34;KQxTPw9E6zvhoYRhRJNsGA==&#34;,&#xA;      &#34;MOUExK9O9qzIs9ukHaS2ew==&#34;,&#xA;      &#34;UAhBHfztlbXF0z40Y/JYoA==&#34;,&#xA;      &#34;8ZrkaQ6B1f36PC2cIg9i6A==&#34;,&#xA;      &#34;khaGOQZwNAF+Kql1EAlBfw==&#34;,&#xA;      &#34;T5/Q0DOZypWV6o3x9ziKqw==&#34;,&#xA;      &#34;yKRKMYSzkiSZ6c90bTl6iA==&#34;,&#xA;      &#34;fZosNTVXWxoMJAWhA315xQ==&#34;,&#xA;      &#34;0wh4c9Z6sNxM5NAXtzaMNg==&#34;,&#xA;      &#34;qwmfWZM521TTUrM59mggiQ==&#34;,&#xA;      &#34;BceQQXlChHEbiy2YYN7FvA==&#34;&#xA;    ],&#xA;    &#34;EuqqL3yIFMd5VRAfuufJgg==&#34;: [&#xA;      &#34;EEsEsfQRh24NPMdhg4HPHw==&#34;,&#xA;      &#34;B+xaJOiguNTw6xGmTB+mZw==&#34;,&#xA;      &#34;1KxLqY5vPHnDfUxdviejiw==&#34;,&#xA;      &#34;DFOoWHynQeFD6fZDvPyKMg==&#34;,&#xA;      &#34;7SutUCP3yRd4o5ryN/dDZA==&#34;,&#xA;      &#34;QrDxAdiYzNE7ZZrkfYGiQQ==&#34;,&#xA;      &#34;oDGZCaWnkiaSQdz+QhIr5Q==&#34;,&#xA;      &#34;DtCtyEFA0WRhx44S/aRChA==&#34;,&#xA;      &#34;o1V8hGX+jv19u/R1lSOgXA==&#34;,&#xA;      &#34;m4A081U6rE2WLJ4u/pMkqg==&#34;,&#xA;      &#34;7Q4dYBj4wFa2768mWculSQ==&#34;,&#xA;      &#34;DE3GDsNl2faTwlhxzYBbYw==&#34;,&#xA;      &#34;CBxUpiwpFiagAj3ihqf+vQ==&#34;,&#xA;      &#34;tLfvNXQJ1ryG1oIjuKoLPQ==&#34;,&#xA;      &#34;6JXvoql3pzMfkGQb7H+Jqg==&#34;,&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;icr9XD5DN3YDWvP3naYL+g==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;bmyf3V3WjS7kQmiAcGoBiQ==&#34;,&#xA;      &#34;YjXf6yY9feRqNoLqPt5iEQ==&#34;,&#xA;      &#34;ruok+KtL5TC6jhvqLAZEzw==&#34;,&#xA;      &#34;4QiWtYafAt/cFOvYpyJONw==&#34;,&#xA;      &#34;kgCv9K1pgDK48LdFtpFN9Q==&#34;,&#xA;      &#34;ml41hyZPGVbTkzvmMyY3Yg==&#34;,&#xA;      &#34;yK3vcSC4PlKQSa9IQKCw1w==&#34;,&#xA;      &#34;z52r/0OKaWAkLWR5L4SEkQ==&#34;,&#xA;      &#34;Cxqp3OmZ1TuIow2bpolrUA==&#34;,&#xA;      &#34;oQ3Lediq93z2xbrIoJUi7Q==&#34;,&#xA;      &#34;Lex02lwAwiaMkFn9DV9FuA==&#34;,&#xA;      &#34;YZq+CTlAXva/aUDDEFdZNQ==&#34;,&#xA;      &#34;P8ATyyToJgziJaUXIjyPvA==&#34;,&#xA;      &#34;ecYseAb1rFmqPx4kHRWeQQ==&#34;,&#xA;      &#34;4CRDu/yV+Tfg3mSUobPIUg==&#34;&#xA;    ],&#xA;    &#34;FMrR4PbDeEhmMEh2juuVnw==&#34;: [&#xA;      &#34;g8hJlpBfWMarbfdU+OkQdw==&#34;,&#xA;      &#34;89XrIFUuuXy08LkDR6XMOw==&#34;,&#xA;      &#34;SaWdJL5a+HL0ZieRiKpgNA==&#34;&#xA;    ],&#xA;    &#34;FVL6ljas6Mq4jYoOr1b6Hw==&#34;: [&#xA;      &#34;iSzOvPxPGZr2PfJTBTQBCQ==&#34;,&#xA;      &#34;z/LMTnJeia+du5LSYhMD2w==&#34;&#xA;    ],&#xA;    &#34;Fy3bplraTnRnJlV5RewauA==&#34;: [&#xA;      &#34;Q1F3DVZZ3gpMNQT3yhbiSg==&#34;,&#xA;      &#34;C7VuSVoDHe6g3ERpzwYLFg==&#34;,&#xA;      &#34;Bh96oSV9q0619slTJCaM0Q==&#34;,&#xA;      &#34;qhSIFNwi876BQWyJqx7TXw==&#34;,&#xA;      &#34;Sfn7NNniMfKKkrbS2KIlnA==&#34;,&#xA;      &#34;aJcuD8I2FFtYOQG27x05WQ==&#34;&#xA;    ],&#xA;    &#34;GVmxmNcJqT3ovg+RwjJg1A==&#34;: [&#xA;      &#34;/GSEB7NuV5IOBsMvXs0hOw==&#34;,&#xA;      &#34;c95Jb/MAeM4/Wnq2jSIopg==&#34;,&#xA;      &#34;ghVsimzHhtfG91QJVkK8Jg==&#34;,&#xA;      &#34;Aet749oXCwhRnnY9gEGYGw==&#34;,&#xA;      &#34;sWCyUi5vmFbqsTEOh1QQvQ==&#34;,&#xA;      &#34;dNHj9TUgbfnbgJUCEellCw==&#34;,&#xA;      &#34;A3ZYVQ8Z63tDAx8FSltQHw==&#34;,&#xA;      &#34;JVuTqfPwohmj6ucokgM2sQ==&#34;,&#xA;      &#34;GDAkupnsjiTl71rwzH5RJg==&#34;,&#xA;      &#34;VEE7ccbKf4EH2dNVXOf2uA==&#34;,&#xA;      &#34;7jE4UN8ZNzWXfNDZ8BZq3Q==&#34;,&#xA;      &#34;DUP5ugYJi+iUbcfFxoSiig==&#34;,&#xA;      &#34;T8IbBnTK2Iv5YVT88l9ngQ==&#34;,&#xA;      &#34;J1cvee8xy6oZDEdA21dqEg==&#34;,&#xA;      &#34;8TL7OmwuwkB+6m9uO5u62g==&#34;,&#xA;      &#34;sxcy9NTxyeNn/j3K+DCTCQ==&#34;,&#xA;      &#34;k6D6o9qP1X41yPQlNQ8aww==&#34;,&#xA;      &#34;X4CDljJQJsftQ2RA57ftuw==&#34;,&#xA;      &#34;gFgnmTqhW1tr7jmOrXQQQQ==&#34;,&#xA;      &#34;XsxaedsaFYv/ys7GTRoUVw==&#34;,&#xA;      &#34;Ji6OY1u39nJByKzCNwfpIw==&#34;,&#xA;      &#34;1I7VtxkB33ashDX0kB4Teg==&#34;,&#xA;      &#34;+doAGgTwsE0iptDdCED/aA==&#34;,&#xA;      &#34;791CRjnt/pj2GXzRz2PiHg==&#34;,&#xA;      &#34;gx7w+mYZCEGlSNGIkO6bLQ==&#34;,&#xA;      &#34;3skSbDjTQ02+eNiFJz716g==&#34;,&#xA;      &#34;J6JEqF6+PkBwS7J9B0Lefw==&#34;,&#xA;      &#34;JvC/rVWSiuNeMXzeTDRZHQ==&#34;,&#xA;      &#34;nuFsbkH7VzW6LS3WLhSszA==&#34;,&#xA;      &#34;e1tWGyUIVU1QafO75am9CA==&#34;,&#xA;      &#34;lWxwCNVjYSW4SdS9h9uKvg==&#34;,&#xA;      &#34;GR80zW702W+xho6dTSNlyw==&#34;,&#xA;      &#34;MEP8FBVAfPt6fwJRFfcI5w==&#34;,&#xA;      &#34;+govv3Zh4UHQ+P7JiRlanw==&#34;,&#xA;      &#34;rRcUnpfkGlXrbtunwHjYyg==&#34;,&#xA;      &#34;9hzf7VYOdcRePOTqOS2DHA==&#34;,&#xA;      &#34;Lv181AfOrKwIP+rlrdVs2A==&#34;,&#xA;      &#34;guovo7cvog/lYbVq887U/w==&#34;,&#xA;      &#34;1eXmoeT5Qd9M0GiSJ3z2mg==&#34;,&#xA;      &#34;szMAuHDpCq8KehOnG/58kg==&#34;,&#xA;      &#34;xDgXz/CGonIMAByh5y71UA==&#34;,&#xA;      &#34;PEaU9hApxjdZ1D4R2OUZpw==&#34;,&#xA;      &#34;95p6rGNUFNsCWfXMBirOLg==&#34;,&#xA;      &#34;pF95anl048AG1ftGU/lNnw==&#34;,&#xA;      &#34;i8zmTjiP3YXXew6ZKB2Ogg==&#34;,&#xA;      &#34;NtbylJEfQzKWA6OUFA9HFg==&#34;,&#xA;      &#34;S01BJ2Ht59Iq71LsHWKLzg==&#34;,&#xA;      &#34;6/J2BNJ50P9dbLT32gy3eA==&#34;,&#xA;      &#34;AyZ2Ys1oI8T5ntmwQE0+Qg==&#34;,&#xA;      &#34;c3PMMUG7qpg+sSIEQy9R+g==&#34;,&#xA;      &#34;Hk/EnuFgs+4rtDh2D0OPZg==&#34;,&#xA;      &#34;FPJOQAbsBSaId8RmD/1j8g==&#34;,&#xA;      &#34;F54ap+bUe0qceQi67ZX30w==&#34;,&#xA;      &#34;vQedZoMzqBElfCAKIwQo5w==&#34;,&#xA;      &#34;c+walK0V+dA1g3qnPME4Ow==&#34;,&#xA;      &#34;8kPW6EH9br7BQBK1DHvQsA==&#34;,&#xA;      &#34;pp3PQor2CpTCVnKZusQgwg==&#34;,&#xA;      &#34;dpCbBO9jgzvekz9nKJpSRA==&#34;,&#xA;      &#34;70+Z8jFk8NJbHxPCoxDRng==&#34;,&#xA;      &#34;1aeaK9IMMvYHnuzRhdxEbA==&#34;,&#xA;      &#34;1V7JwcA/poy4b6C9OdWTZg==&#34;,&#xA;      &#34;0dpAE7ovD7NaRYwnkw3w3Q==&#34;,&#xA;      &#34;SBAWrxfXaQ2Ka48xajW62A==&#34;,&#xA;      &#34;Bp4O+K+hM5aEmCc59xUWdA==&#34;,&#xA;      &#34;Mx7K+5VJ9q5MSCq5wzzrvA==&#34;,&#xA;      &#34;hIP4iOnrw2sfStgfnTKJKw==&#34;,&#xA;      &#34;DWR1BhA44yRQDLUOFXdOpw==&#34;,&#xA;      &#34;6Qa2KBduT2HgJC4kctpUnw==&#34;,&#xA;      &#34;vnBlYA/0lXrfCSSYxgwhSQ==&#34;,&#xA;      &#34;b3gcqhWrOMtSFjkTMyyWQw==&#34;,&#xA;      &#34;AJgpOdbNJblqS+xC52p8RA==&#34;,&#xA;      &#34;03WJApqdfWbzHtZHpqBt1Q==&#34;,&#xA;      &#34;d2mdhZ97rWRfD+pslcl6uw==&#34;,&#xA;      &#34;0gEzVf04N4WWI36MnLXr1w==&#34;,&#xA;      &#34;SFiwTqc+C9HkxslIGbfU0g==&#34;,&#xA;      &#34;RLGDcCcECNxfaKqTkhDvew==&#34;,&#xA;      &#34;5BXX9+pRVay9wrZAORfhhQ==&#34;,&#xA;      &#34;sHu0Ihy6+HrKJvDoll9f5g==&#34;,&#xA;      &#34;ThUekCEizKQbaM9qGtWShw==&#34;,&#xA;      &#34;RTmPkhx0MCxt8vC1skZm/A==&#34;,&#xA;      &#34;aF8KHEW+yeGrdIo+G60sLA==&#34;,&#xA;      &#34;NMbdymzW3TQXZ7vpBZQsTA==&#34;,&#xA;      &#34;pFXK+S/0lzfxv0ToVY49hA==&#34;,&#xA;      &#34;ANawluW+m7SrGs8Q9Odgow==&#34;,&#xA;      &#34;5lHEu4ueMJgetLv/GfKHtg==&#34;,&#xA;      &#34;vagSYtfX2ayPhseLZe8kAA==&#34;,&#xA;      &#34;gH8HDGn0WlFpVq75mRFmZA==&#34;,&#xA;      &#34;+63s7h05SP1xmH1EyLoL/Q==&#34;,&#xA;      &#34;sGBviOATX07Y4438NYu+Aw==&#34;,&#xA;      &#34;KtIlAO0V0/KiMbIbmHHMGw==&#34;,&#xA;      &#34;TK/tQUH9MhuStrQUTQS1ZQ==&#34;,&#xA;      &#34;PB44uTo7NGwmA/fjSEQPBA==&#34;,&#xA;      &#34;5TfU8//dfsOlT82byi0lug==&#34;,&#xA;      &#34;tNFH1YUHHwU3vwUWrO3mLQ==&#34;,&#xA;      &#34;GjK0gO1QmNQJ/ZsCakqCdA==&#34;,&#xA;      &#34;jYmxPZjDM/CNw9uJ4rnMHQ==&#34;,&#xA;      &#34;Ox1tNe9huq3q2onFJsX0QA==&#34;,&#xA;      &#34;9Ck8qx7KCeVOhknvjhQwsA==&#34;,&#xA;      &#34;B0ZJnlI3io/AXTPjqyoADA==&#34;,&#xA;      &#34;TN9ZqAQo2vEW/Tx62EpRcg==&#34;,&#xA;      &#34;mfYVQsCdSPyqR1UobqhEIw==&#34;,&#xA;      &#34;NGHtfO55iqBhbAmqujAqHA==&#34;,&#xA;      &#34;wnOnIN4ZSytFGVwoTjBa6w==&#34;,&#xA;      &#34;Nsd5wG+dBhUvVktxuz/adg==&#34;,&#xA;      &#34;HFchxDnUHv0YgEfYisGA6A==&#34;,&#xA;      &#34;DyteGYzEcNMaIwU0U8gq/w==&#34;,&#xA;      &#34;u0MfT/CHY1AhIYRRjCtdhw==&#34;,&#xA;      &#34;VUNwpBj4hvcLARxqxrvCCg==&#34;,&#xA;      &#34;6qUVSp56FVn/1B93TTNdqw==&#34;,&#xA;      &#34;SueY1m9dU5duigybt2Nk8g==&#34;,&#xA;      &#34;dc0xpXbQDi3upLAUXz65ZQ==&#34;,&#xA;      &#34;sv+609cXG/bmAhwCPRMNHg==&#34;,&#xA;      &#34;SRtj8i4HsQkjCyC1YPMDYw==&#34;,&#xA;      &#34;bmwYxyT6fmHIa8FODhI70w==&#34;,&#xA;      &#34;ztlVnn1P+W74ZN9vh2BisQ==&#34;,&#xA;      &#34;cLetPtVgm731iRPvGEIeyw==&#34;,&#xA;      &#34;8BsUEMjLB96UtpRd1ludrg==&#34;,&#xA;      &#34;xcQReVPnPEIim0iMTZWDwA==&#34;,&#xA;      &#34;ZoK4/bCJQ036BMFIy2mG8g==&#34;,&#xA;      &#34;/0WOR5Jn6BKoC/9+5dlz1Q==&#34;,&#xA;      &#34;ekipReKDch8nQkv6wLHVww==&#34;,&#xA;      &#34;PDZIjg6u6C4zc5d09d4Brw==&#34;,&#xA;      &#34;fCueh1dJqv6EGaBRtXT/Xw==&#34;,&#xA;      &#34;LVwzv4Idra62FxSa6vFC9Q==&#34;,&#xA;      &#34;zj6YFnKGohJeDG/BPBNZLQ==&#34;,&#xA;      &#34;4Jo5xwEh2K91Sr9xMmwzcw==&#34;,&#xA;      &#34;LFiejdPb02ZvCk9/k6M2OA==&#34;,&#xA;      &#34;4xxaXkxeYvxr8HgxLSDyHw==&#34;,&#xA;      &#34;H1xPFeyk3sWGXc+DXLkdaQ==&#34;,&#xA;      &#34;TQa/g/LeIEmPrJezTGlmcw==&#34;,&#xA;      &#34;E6F4Bsc58fK+0x+N9LY6gA==&#34;,&#xA;      &#34;UC0U9/zd+klwBmGR1YYVPg==&#34;,&#xA;      &#34;XSCYGr+cvuvD+k3V0XhWSw==&#34;,&#xA;      &#34;tQmmf4j1ZMloac9gv7yd7w==&#34;,&#xA;      &#34;5ua6yduRd8slR+XckPuEJw==&#34;,&#xA;      &#34;POSFLQ5mtdC9jMcn5UF8FA==&#34;,&#xA;      &#34;W9IdHW1dLxMcDTawlof8yw==&#34;,&#xA;      &#34;JAo3AhiUcpCO3tqtc2i6uQ==&#34;,&#xA;      &#34;Tgjy7QZmeE1bsLws5liQbA==&#34;,&#xA;      &#34;Ka536JJULCqquJoBCXWh8w==&#34;,&#xA;      &#34;ZMCWgxkMJ4LjF/nj5/+01g==&#34;,&#xA;      &#34;fdpDWwmwFLyFeyU+CnbxxQ==&#34;,&#xA;      &#34;npYdj4HvH6/ZpruXP++2aA==&#34;,&#xA;      &#34;hXiyheRZcHY0l7xO8DNsTg==&#34;,&#xA;      &#34;/qkNjq5a4HrGsyOMMBvKNA==&#34;,&#xA;      &#34;FMxCd9UpiJciq+gDQcTY5g==&#34;,&#xA;      &#34;rTV9bjfy2M3+eJBkP+611w==&#34;,&#xA;      &#34;fM+r7qYMTXMx81IJhr45YA==&#34;,&#xA;      &#34;OVekopeo2m1+vPR8dGU9Qw==&#34;,&#xA;      &#34;kicrFnXrLH996rjfEw0amg==&#34;,&#xA;      &#34;3xBuQnj5DELjtk3GymuBTw==&#34;,&#xA;      &#34;yOUu4ImaYusi101ZTf86nw==&#34;,&#xA;      &#34;MJtIM09Jw6pIepBEcf4LwQ==&#34;,&#xA;      &#34;4Utc/6C5f6+A3gsr9KU/IA==&#34;,&#xA;      &#34;Ax9cBjsH+o8aWMbSV/GNMA==&#34;,&#xA;      &#34;Aw4zZDl3LL7dRv7HVDTRTw==&#34;,&#xA;      &#34;KQMykeLmRcNMu7v2ZhkQOg==&#34;,&#xA;      &#34;yIgeDQgyoDXR+INQbK5bbA==&#34;,&#xA;      &#34;7BER6omsA92tkjpEqGZJLA==&#34;,&#xA;      &#34;uGPuYR0b3uiHdpdRa97mfw==&#34;,&#xA;      &#34;VAdEk79bS0dMBh0fcQAI2w==&#34;,&#xA;      &#34;cpPUNXFgwF2pB9MJlxFOqg==&#34;,&#xA;      &#34;V6UHlQALqhW5x7Cn9PKUfg==&#34;,&#xA;      &#34;e2U3+rnCE0yJbEhq/B49zQ==&#34;,&#xA;      &#34;EGDBCdh3xodxfhx6SFGa1w==&#34;,&#xA;      &#34;9XbremjCd0rS6zu/GB+mjA==&#34;,&#xA;      &#34;Pd5fn59ga3nlH8XsDKvDWA==&#34;,&#xA;      &#34;KWqotAAFzFGFp1GIUjXi0g==&#34;,&#xA;      &#34;L+KHKrPvSxZVeDMiWq92vw==&#34;,&#xA;      &#34;I362Vwh1x92yigOP2ZDpKA==&#34;,&#xA;      &#34;rr46XqayJxVyzdN89JIktA==&#34;,&#xA;      &#34;R7IaseHP2Jo3rY8+KZLpFQ==&#34;,&#xA;      &#34;01GEWNrsm5Pgr9C+LDMW/A==&#34;,&#xA;      &#34;DmDFGmfYPZVBn95oG8E43w==&#34;,&#xA;      &#34;yycUgbk2YE6jCbX68FtPLA==&#34;,&#xA;      &#34;34BcC5oWRD1/7/1kuocy1g==&#34;&#xA;    ],&#xA;    &#34;HRtVOTg/Y7Pvd6wqcX24fA==&#34;: [&#xA;      &#34;oGVW07Zdco+t8LxGqPbEUA==&#34;,&#xA;      &#34;cwXdqs9AFOcThYn4e8y3yw==&#34;,&#xA;      &#34;WV6CLob4bxW/eDgXBTJfxA==&#34;,&#xA;      &#34;M0WxNlBrWr1WR0ACcsFS3w==&#34;,&#xA;      &#34;9b3hAQW/ubh4v6zyl2M5Ig==&#34;,&#xA;      &#34;oCDLcNdeKQmSOcg6w237gw==&#34;&#xA;    ],&#xA;    &#34;HbglDdnV9yne0i8jQL30HA==&#34;: [&#xA;      &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;,&#xA;      &#34;ws+M5wSfZVeN7hPLThggdg==&#34;,&#xA;      &#34;e5qPgcasC/ZE1MEWSxEewQ==&#34;&#xA;    ],&#xA;    &#34;J0HrVYoM3raELvTfJ82QMA==&#34;: [&#xA;      &#34;cD+9p+2eb4ubWbn/ynDqrQ==&#34;,&#xA;      &#34;+nrMi8U389zlK2TEsOUGbw==&#34;&#xA;    ],&#xA;    &#34;JHQdC8JdSGipvO0sCig0cQ==&#34;: [&#xA;      &#34;UVRy+pWnw+7xa7f2U2B15Q==&#34;,&#xA;      &#34;DjqCxCryg8LYvAZ67mAiSQ==&#34;,&#xA;      &#34;3FpQibjt3OzhrwoSJ9I0Mg==&#34;,&#xA;      &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;      &#34;74B4VkBJHkNvj2AsRU4uTw==&#34;,&#xA;      &#34;dkVrajFcsmFenGJa2HiWQg==&#34;,&#xA;      &#34;+tNEhZfQ7eus2PEerEe59g==&#34;&#xA;    ],&#xA;    &#34;JaDqP2PIekJ4FuDfyPDUKA==&#34;: [&#xA;      &#34;vekzBecfH1YN/Zd4MHsZmA==&#34;&#xA;    ],&#xA;    &#34;Jt5/Qd9oxegZwQjsNbUyYA==&#34;: [&#xA;      &#34;C0udSo+foVK8TphEaJ9u7g==&#34;,&#xA;      &#34;CoMZiX0VsWNhKSQo1NCYkg==&#34;,&#xA;      &#34;wlPwpwE94ExdZ/N5EaE3ow==&#34;,&#xA;      &#34;2A2BjgErU1GldRQi2g+XQg==&#34;,&#xA;      &#34;7v+kCrIi/mMmyn+o9Uh+oA==&#34;,&#xA;      &#34;2Z/NA7sGgadio/qisfiC3Q==&#34;,&#xA;      &#34;BQivQt20Anl3mLgiJoMKAA==&#34;,&#xA;      &#34;RLfmH4oizoEHB59VpAV6Kg==&#34;,&#xA;      &#34;ZPTYG1GW4N8khhdO0sFXlQ==&#34;,&#xA;      &#34;Jek37tQeVdKEwtu+6a9/CA==&#34;,&#xA;      &#34;9Yjf3Ev3R8wbqlhNdfwPQQ==&#34;,&#xA;      &#34;atAnLiOuVhy8qyEUVNzM2w==&#34;,&#xA;      &#34;9vaAmbFDwko+7w/wBDHWvg==&#34;,&#xA;      &#34;noUIfMZn5dUZdEKTi/GsOA==&#34;&#xA;    ],&#xA;    &#34;KlSRCTMecbL63Kg+FZjUdQ==&#34;: [&#xA;      &#34;TMzu1Teu8W2WYCPcLUGpbg==&#34;,&#xA;      &#34;5Wt7PRY2CMVsPwL8nxZwcQ==&#34;&#xA;    ],&#xA;    &#34;L1wl5gEz2lzyNJbirzPmpQ==&#34;: [&#xA;      &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;    ],&#xA;    &#34;L4diUjusARli24fy/u9lAw==&#34;: [&#xA;      &#34;l8driNMmALQs2/V7+uCq+w==&#34;,&#xA;      &#34;FkUafBj1ekysZyPIbZi5fg==&#34;&#xA;    ],&#xA;    &#34;LD9yEwGtdZJl2S96EO58PQ==&#34;: [&#xA;      &#34;RgBI11FezD5/LF6u61IQtw==&#34;,&#xA;      &#34;yrD0ecVnK2Y23POHVpCwiA==&#34;&#xA;    ],&#xA;    &#34;LR+S3JloJQ5YEViBpmcLkA==&#34;: [&#xA;      &#34;ydg80VAiaAwfrueUhGEKNA==&#34;,&#xA;      &#34;BSSJGCoYu7W24g5Emwqfdg==&#34;,&#xA;      &#34;y+qe2Ltr+Zxrpu9HCascIQ==&#34;,&#xA;      &#34;Et5t375uu538q7zsCZ9I3w==&#34;,&#xA;      &#34;iQtqv3HeCGvWBf2ImnFK1w==&#34;,&#xA;      &#34;toXp/ZwNqXAUsdXRb/4DVg==&#34;,&#xA;      &#34;PhzQEpAkCFfaNfVzGQzMgg==&#34;,&#xA;      &#34;Ogq02fai+FFfBUlCUVZlhw==&#34;,&#xA;      &#34;4i2XUvSeC6zka4yp7MoBfg==&#34;,&#xA;      &#34;Kt6vMl5nXH7V+FrvbEPv5A==&#34;,&#xA;      &#34;3S91ZYwiienVlUnFeIzkRw==&#34;,&#xA;      &#34;J4ecrOEw69avIhhOznG+2w==&#34;&#xA;    ],&#xA;    &#34;MJmw8vClC4VAn/J4MfhK2Q==&#34;: [&#xA;      &#34;DWl94vpEWRXsnNv1XWboVA==&#34;,&#xA;      &#34;8ix99v6BzhAwu2rRaagVKw==&#34;&#xA;    ],&#xA;    &#34;MXR26wvfFq4/JiRamdOfsA==&#34;: [&#xA;      &#34;tJJUE3O+B2dj0YzqLSTtDA==&#34;&#xA;    ],&#xA;    &#34;MxYp6jmrNGPG4EUMxgtsIw==&#34;: [&#xA;      &#34;qNquCdlCIf/n2ozJDLW9Rw==&#34;,&#xA;      &#34;SPxMxLW2DZ8IvP04UR/H6g==&#34;,&#xA;      &#34;Av6IvPz8z+8JAyypXmkbTA==&#34;,&#xA;      &#34;+VEguSVDjTT9/ZZv1zUgpg==&#34;,&#xA;      &#34;kUo4IyXRh1XFppRDAqTNnw==&#34;,&#xA;      &#34;gvOYexCvSFjRc1ovPwHsww==&#34;,&#xA;      &#34;WKEI7EQhRkCAgIF18HZjKg==&#34;&#xA;    ],&#xA;    &#34;N4dB55YYjGYeXRj+vLBatg==&#34;: [&#xA;      &#34;lQ+CMunyB1B/r/pkv6U72w==&#34;,&#xA;      &#34;14EBaSYBL4fLL4zgayhBkg==&#34;&#xA;    ],&#xA;    &#34;On+NX4Yr+KIGVwagqPDWcQ==&#34;: [&#xA;      &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;    ],&#xA;    &#34;OvOSK0YS4U6j2gyFBATNXg==&#34;: [&#xA;      &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;&#xA;    ],&#xA;    &#34;PHkBez1UE90U9LJepncOKQ==&#34;: [&#xA;      &#34;842T09LMtibo6aQ7X6A47A==&#34;,&#xA;      &#34;Jx8Savf4pVqPTLt8HsgoXA==&#34;&#xA;    ],&#xA;    &#34;Q+exKQZH61PI/8YfpN472w==&#34;: [&#xA;      &#34;cKtHM3xMrk1VjV0S8Zl4qQ==&#34;,&#xA;      &#34;eZDuJI6jaohxUM7fcdYEYA==&#34;,&#xA;      &#34;99Q540ZW70Bq59gE8MRNHA==&#34;,&#xA;      &#34;LBK9PqJKfCEUpttQCyryqw==&#34;,&#xA;      &#34;DzB2GvXN7uyOKTXPPshLvg==&#34;,&#xA;      &#34;7W/pTtx9kAg13U/6tl322g==&#34;,&#xA;      &#34;jmCYpsGWnnwiehZQL2tyGg==&#34;,&#xA;      &#34;RXSYUreBGXQz5Vll3C130A==&#34;,&#xA;      &#34;4zvDuRN18ZTgEdA+auow3w==&#34;,&#xA;      &#34;pv5Nm8Lwfq3X5Sm3cuoD1g==&#34;,&#xA;      &#34;XM09w+ZScTz4IEN6LeAUgg==&#34;,&#xA;      &#34;L0O+Qmwnpkk+Rg/VqN7QWA==&#34;,&#xA;      &#34;Ih4ScPgmvAttJN/czzciaQ==&#34;,&#xA;      &#34;Mo4ARlLui4P8nHgMUyYhSw==&#34;,&#xA;      &#34;70rtBro0k4gOrF1v9b0LPQ==&#34;,&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;icr9XD5DN3YDWvP3naYL+g==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;rpqh6K+YqMAxf172QUbycQ==&#34;,&#xA;      &#34;XjQpmqOxrg5I1zgVKxswFw==&#34;,&#xA;      &#34;8ML0IVFlCjXlypnsSOqB1Q==&#34;,&#xA;      &#34;6Za/T764+Wnq0wfxFjEvGw==&#34;,&#xA;      &#34;vwUe6Dpe5Fb7V8GdyGEhjA==&#34;,&#xA;      &#34;PNe7L04JfETT1S4nMUYcGA==&#34;,&#xA;      &#34;/kFHc0+JKhJmQT3bM6TpTQ==&#34;,&#xA;      &#34;sEY+u8JcXEvFyPiUDTNKow==&#34;,&#xA;      &#34;KhBWOViCuCZdWqrkDlYvOA==&#34;,&#xA;      &#34;Po+GLdyrucAyVatfOmZxGg==&#34;,&#xA;      &#34;wMpTUDltgKPDv4b44/0Spg==&#34;,&#xA;      &#34;Y+LzorqDQD2Povh+kyYSqw==&#34;,&#xA;      &#34;rJHkC74NrobNudSijB/y4A==&#34;,&#xA;      &#34;F6i42vx+GvZ/9LpnToKHcw==&#34;,&#xA;      &#34;bzewxC8waOXL414yMxKcqQ==&#34;&#xA;    ],&#xA;    &#34;QCZyKHG3XZk9MlIs9ZFBuA==&#34;: [&#xA;      &#34;70hF296ZfY1ODiaUXL3gcQ==&#34;&#xA;    ],&#xA;    &#34;QwKK6TG/JtcCly9jntVf+w==&#34;: [&#xA;      &#34;HOYwG5Rw5KtCLqSTp9IaXQ==&#34;,&#xA;      &#34;0w7yDxNwDisUMkIdlkUTZw==&#34;,&#xA;      &#34;lgYZVj6kPc0Poy1meDiyZQ==&#34;,&#xA;      &#34;mEw7dcF5jpuxJvu2G3JEew==&#34;,&#xA;      &#34;de6Wm8GcUOvZ/vqX7ogEtQ==&#34;,&#xA;      &#34;XuMP4XKeqFlYH9jgvFKXXw==&#34;,&#xA;      &#34;TIcWaTRsDD52irGN4xUQyA==&#34;,&#xA;      &#34;KsboTEAsiwsdLEKIDivkyA==&#34;,&#xA;      &#34;BfDjqoaYrd0NKCGGxtokTg==&#34;,&#xA;      &#34;Qe1reyLPtQVZ5wKqKa9jQA==&#34;,&#xA;      &#34;RATpPhLUqjEbe+XxyYxOOw==&#34;,&#xA;      &#34;0v5F4x1W0RxkklLvRs6NKQ==&#34;,&#xA;      &#34;00cDk2w3qfvdzMbO27c/+w==&#34;,&#xA;      &#34;6LazNwUBgu5kQGKPCQnaOw==&#34;,&#xA;      &#34;e7h3lwyDkLbzwbeza9/TWw==&#34;,&#xA;      &#34;zDmU3WG0c3AQYw7NFebUCQ==&#34;,&#xA;      &#34;hxluEp8Si16NQcfaJDWcLg==&#34;,&#xA;      &#34;I3vwwgMxzxWo15otCOgvAw==&#34;,&#xA;      &#34;Q0D37bmhhLGtYILIAMgFXg==&#34;,&#xA;      &#34;GXMpRf2go/wGEbwpp9BPPQ==&#34;,&#xA;      &#34;+uMSPU5jbqI0+jsP/eX6PA==&#34;,&#xA;      &#34;KB8w2g8b8sP5A8+iqhqw8A==&#34;,&#xA;      &#34;h+nOQU6khNxAH7kkGqVqkQ==&#34;,&#xA;      &#34;5D5WFK01Su4Lrj4hhwDYGQ==&#34;,&#xA;      &#34;qug1advw8m4TjVAUPEUPiA==&#34;,&#xA;      &#34;0bK7Vo3x9SXQYvDvMmgzXA==&#34;,&#xA;      &#34;rO5a9fYyaqaIZ4bH0M8fdA==&#34;,&#xA;      &#34;zx97OaxgXH8j+mFWesQySQ==&#34;,&#xA;      &#34;JmKf//IQj2eMVJFTB1Feyw==&#34;,&#xA;      &#34;DNd0sdbW83acQbIl3FDaPw==&#34;,&#xA;      &#34;lHLNxD93t7uUJfmDhNwvCQ==&#34;,&#xA;      &#34;6asSIEJz7ggo9QEXpbSOYg==&#34;,&#xA;      &#34;YUwZZ9Cg1FloxBZV60vOCg==&#34;,&#xA;      &#34;T5Nghm4crNWWnUrYvZZItg==&#34;,&#xA;      &#34;vTajNh0ysqaO8NuTMU//uw==&#34;,&#xA;      &#34;AwUdH/KSEhHnx1nx0tagUQ==&#34;,&#xA;      &#34;kTyfGInwWoCVv7gGPYCF5g==&#34;,&#xA;      &#34;X10PEbhI2yv6KYFUPacecg==&#34;,&#xA;      &#34;NeZAaBfGrzLvaMKrJL7WlA==&#34;,&#xA;      &#34;W0TAw6aTfwXOMlJwloDkZA==&#34;,&#xA;      &#34;JD0llI0bGUOG/VBz+9LeVQ==&#34;,&#xA;      &#34;6MW1lRUdNNc4s+6uD2JNvw==&#34;,&#xA;      &#34;6LOgJE44rXWziB7/OMO/ig==&#34;,&#xA;      &#34;aQGx6Am8fU9TZmcyiMNL4A==&#34;,&#xA;      &#34;cxMZ2TEnkk6RdtuU9fDThg==&#34;,&#xA;      &#34;rJljaCTiTdw1uI1lvfy+hw==&#34;,&#xA;      &#34;u1caIbS4Tk6y8c7sz8Hvhw==&#34;,&#xA;      &#34;w1094TrprBpG+5TZJus6FA==&#34;,&#xA;      &#34;qWK7H7gz7e8gS19GJSeIIg==&#34;,&#xA;      &#34;MLyBE3p9/9+LMOMl2JBi6w==&#34;,&#xA;      &#34;s2uSNGuV+OyVW2eHDGWWKw==&#34;,&#xA;      &#34;7AoZZiCMmvqX9d9WD62FnQ==&#34;,&#xA;      &#34;7sGexlbSpX41SOBbWHg8BQ==&#34;,&#xA;      &#34;HHBOKYlzeD2Busv7btyBAA==&#34;,&#xA;      &#34;gGrGej/Pj6/poAgebFb+dg==&#34;,&#xA;      &#34;Y6TEBwH0+CoZ50j5sQV23w==&#34;,&#xA;      &#34;HSaKorahiaNwGqqE2DJSaw==&#34;,&#xA;      &#34;0YVxD0vSH+0MhijemP/Jmg==&#34;,&#xA;      &#34;eekbTUpqIafepE8Hfmhn6g==&#34;,&#xA;      &#34;Y/6FiFNJ+h2jXNTlPOzrnQ==&#34;,&#xA;      &#34;XL1Nv8y45q8aiA92A99YyA==&#34;,&#xA;      &#34;qEhRdzGH44SGjJIcqcIv/g==&#34;,&#xA;      &#34;g6spFzT6DoopzuQCE0pjRg==&#34;,&#xA;      &#34;SvhQ7tNvl6ANrVnaJ4cBNw==&#34;,&#xA;      &#34;b2xf65/2S45gOxG8Grxy0g==&#34;,&#xA;      &#34;LkJjju2s50oKpBRyBT8s0A==&#34;,&#xA;      &#34;2RZ3u6UmceVG9iB/xb73SA==&#34;,&#xA;      &#34;2UHqEqfMIIn53NkDlDEppQ==&#34;,&#xA;      &#34;6dwQWrojfQ/1hgTT2PQckg==&#34;,&#xA;      &#34;+hBhqk1qKnkU+nqn6a96qg==&#34;,&#xA;      &#34;jVeIQzIm92EdkbCIlGT1qA==&#34;,&#xA;      &#34;6o8ui0RxMttDzkyqTDO5tg==&#34;,&#xA;      &#34;kaUbMItvWrS1leJMEsAk9A==&#34;,&#xA;      &#34;saK0Qxr6f3taAu0dVT0erg==&#34;,&#xA;      &#34;oyvtOIVUDqm1ruQx8vhRhA==&#34;,&#xA;      &#34;uDfc8ZaPfrhTGcFwVaIvAA==&#34;,&#xA;      &#34;QbgvVzhz2dr5BDvAUM6wFQ==&#34;,&#xA;      &#34;o8O4Ttqnv0lQfm1yyfyVsw==&#34;,&#xA;      &#34;Ah03jmj/7fQOqUbg05PtZg==&#34;,&#xA;      &#34;+PjI2yN4wCMPyf1oygeT5Q==&#34;,&#xA;      &#34;oVgcRSL89qnSRkMXpV8N8A==&#34;,&#xA;      &#34;w8af/LTYrBLWhYkZBSi2Lg==&#34;,&#xA;      &#34;GfPY5zBbHJQI4ZGaDcJj2A==&#34;,&#xA;      &#34;r410Z5X0yojDsVg9YVcNqQ==&#34;,&#xA;      &#34;/YcdipQjiqJUDpddwhDiIw==&#34;,&#xA;      &#34;l/tOmWC5BVb4or7dYqfWjA==&#34;,&#xA;      &#34;Rd2hVVbUws+mcvoC7DaoiQ==&#34;,&#xA;      &#34;KYv6PwzjV6/5I33cZ9LUmQ==&#34;,&#xA;      &#34;3WRC4Vl08/leTJ1MFHuCEg==&#34;,&#xA;      &#34;QgRg8usqYLpC2SzTmhUKsQ==&#34;,&#xA;      &#34;zAQhwfD+1kpXY0CwZC6HxA==&#34;,&#xA;      &#34;UBzPfwycyyJOBETwdSTG/w==&#34;,&#xA;      &#34;8563iLEht/ghMGItALTFUw==&#34;,&#xA;      &#34;OXr+UvfSDAQbLGP4xOBSMw==&#34;,&#xA;      &#34;lz6O0nYiDpis8SScmTUuSg==&#34;,&#xA;      &#34;HlOu0EmTxHkjzmJeJEuJmw==&#34;,&#xA;      &#34;2sm08sXcjWtT2Gtu3CdSug==&#34;,&#xA;      &#34;8efBqSZ3OYqd+nT8a21FNA==&#34;,&#xA;      &#34;BS5Qx6nN3HmM64VVoKmayw==&#34;,&#xA;      &#34;cMY+6QfPqyOZE380Mf5rIQ==&#34;,&#xA;      &#34;BTToHfvg0weSXCH9D0acFA==&#34;,&#xA;      &#34;2I/0B+uXhxpPJWXGwNGlLw==&#34;,&#xA;      &#34;bACUKZThWu3kcO82NfO4eg==&#34;,&#xA;      &#34;19Kvl4LS7MCiBo2cRD5fxQ==&#34;,&#xA;      &#34;Ob+LJ5zYHnbjt14Yf8W7UA==&#34;,&#xA;      &#34;s6kt2DqKLHgzYSGciPtGtQ==&#34;,&#xA;      &#34;3Lvdmj//2sze9S8I3n8yrw==&#34;,&#xA;      &#34;rR226S9SV4WbmIVotM0CsQ==&#34;,&#xA;      &#34;93O9BjbBwz1jYmTNCzgkUw==&#34;,&#xA;      &#34;2luu38jiVQvy6qOXHFgpAg==&#34;,&#xA;      &#34;JtGggrfMckWn0xvfWBMJJQ==&#34;,&#xA;      &#34;GnBCRP9H+R6do428z3nOkQ==&#34;,&#xA;      &#34;QX9gQ7esz1e73iQHmwojXA==&#34;,&#xA;      &#34;AIlN8RmMOvhBveVuVAyHQQ==&#34;,&#xA;      &#34;qYORp6v9x0Jy6S8OKerZvw==&#34;,&#xA;      &#34;1WQ/LJu/kefEuHRv58l0Lw==&#34;,&#xA;      &#34;dO/rj/SVo/ZlfJAB2ajOEQ==&#34;,&#xA;      &#34;tLSR0X6hQ7hvyPbBXZslBQ==&#34;,&#xA;      &#34;cjoCrbQlAeGxtTPUlcMPuA==&#34;,&#xA;      &#34;bh7RRRlNP555+LOFASdB0w==&#34;,&#xA;      &#34;ylg3k+AtgUcIl3hJiXNMlw==&#34;,&#xA;      &#34;y9E+Lh5SpPDKe0DW19HLjA==&#34;,&#xA;      &#34;UBV+Z4vQ/HB9/cVGq/+u3w==&#34;,&#xA;      &#34;dMO4fX/IkQ2bi0ds65uBZA==&#34;,&#xA;      &#34;iFYspvRjIYFKUw7Fpj3PSg==&#34;,&#xA;      &#34;AYOaUiAITXfmzrid+CR2Og==&#34;&#xA;    ],&#xA;    &#34;R7K6A/Ve75xrYpD+6H0Z8w==&#34;: [&#xA;      &#34;rIk/NHa428tmc6oDgqypQw==&#34;,&#xA;      &#34;1q7YjyB3mR25zvqxJ6Zk3w==&#34;&#xA;    ],&#xA;    &#34;RRIjgvJwJW9jZT+h6lhzrQ==&#34;: [&#xA;      &#34;/GSEB7NuV5IOBsMvXs0hOw==&#34;,&#xA;      &#34;c95Jb/MAeM4/Wnq2jSIopg==&#34;,&#xA;      &#34;ghVsimzHhtfG91QJVkK8Jg==&#34;,&#xA;      &#34;Aet749oXCwhRnnY9gEGYGw==&#34;,&#xA;      &#34;sWCyUi5vmFbqsTEOh1QQvQ==&#34;,&#xA;      &#34;dNHj9TUgbfnbgJUCEellCw==&#34;,&#xA;      &#34;A3ZYVQ8Z63tDAx8FSltQHw==&#34;,&#xA;      &#34;JVuTqfPwohmj6ucokgM2sQ==&#34;,&#xA;      &#34;GDAkupnsjiTl71rwzH5RJg==&#34;,&#xA;      &#34;VEE7ccbKf4EH2dNVXOf2uA==&#34;,&#xA;      &#34;7jE4UN8ZNzWXfNDZ8BZq3Q==&#34;,&#xA;      &#34;DUP5ugYJi+iUbcfFxoSiig==&#34;,&#xA;      &#34;T8IbBnTK2Iv5YVT88l9ngQ==&#34;,&#xA;      &#34;J1cvee8xy6oZDEdA21dqEg==&#34;,&#xA;      &#34;8TL7OmwuwkB+6m9uO5u62g==&#34;,&#xA;      &#34;sxcy9NTxyeNn/j3K+DCTCQ==&#34;,&#xA;      &#34;k6D6o9qP1X41yPQlNQ8aww==&#34;,&#xA;      &#34;X4CDljJQJsftQ2RA57ftuw==&#34;,&#xA;      &#34;gFgnmTqhW1tr7jmOrXQQQQ==&#34;,&#xA;      &#34;XsxaedsaFYv/ys7GTRoUVw==&#34;,&#xA;      &#34;Ji6OY1u39nJByKzCNwfpIw==&#34;,&#xA;      &#34;1I7VtxkB33ashDX0kB4Teg==&#34;,&#xA;      &#34;+doAGgTwsE0iptDdCED/aA==&#34;,&#xA;      &#34;791CRjnt/pj2GXzRz2PiHg==&#34;,&#xA;      &#34;gx7w+mYZCEGlSNGIkO6bLQ==&#34;,&#xA;      &#34;3skSbDjTQ02+eNiFJz716g==&#34;,&#xA;      &#34;J6JEqF6+PkBwS7J9B0Lefw==&#34;,&#xA;      &#34;JvC/rVWSiuNeMXzeTDRZHQ==&#34;,&#xA;      &#34;nuFsbkH7VzW6LS3WLhSszA==&#34;,&#xA;      &#34;e1tWGyUIVU1QafO75am9CA==&#34;,&#xA;      &#34;lWxwCNVjYSW4SdS9h9uKvg==&#34;,&#xA;      &#34;GR80zW702W+xho6dTSNlyw==&#34;,&#xA;      &#34;MEP8FBVAfPt6fwJRFfcI5w==&#34;,&#xA;      &#34;+govv3Zh4UHQ+P7JiRlanw==&#34;,&#xA;      &#34;FTPBk9LaoSZGiQO5kXSorA==&#34;,&#xA;      &#34;oCYqRL0yaCqkmUcecOaYrA==&#34;,&#xA;      &#34;3+pow+WXSexmxDv966vMqQ==&#34;,&#xA;      &#34;V0awGVhndNVps/Yhh/P2GQ==&#34;,&#xA;      &#34;psr6EfqmKkDu2s/af+27mw==&#34;,&#xA;      &#34;cBmZwV0l/QLSSsoNwTuUWA==&#34;,&#xA;      &#34;f8I+U+fazHHULdzT2Vp7cA==&#34;,&#xA;      &#34;6/Rn1WFxVO6aopyr8psGfQ==&#34;,&#xA;      &#34;w/NMuS0o9hChTkNvZhIOtg==&#34;,&#xA;      &#34;LdefrT414pk0XLw3PJpgwQ==&#34;,&#xA;      &#34;mT/r0SKhQZ91EH4d3KiGWQ==&#34;,&#xA;      &#34;7CoZtRXELVa05aD7HVx7dg==&#34;,&#xA;      &#34;Ht/FCT7E55SLIJNr/AHy9A==&#34;,&#xA;      &#34;HUhIlH+/4z8COoDr8jeAaQ==&#34;,&#xA;      &#34;+eh9aI+N2OVaUhb6bBR86g==&#34;,&#xA;      &#34;IFJrKlOefqh8BMNkCUNhqA==&#34;,&#xA;      &#34;DjTY6HUnX+COP0+KJxD8lg==&#34;,&#xA;      &#34;pWQV0Z8XQHYl5n7sHUZBqA==&#34;,&#xA;      &#34;4N3POA/rTFsL9RdGINkq1A==&#34;,&#xA;      &#34;6thTxik/0CDWjirwYbVkYw==&#34;,&#xA;      &#34;hwn8HSXSxoAi1TYe+ACqPA==&#34;,&#xA;      &#34;5XT+5ghtfmJFJSJCERGwhQ==&#34;,&#xA;      &#34;kFbIkTDdc0p9e6ndPrAnHA==&#34;,&#xA;      &#34;ByykkIf8cqMarBUwgOjK0g==&#34;,&#xA;      &#34;AcbVYbhZ/tTIOm89OCy5kQ==&#34;,&#xA;      &#34;iWIsGkw9mQk/URE9m7xoVA==&#34;,&#xA;      &#34;TBYZOvAMUG/MxA4GOKP5FQ==&#34;,&#xA;      &#34;SbvnfacnQ1X9A0OepqCdbg==&#34;,&#xA;      &#34;o7U6pbXnKgxDi4OXl/ryRA==&#34;,&#xA;      &#34;oQ8YhXsWl1bwUCG1x+HzDQ==&#34;,&#xA;      &#34;5N/eQ/DLmsm7yS6+3apC5A==&#34;,&#xA;      &#34;owALVsfUiwMtDqenpdt7Zg==&#34;,&#xA;      &#34;RJa5WIC77pr9MGY1RZloTw==&#34;,&#xA;      &#34;1/xm1gDhSpcAv1vbsLnNhA==&#34;,&#xA;      &#34;+1zjTJXhgIQ5uwrI0Po3UA==&#34;,&#xA;      &#34;JS6LnmY1PZfE5YxJsCWPPQ==&#34;,&#xA;      &#34;mbMEAQXpYoMKq7Io1LfrJA==&#34;,&#xA;      &#34;WzMeKgvORq7XF2Xr4q+JaQ==&#34;,&#xA;      &#34;6pPl5aD/FZ2M/6Yaa588Aw==&#34;,&#xA;      &#34;7oEe6HdmVrscCmplGQsEeQ==&#34;,&#xA;      &#34;POO0JR6PIxa5cAikhYHhiQ==&#34;,&#xA;      &#34;qYLCfB1EzRWGloOr+Ke8RA==&#34;,&#xA;      &#34;QL7KLbo+Ri9Q4aoq0+/c2w==&#34;,&#xA;      &#34;SXF95Q57bdA0qf3iy/XSPw==&#34;,&#xA;      &#34;qEQEeZkI3fZm1RmMiKeYYg==&#34;,&#xA;      &#34;fVObUUKRXAwXLBcuBzgu5g==&#34;,&#xA;      &#34;akJLZ6dhkrnudAb8gXyuyw==&#34;,&#xA;      &#34;dJvtOf1rRIWFniMT4IOhrw==&#34;,&#xA;      &#34;kxjEyJZKMrQwjAj12bH0Ag==&#34;,&#xA;      &#34;KM/iKSazFyPeIBezQXviSQ==&#34;,&#xA;      &#34;kTasTqgA/HsT2H85z8VDPw==&#34;,&#xA;      &#34;DAwq8wwWp0GN/p0AvtHE9Q==&#34;,&#xA;      &#34;948mcXHuK8LL3gmmFQKgVg==&#34;,&#xA;      &#34;jcBNjU0VQp8W5rs9GaZnrw==&#34;,&#xA;      &#34;kdSSzkEHTOGF0fpTfXjzcg==&#34;,&#xA;      &#34;kRGVc4s/SuXPOfCHc7Q9ug==&#34;,&#xA;      &#34;Dlv776lHnCBm01HWpf1zZQ==&#34;,&#xA;      &#34;X2wqIFGbKlJQpE/DojrwxA==&#34;,&#xA;      &#34;qr6Jra3xQBxvbIQJAqILNQ==&#34;,&#xA;      &#34;z6u9MfxJ5450gPIBXVMBZg==&#34;,&#xA;      &#34;NFJR7P8KL9HNF/dsA5opTw==&#34;,&#xA;      &#34;HiF486OoQCfE4Hwc8DTxrQ==&#34;,&#xA;      &#34;/YIHlhDwc0XvwYDDbGEIMg==&#34;,&#xA;      &#34;Eptc9iAtWcHP72eK8tBCkA==&#34;,&#xA;      &#34;XWfDomoStj3uOui0AGO+Tg==&#34;,&#xA;      &#34;SFoELvc6okNKWKi7mExikA==&#34;,&#xA;      &#34;AuT5DLBrUT23i8Fkzi5nrA==&#34;,&#xA;      &#34;0ZniYEExf5hn6bWx9CxbmA==&#34;,&#xA;      &#34;htuN+yEom1R161MtW9b2yw==&#34;,&#xA;      &#34;L5u3G3ilU8/0RtMpJ7kdKQ==&#34;,&#xA;      &#34;u/b1G56mYgMO4E+lYxSxjA==&#34;,&#xA;      &#34;vBXrhxnu9HxQSmN5xWhZaQ==&#34;,&#xA;      &#34;Ee2apAGC0PFcPNtPjyeqbg==&#34;,&#xA;      &#34;Kcd+UQxBw37KfFkRbn1QXw==&#34;,&#xA;      &#34;2eI6vtB1jD43elLjnJ5clw==&#34;,&#xA;      &#34;O+EMSAzsAMtyqCd2+UnsmQ==&#34;,&#xA;      &#34;jcRqiXZ9kQjBDkPtzEXksQ==&#34;,&#xA;      &#34;ywuC+FbT7FV6PIDV8mhosw==&#34;,&#xA;      &#34;MYhgpNDg22nk0/HCSwm/gw==&#34;,&#xA;      &#34;wO2dcFx5JhDjz2K4QDYydw==&#34;,&#xA;      &#34;e37CxvNgywelF2ouwzqL2Q==&#34;,&#xA;      &#34;yCrfh+WfD/7UJatf+Ek6jA==&#34;,&#xA;      &#34;43uaBOp3I4s6BbwM75Dtcg==&#34;,&#xA;      &#34;6qJXB6OTmGgjS8WJVVTxvQ==&#34;,&#xA;      &#34;ujzNJ5kQVFINisRmEnkrzA==&#34;,&#xA;      &#34;Oi+2EF5+FNNGg+4WyowonQ==&#34;,&#xA;      &#34;XC3MXlpMb9D+YigNspsXlA==&#34;,&#xA;      &#34;kABs7TAnvuphaClsm0yUYQ==&#34;,&#xA;      &#34;NdytkbUiOF+2t+S7vqzKaA==&#34;,&#xA;      &#34;GnJD0wUWuwBPc7SVZsuSoQ==&#34;,&#xA;      &#34;7cYNZPh51XXj7WctPkn2Ww==&#34;,&#xA;      &#34;H09E3JrUNhQlgS4Jd5yiVw==&#34;,&#xA;      &#34;NPJh6PwkJYtfpkFMxFCfIA==&#34;,&#xA;      &#34;HlmfsCkhcIqBoptvS1F7pQ==&#34;,&#xA;      &#34;Mv4iyriHqxAR4oNVnJlPbw==&#34;,&#xA;      &#34;6ZTNb8xwQ12tf1lZxG3rMg==&#34;,&#xA;      &#34;HBDLPf0FBMppxrTwW+gqlA==&#34;,&#xA;      &#34;Y08Ni7+TSPQ/xSSRr851zQ==&#34;,&#xA;      &#34;gl5O329psI82Wn7F+BP/pw==&#34;,&#xA;      &#34;r9qwoudvbxrKUZqCmUc7NA==&#34;,&#xA;      &#34;anPJmbS134IB2gfGIWKJ0Q==&#34;,&#xA;      &#34;wc5lIWGg0A45t1Tgl/aghw==&#34;,&#xA;      &#34;9kpPzhUEkQr6h/4fDNnSuA==&#34;,&#xA;      &#34;fMAAjFKUhFra8hfsyV6M/Q==&#34;,&#xA;      &#34;0yUB19C4Q870tLOnId/omg==&#34;,&#xA;      &#34;dZdW43K/PTswO8gz0zCkYQ==&#34;,&#xA;      &#34;1CDGyH/KaS7DctjOTuk4Gg==&#34;,&#xA;      &#34;IL9yoqEJiA7P9oRxQrj7SQ==&#34;,&#xA;      &#34;rV97UXmAqepOnnvJur9ybQ==&#34;,&#xA;      &#34;8Gv2MnEpGRP5xQ5SzNJn8w==&#34;,&#xA;      &#34;s7SQVHshgYWyJSuzXO9o6Q==&#34;,&#xA;      &#34;MIr3rO85X7uqJgFm0U3O8Q==&#34;,&#xA;      &#34;ZZEVbWhAYTXw9FIX3zIAtw==&#34;,&#xA;      &#34;F0PQEZy2PTlCGjp9J75Btw==&#34;,&#xA;      &#34;1IGqkgWGwsavqCo3U8V2Jw==&#34;,&#xA;      &#34;NuT3W1dL/YKETJsMHw1WfA==&#34;,&#xA;      &#34;8gEKPHHBHHTuUEvwhsnEFQ==&#34;,&#xA;      &#34;nrMORRsp2EH7zbxJc144bw==&#34;,&#xA;      &#34;0ahYjiLWT0VE+MRcEm8yAQ==&#34;,&#xA;      &#34;pl0eAtev2igDstYhHd6sxw==&#34;,&#xA;      &#34;Sl37ASpmhZPtZSKlrwYF6A==&#34;,&#xA;      &#34;QsiHUYCa/QcMQzBitOtxXQ==&#34;,&#xA;      &#34;kCyfUBctJ+eryOZP6UiDKQ==&#34;,&#xA;      &#34;gs7k9o3a1jAc/zZ5AEytpQ==&#34;,&#xA;      &#34;UbJne6U4WRZmmyYLeEtt4w==&#34;,&#xA;      &#34;UEgRngB2KVq3bhFU/6+13Q==&#34;,&#xA;      &#34;RDdKN1sSPMFiFxzJJm3X1g==&#34;,&#xA;      &#34;fLX8W8dMekP7EyhcY34ZKg==&#34;,&#xA;      &#34;DzmttTV7e68kFVXC8f9lew==&#34;,&#xA;      &#34;jYkhobM1mHtLOwQie8WeWA==&#34;,&#xA;      &#34;m/d6QTwNzEzxGSR3T2263Q==&#34;,&#xA;      &#34;eZ2tz3j+u7GWuS6rb2RB7g==&#34;,&#xA;      &#34;5ejk3bhFpvIIABy9EwjwqQ==&#34;,&#xA;      &#34;F4g8Bboy9/sMyy+EusFlpA==&#34;,&#xA;      &#34;zBm31RctqcDF3ITqeA/9oA==&#34;,&#xA;      &#34;pfNYlxG8sY9hFt3528zJoA==&#34;,&#xA;      &#34;60Ucz+CE49NFnmVBiIwnwQ==&#34;,&#xA;      &#34;8Q2ZBhYapsH90MwXLMDOQQ==&#34;,&#xA;      &#34;Z3lzEUxuKss3/Hx3NeRKoQ==&#34;,&#xA;      &#34;Je7Pxg/aoxf95KynM7XUig==&#34;,&#xA;      &#34;uHGQ4u2cwHgRGK+9r/8n+w==&#34;,&#xA;      &#34;xmjtcASNDmlJFcM3cVQlVg==&#34;&#xA;    ],&#xA;    &#34;RhNJQyxUHoA1z70UtgAC4Q==&#34;: [&#xA;      &#34;vb7DdaxZjPV5NEcCqN9EkQ==&#34;,&#xA;      &#34;kwBmjCC7+d5xUliMZJPNWA==&#34;&#xA;    ],&#xA;    &#34;RjsHhFfoWvmQBIu8lxYZjw==&#34;: [&#xA;      &#34;ycihN0043OihPtrAPlFZyA==&#34;,&#xA;      &#34;iK/w4oP0ry88Fhi1iG/FpA==&#34;&#xA;    ],&#xA;    &#34;SSFXEK4vNCR4s9ImWtXtgA==&#34;: [&#xA;      &#34;GAn7gWUe2pFr7PbwechqxA==&#34;,&#xA;      &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;,&#xA;      &#34;AUiFITCnRjRxctzqqbDeeA==&#34;,&#xA;      &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;,&#xA;      &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;,&#xA;      &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;&#xA;    ],&#xA;    &#34;SV9uo4F9Li9vAHBKYcAlZA==&#34;: [&#xA;      &#34;MMLwOzBcCET4jaa3dPuTwQ==&#34;,&#xA;      &#34;hUC86VV8kD262xFcev0ZiA==&#34;,&#xA;      &#34;RoQvxPrgcpXyTej834bT2Q==&#34;,&#xA;      &#34;5C8DQrs9fwpmV8rRYlvfCQ==&#34;,&#xA;      &#34;uPUnbuUJlh23l0km8iQ2tA==&#34;,&#xA;      &#34;4wegIDtvEZ75QrQWM65auQ==&#34;,&#xA;      &#34;lWdVDKK0NI1ECjrQyrQZhA==&#34;,&#xA;      &#34;MS7UYZB0gpv9XnBQo9QJdA==&#34;,&#xA;      &#34;CQPV/OxtJ+DwYc6C4gniNQ==&#34;,&#xA;      &#34;vZIHu7rsNO8R8If5mjyTiw==&#34;,&#xA;      &#34;guG+lyS5JQIDSZS6MEfIow==&#34;,&#xA;      &#34;lJ8RTw7m+AgAnWW6upSntA==&#34;,&#xA;      &#34;q5joCCZ2cOTa0rXBUtiSpQ==&#34;,&#xA;      &#34;4LZWGm07jnOHHBGX2FzAwg==&#34;,&#xA;      &#34;QaKFgrY/cUPl6Ls/xAwlFQ==&#34;,&#xA;      &#34;1w+glHHFE32ql3XJuIAYWQ==&#34;,&#xA;      &#34;gNGv6C2nj/tHk2ntVJUOWw==&#34;,&#xA;      &#34;4WgtH2AC4w3jDaPCHFqEaw==&#34;,&#xA;      &#34;knUP7wXG3O435cJDvu9Thw==&#34;,&#xA;      &#34;MIaYLvbJRWXm7UR3+CJ1PA==&#34;,&#xA;      &#34;IeTK1HBLKpS1+gfVSPrpvg==&#34;,&#xA;      &#34;sAlO/t+jkkm59mLcdOgB9w==&#34;,&#xA;      &#34;I3+uP7bb+nPtzRYHH2UUgw==&#34;,&#xA;      &#34;cly/G/AvUZQM2J1YMymkpQ==&#34;,&#xA;      &#34;r4Fu2fNYrl5cfm4zX5YpZQ==&#34;,&#xA;      &#34;uEn9qA67O/SoYHOtH/EL2w==&#34;,&#xA;      &#34;Bu9dxnhmsLXDd3x0oRPHfA==&#34;,&#xA;      &#34;e/bnYsWq3UNe4TO8qzzb8A==&#34;,&#xA;      &#34;1CCABRgs/s9xxQcDgxw00A==&#34;,&#xA;      &#34;ElE6r7xQZAfd5MScs95BXQ==&#34;,&#xA;      &#34;rwC2lB0lflNzttbo5Agt3g==&#34;,&#xA;      &#34;oGhsPyoyEtiEHT7/0qF+CQ==&#34;,&#xA;      &#34;k9jtJIr2beiO7DTwypDNWw==&#34;,&#xA;      &#34;RRtBD+EuTLmzasgAaBJyZw==&#34;,&#xA;      &#34;uO3OOEY6W3k9QH/tNVK0LQ==&#34;,&#xA;      &#34;dcH4AHY4X+K0bO3O9nqJrQ==&#34;,&#xA;      &#34;/MgFHW097IAGIZkNc/Fltw==&#34;,&#xA;      &#34;tbkEtEs3aa+p2/YQaD8BfQ==&#34;,&#xA;      &#34;i2CsObRdsFCFCIvnyVzw5g==&#34;,&#xA;      &#34;Kr2KcyJfYQ8J1RDorzTofQ==&#34;,&#xA;      &#34;8XLKalkulxeAh8qfecmGlA==&#34;,&#xA;      &#34;mmFI4mA7exd6BfbwTUwJfQ==&#34;,&#xA;      &#34;FroZeKbNhNx69+bj8o0OqQ==&#34;,&#xA;      &#34;PqOWZHQu7W9hh0UlnMkHAQ==&#34;,&#xA;      &#34;oIBUxFCAPk4vRXBwpcmtFw==&#34;,&#xA;      &#34;ZNpRshLHRo06/00CGV605Q==&#34;,&#xA;      &#34;2IUiS8eDJ2evZHzBkLGqPw==&#34;,&#xA;      &#34;wh2k+ZZKZUi/oRaog5dfGQ==&#34;,&#xA;      &#34;UeuwcxsDMDrcMU7c13lXsQ==&#34;&#xA;    ],&#xA;    &#34;TANtf1h6RhI5yVQQhHFTbg==&#34;: [&#xA;      &#34;QxQ47SEMl+UFCOv8XVwx9A==&#34;,&#xA;      &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;      &#34;6rBlrHxkkFbqVRbyfq+scg==&#34;&#xA;    ],&#xA;    &#34;THoW7icQ9Ts4hZAkh5A/WQ==&#34;: [&#xA;      &#34;0hxAfeI84l0pzeedcqmGpQ==&#34;,&#xA;      &#34;rd7C8AD7IYUHYPSfAYtKrQ==&#34;&#xA;    ],&#xA;    &#34;Tl6ebomp9GQLN9svWzKp+w==&#34;: [&#xA;      &#34;H003kvHQyN0gsWRXOrXzxA==&#34;,&#xA;      &#34;QgyYiUqrv2nc1+RqO1bM4A==&#34;,&#xA;      &#34;DXoWfwXPN9ZCvCU/obObKQ==&#34;,&#xA;      &#34;FyNQxVBbour86huhtgTOzA==&#34;,&#xA;      &#34;qnfP2y61ycFKlR/SBnZ5sw==&#34;,&#xA;      &#34;72HhoIyfPMwkQyR2IF7qqw==&#34;&#xA;    ],&#xA;    &#34;Tob5YtKxleVTQzw2GCmwGg==&#34;: [&#xA;      &#34;fbRJLkkKyAqhMbdbbcLwwg==&#34;,&#xA;      &#34;+SOMbfLFiy8gAeP6YTZQLA==&#34;,&#xA;      &#34;+Jox86Lr4olzZZpeF2W5Cg==&#34;,&#xA;      &#34;7HuMMq7XSYKaQG/oWdxnyg==&#34;&#xA;    ],&#xA;    &#34;TzNyp6yTJ3m0O8xeeDKC3A==&#34;: [&#xA;      &#34;fbRJLkkKyAqhMbdbbcLwwg==&#34;,&#xA;      &#34;Gzt3Aov08YmfW0b/CN7tHw==&#34;,&#xA;      &#34;ST+HmAso4vf4Hnu6TuBXXQ==&#34;,&#xA;      &#34;d8O/Pp2nkWZxFhUyXQucZg==&#34;&#xA;    ],&#xA;    &#34;TzT9ayOh2hZShfYtipxZEw==&#34;: [&#xA;      &#34;z1wZ8EsA73QQBAtKsHeNNA==&#34;,&#xA;      &#34;HveCNT+j0lknlUOFTaqgtg==&#34;,&#xA;      &#34;1XwPa50Si6EKs+Oms8SLUA==&#34;&#xA;    ],&#xA;    &#34;U0P0dNPn1iUcw6b33AAKUg==&#34;: [&#xA;      &#34;Npa1TFSpFpskBtk163Khxw==&#34;,&#xA;      &#34;+gPHeZza1/WobF3MlhRjIQ==&#34;,&#xA;      &#34;pX9giWYBuTR0yK974RC2ng==&#34;,&#xA;      &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;      &#34;HxI42iSjURjRki+uV6q/9w==&#34;,&#xA;      &#34;BhK7UpiFjhg7FsRQcftqbg==&#34;,&#xA;      &#34;yqjwgy5aE2uj+E3fW5VIUQ==&#34;,&#xA;      &#34;T1160/hke2bN2YNtHQGAVQ==&#34;&#xA;    ],&#xA;    &#34;Uui1iXuECCOB7NgLQMsJpg==&#34;: [&#xA;      &#34;EUzfiOQu+qZDEDuD1AbDtA==&#34;,&#xA;      &#34;fxc/de3PyQgiwjyykMQ4ow==&#34;,&#xA;      &#34;e+8uKOviBSOTR4ltKl/Y5Q==&#34;,&#xA;      &#34;XVnPYCI1ck0zTs/Cz6Yl5A==&#34;,&#xA;      &#34;Pdc4LabMMVIl3+kSdEepMw==&#34;,&#xA;      &#34;hqWNdyyShysFv4UI5qHkfQ==&#34;,&#xA;      &#34;JWrwO52d5SNbcmJ2KpFaJQ==&#34;,&#xA;      &#34;C9NKmmH/EbcYxVOEg1uY9g==&#34;,&#xA;      &#34;T4bxk7MHk24P39KEeRKoig==&#34;,&#xA;      &#34;WNA27LqRIql90O1m/PSAgQ==&#34;,&#xA;      &#34;ZpoRIduwcda+XFGXyoaDAA==&#34;,&#xA;      &#34;9lOiMN/e99o1oI1dhS9S2Q==&#34;,&#xA;      &#34;B7rM39vvdeIIjmDnRAuTIQ==&#34;,&#xA;      &#34;bVLJeNp3UltT+T1xu6C55A==&#34;,&#xA;      &#34;brTmpkOORx2yJvCnkPzYRw==&#34;,&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;icr9XD5DN3YDWvP3naYL+g==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;nRlBpDuWR9J0Ttd/BugkSQ==&#34;,&#xA;      &#34;U7q9649W3+OXGS9kMwowkw==&#34;,&#xA;      &#34;lM6Cai1zYvH4FYQ8nb6tQg==&#34;,&#xA;      &#34;0wSMVHwI5T4EgYqkub8RhA==&#34;,&#xA;      &#34;MtExg9vrmkuo/+/XELnvpA==&#34;,&#xA;      &#34;effBIHrddz1MPHYj0XdN+A==&#34;,&#xA;      &#34;UApauQbQz6UZdsAuW9miOQ==&#34;,&#xA;      &#34;ewA3f3GyFBJhwPX+CvDYtg==&#34;,&#xA;      &#34;WoF8HAs7BhQT5cycNGL9tw==&#34;,&#xA;      &#34;PLT6ItGnGibNqyU7ikhmRA==&#34;,&#xA;      &#34;Nl5OfrnQ/SPbLIWCvdxEHw==&#34;,&#xA;      &#34;70Ajh2QFCXmrQTWVljWbIg==&#34;,&#xA;      &#34;2pofu/QdlV4xoXosgfKRNw==&#34;,&#xA;      &#34;zNwhU1to6ohdg5Ws/JmM/Q==&#34;,&#xA;      &#34;0QqnWQey4QRkB1tBadW1jg==&#34;&#xA;    ],&#xA;    &#34;VFldiAD+rTFuce+kutFUuA==&#34;: [&#xA;      &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;      &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;      &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;      &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;      &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;      &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;      &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;      &#34;5BksN0izCeDRrtFMsNCyvg==&#34;,&#xA;      &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;      &#34;iACEEOg8p4u2oul22eTv+Q==&#34;,&#xA;      &#34;sJOXRbCL0QuUC1P4v8JTZA==&#34;,&#xA;      &#34;b9vpp7YMXEAHYnt8gPj4PA==&#34;,&#xA;      &#34;rBDj6tuhee896qgiVA2peA==&#34;,&#xA;      &#34;khwtIlYEcWkkzJP1rg7BNg==&#34;,&#xA;      &#34;69HZBPjw2QR8kIdKeSUwQg==&#34;,&#xA;      &#34;zLUPO/DSeItPLWNqYd2DSQ==&#34;,&#xA;      &#34;+Y8OjDjxiEFL5zY0EIjaWA==&#34;,&#xA;      &#34;HJf9PCZx5YjpyYLqECiTKg==&#34;,&#xA;      &#34;Xnj4Kpl+tPifTh/+xOnglw==&#34;,&#xA;      &#34;55nFlly0ydgYROdIHNoLjg==&#34;,&#xA;      &#34;zi+zTCtHwI+xWITxpaOJBw==&#34;,&#xA;      &#34;EGiW9TUcKA6dU0wY//GJ7w==&#34;,&#xA;      &#34;W5birtu1clZwp55QDPxkAA==&#34;,&#xA;      &#34;AF4l+pfrs0Si/0Bf3toHtA==&#34;,&#xA;      &#34;ABh4yTmrbQSCnnP4F8iX5A==&#34;,&#xA;      &#34;nZ2DFaqiaft4/Dqj5SJp4Q==&#34;,&#xA;      &#34;+fYUom03o4taYF0LdBwDsg==&#34;,&#xA;      &#34;bQ1N5xPGM/wU59iAjdfQ6A==&#34;,&#xA;      &#34;FUeASYCa2REKwmC0CFlz2g==&#34;,&#xA;      &#34;qNhEJopIC+OWvXbrkilAfQ==&#34;,&#xA;      &#34;aqaaxa85Ibw3RSMRWLL7yg==&#34;,&#xA;      &#34;t/e+iLCKcOMzXEuhRWry6g==&#34;,&#xA;      &#34;24Ysg4Ma/AJz8Z93D2PzNQ==&#34;,&#xA;      &#34;7tbcfIdYm3nwAiNQR5eK/Q==&#34;,&#xA;      &#34;6+K4D2mkqcFFftanju984w==&#34;,&#xA;      &#34;tZSfr7Q1QfQP2u7Sjxqmrw==&#34;,&#xA;      &#34;swCufUgs8xGhLcR4oX101Q==&#34;,&#xA;      &#34;3cVM/UH6o+8G2FMQ1Gl/Ww==&#34;,&#xA;      &#34;iRvSvKSGVLHqIXREJ4Ht/w==&#34;,&#xA;      &#34;+YsItiFwLsY/quEIP17M6A==&#34;,&#xA;      &#34;mX276ORRxpj/FeNL+3OrXg==&#34;,&#xA;      &#34;7d4YdteAff532bV2Gg5lmw==&#34;,&#xA;      &#34;s0BW8R7FNYnFn+nWkJnUqQ==&#34;,&#xA;      &#34;I1n6/nf1BmKoqYe/GXCV3A==&#34;,&#xA;      &#34;1r5b1oLl7viNgjtnEVfEyw==&#34;,&#xA;      &#34;+xzMjgQ/BhN1jTBlVwQfIA==&#34;,&#xA;      &#34;akEF6NF80R9wfgwbXmOEDA==&#34;,&#xA;      &#34;m+ltkfB6bwuyxpSjgAFr9w==&#34;,&#xA;      &#34;iA/QQjWhvxyNLUaetWDlcQ==&#34;,&#xA;      &#34;7Z352FfiS2LxToBH4DWhEg==&#34;,&#xA;      &#34;UgQV4Vz6WyghQx4C2rQgVw==&#34;,&#xA;      &#34;vA4lSE/GSHGX0yBPiE7RSQ==&#34;,&#xA;      &#34;gZW7OlWAfe3YqvPh9YUqJA==&#34;,&#xA;      &#34;xIqTu52elcgV5FuN0Fuj4Q==&#34;,&#xA;      &#34;pWmmw4ixBXV6KyYl3C9RWQ==&#34;,&#xA;      &#34;pfZcHRowGRRifIIMXAg+9w==&#34;,&#xA;      &#34;N8aXqWnqmq7yO6fhu3+9cg==&#34;,&#xA;      &#34;Y9X/nbUFq4l8+xowG5hDkg==&#34;,&#xA;      &#34;MmfAubFbaM6MUJCO86BuPA==&#34;,&#xA;      &#34;GzRz/FwkFLGO3g4HmoZPSA==&#34;,&#xA;      &#34;KPOfrxBVcu8XVCAYPGVuZA==&#34;,&#xA;      &#34;Z9vlvDewcgZxmJe4Kp3wxA==&#34;,&#xA;      &#34;mXfTdwl2racpbSHHHKO6EA==&#34;,&#xA;      &#34;3A+d+ITPUBtAGX1jTlLhKg==&#34;,&#xA;      &#34;TXvJlim3LAUzBPedea1SGA==&#34;,&#xA;      &#34;5pFK2pddNfoGuwrNwC3BlQ==&#34;,&#xA;      &#34;mpJkDXIXuQphmTXI2ejm1A==&#34;,&#xA;      &#34;P8DPJn528tUhUQhsixUumA==&#34;,&#xA;      &#34;rDeZ9YqARbQ/8OcOA5Tn4g==&#34;,&#xA;      &#34;6/KKbV2mEAFGDxV5hCYPjA==&#34;,&#xA;      &#34;Zg/5yy5ojZu/q0X+9MCQQA==&#34;,&#xA;      &#34;BCUOacmvjky6+oK/3U158Q==&#34;,&#xA;      &#34;UoBD3GwEne6Zwl54oZgCCg==&#34;,&#xA;      &#34;xzz0v3ajpuFhN3HDJCDDYg==&#34;,&#xA;      &#34;oDr5DknKU9AmvJu2r8+yFw==&#34;&#xA;    ],&#xA;    &#34;VKbklzwNVEem7m1iQRERDg==&#34;: [&#xA;      &#34;C7v5oMuGS9CuS5bfckNF/w==&#34;,&#xA;      &#34;Mds6YkAImABVZfFVPdan5w==&#34;,&#xA;      &#34;tlbehmhIbT1WwXt6llfQYw==&#34;,&#xA;      &#34;grZJQsj3BT+fQns8dkci1g==&#34;,&#xA;      &#34;pTT7g2z3OsAYgdVqJMZOLQ==&#34;,&#xA;      &#34;JwRn6LaXs4DLH+aotGHcIQ==&#34;,&#xA;      &#34;RFeq5rwe+sxgyWgUXeEitA==&#34;,&#xA;      &#34;sEXYrXIRghEOX+5cKfh4HA==&#34;,&#xA;      &#34;HMytRAMTGJlQRfqVbIzzVg==&#34;,&#xA;      &#34;xKgvhqTYvQwR5QWUkRuf6Q==&#34;,&#xA;      &#34;pvm4gwkuqzgisbgZu1oTlQ==&#34;,&#xA;      &#34;w/qPRfgu7T1MbY4EuhkWZw==&#34;,&#xA;      &#34;8bMBj5vTG1tOpQ1wuVD1bQ==&#34;,&#xA;      &#34;g29pa0L/tOFblhQQDFeJbA==&#34;,&#xA;      &#34;7aOJwf1br9gIaC1RH6UwDQ==&#34;,&#xA;      &#34;8m+MeF1Vk+YvSROjY2pN5Q==&#34;,&#xA;      &#34;oYEyIJ07SURdsg7rK6qrYw==&#34;,&#xA;      &#34;U2e7dgKDqk0OlJ2oJw2iuw==&#34;,&#xA;      &#34;jL7k69KOM8ZjTH+gwznwQg==&#34;,&#xA;      &#34;TTh9HGJJgt1I4lhDqtPBIA==&#34;,&#xA;      &#34;k/RAvY71xpuUVrSpsGkYlA==&#34;,&#xA;      &#34;nOD1OtMP4aGP/bT3iktDEQ==&#34;,&#xA;      &#34;VNA7ljkMyeRq9SDNO9drHQ==&#34;,&#xA;      &#34;DhiTSAV5nEGdAk1xkbjRsw==&#34;,&#xA;      &#34;SbrfelK/hRkg8QJAv7881A==&#34;,&#xA;      &#34;KhtP1/ZJ9jcZ6Whijt7vkw==&#34;,&#xA;      &#34;081ZZUa7+goThe2JzRBcxw==&#34;,&#xA;      &#34;r0yngP+sUJvKraMLgaaWww==&#34;,&#xA;      &#34;n9h0mZrBntcdO8rut9mZew==&#34;,&#xA;      &#34;lIzMhy2E3/kAp+LsQCQyCA==&#34;,&#xA;      &#34;s+/PgMrbczH4dntN+Uku4A==&#34;,&#xA;      &#34;walyEMfvPvVh3KXxCNA/pQ==&#34;,&#xA;      &#34;Bd+yU6xHUdyyaw65uiacIw==&#34;,&#xA;      &#34;oGKMWwqd8g23cJbO7k5MNA==&#34;,&#xA;      &#34;Cr4I2Hcgcf8xO3Bc2/KIfA==&#34;,&#xA;      &#34;4evfzAbeD7HXRBHHbDpAwA==&#34;,&#xA;      &#34;8Ug8/LJbCT7/mzHPjLi21A==&#34;,&#xA;      &#34;F1KNP85q9V8sONVWKuOzrw==&#34;,&#xA;      &#34;Qimhraux3dZtFrPRbNJqyw==&#34;,&#xA;      &#34;FcmkgsiNKCrDAJ6OFK/Y8g==&#34;,&#xA;      &#34;NkAsviHzXhNrys9cILlYeQ==&#34;,&#xA;      &#34;EX/jsJKUxl+Y92LbkHwIVg==&#34;,&#xA;      &#34;xP/kV8YDeJxssrXaMcjXUg==&#34;,&#xA;      &#34;KM3euWq+O2CS0VP936TjVg==&#34;,&#xA;      &#34;vpkqaxRDIkUCRIT3f2sk6Q==&#34;,&#xA;      &#34;BofAiVtqC38hX5ZAkBLTpA==&#34;,&#xA;      &#34;J9wD9ZF9kAJd1nu03TllBQ==&#34;,&#xA;      &#34;kHC7JlgJ1gpjDIHxKgXZuQ==&#34;,&#xA;      &#34;IkLJJWoz7DjiEwkwHd9+Bw==&#34;,&#xA;      &#34;v+VZolEvt4HU4yiZTpFx+Q==&#34;,&#xA;      &#34;A/za5QfQmT4HYcIQ4RyCzA==&#34;,&#xA;      &#34;naO+9RNjE/hIMaezFHe7IA==&#34;,&#xA;      &#34;//2gjbgNV4aF0qefir+7Ng==&#34;,&#xA;      &#34;CFRtSPlXDJlgi28bdADXZg==&#34;,&#xA;      &#34;1qsA4RvCYZB2uDwgIo8TuQ==&#34;,&#xA;      &#34;6GzxFtf19XU1Y6ySz6SgYQ==&#34;,&#xA;      &#34;bklfMYFV2WKM17hKPU+5BA==&#34;,&#xA;      &#34;cWbhx4ozV3Pkh4rK/phNRA==&#34;,&#xA;      &#34;4PW1pGs0HJlG6XNR1xk0ZA==&#34;,&#xA;      &#34;833/aZmn4g2C0czWW40RBQ==&#34;,&#xA;      &#34;IDAwc/hZzIcM4IBkaUT9YA==&#34;,&#xA;      &#34;fZX9tMkRg8Ij95v2HLw9Ew==&#34;,&#xA;      &#34;TGjVfFW0jWP1/Slr8hCo8Q==&#34;,&#xA;      &#34;o52gvb+djtuOAe8fWpXboQ==&#34;,&#xA;      &#34;Ga3lVfExNl500JGwW345sQ==&#34;,&#xA;      &#34;rPWZNH+en7vYfObneQGeUA==&#34;,&#xA;      &#34;8dARvXsFfslEQUJNpOVqyQ==&#34;,&#xA;      &#34;EahYBNc6RsapXfHOvUMG/A==&#34;,&#xA;      &#34;4jKXN+o/0vyACgd6hmLCbw==&#34;,&#xA;      &#34;KlFwXzVoVlebAInsnw41Qw==&#34;,&#xA;      &#34;mOQ3hJyzcYBnd65M1VVdFA==&#34;,&#xA;      &#34;FjluGqmW83eEOEvyKIkrSA==&#34;,&#xA;      &#34;KxS2ZtWgZx0lQavGmel4Wg==&#34;,&#xA;      &#34;x80ydqeeoahPQLNiV1VXvQ==&#34;,&#xA;      &#34;U86r1ELAOJanBnxwrapY0g==&#34;,&#xA;      &#34;YGKNwwPTf6g9pxsaSlPd0g==&#34;,&#xA;      &#34;UeiYbCd+yCsmz4K385pQkQ==&#34;,&#xA;      &#34;YusnUSJD47mdstk8KsgGZQ==&#34;,&#xA;      &#34;cpsr/YFJ0iUNtv72fOtdjw==&#34;,&#xA;      &#34;4ifTGHhVbtDPeqLwYDVyJA==&#34;,&#xA;      &#34;BqzAZ5iQVHE6OkJ+a2YydQ==&#34;,&#xA;      &#34;2+grY6RsLOFJVlzFN96AuQ==&#34;,&#xA;      &#34;u6YfnQt98V+kYlUqAP+rFg==&#34;,&#xA;      &#34;QPsg6Jr0bVMm0tr2j4YMwA==&#34;,&#xA;      &#34;X5o2Qoo8DgfpPtqZ+d9MzQ==&#34;,&#xA;      &#34;pENgwsqn4gloGqUZSMstFA==&#34;,&#xA;      &#34;X2XVS8beM5noGWCQGlVZ6g==&#34;,&#xA;      &#34;Zwyz7XImU98ApFQj0FPRmw==&#34;,&#xA;      &#34;FWn8i7eSvTTcwwX8x1YMmg==&#34;,&#xA;      &#34;ZAG3qysphRz8tGIp96ls9A==&#34;,&#xA;      &#34;aHbxsEzv/m7Yq5sqD6BR6A==&#34;&#xA;    ],&#xA;    &#34;W+js148eF9SSUbrTSIRvOQ==&#34;: [&#xA;      &#34;GpJjElMhBMa2ZIh0g/0hAQ==&#34;,&#xA;      &#34;yV3QixxBrXQjuo0c4OIL/w==&#34;,&#xA;      &#34;8ez1JQpqUyVUQaplF/dpog==&#34;,&#xA;      &#34;dN3ZkuuHRauklH+tfqwFYA==&#34;,&#xA;      &#34;Ry6vRm+cs1w4rnhTcw+4ww==&#34;,&#xA;      &#34;Ws0fZZUTvLi37jSEx1MM5g==&#34;,&#xA;      &#34;PYQ8GtvInfQ411U5gwbErQ==&#34;,&#xA;      &#34;Vbqm1jpiIiIM2rxq++FdoQ==&#34;,&#xA;      &#34;kCgZMoKRMbRx90oiE7jJ+w==&#34;,&#xA;      &#34;lWKRi6BgpanbsQgeIct91A==&#34;,&#xA;      &#34;IH0yoiWyuDmG+HH8h9dKLw==&#34;,&#xA;      &#34;1ylYMOLaPUA6xIkqwKBb9w==&#34;,&#xA;      &#34;EHdSTtZdfwUmOpf3vIeLWQ==&#34;,&#xA;      &#34;NdlKBrj70+HY4gSgv+wTmA==&#34;,&#xA;      &#34;2n2n++65Q4X6kZeNZUZXMw==&#34;,&#xA;      &#34;Y/1r01hBo8mhueiynQb9pg==&#34;,&#xA;      &#34;5EJ0MC7TgiGIlilbbiOvfQ==&#34;,&#xA;      &#34;H1wshPoazj8pmzsnWAztZA==&#34;,&#xA;      &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;      &#34;X4Ym25zfqcH7/samBN+yPw==&#34;,&#xA;      &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;      &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;,&#xA;      &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;      &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;      &#34;vnI8VBZMnSK/Spr6qFIUOA==&#34;,&#xA;      &#34;IFUwSX5dX69QHRHfvOeQDg==&#34;,&#xA;      &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;      &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;      &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;      &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;      &#34;d0nPfXoEZybRuV9TMDY3YQ==&#34;,&#xA;      &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;      &#34;+TrS27bZKgEeir9pISurnQ==&#34;,&#xA;      &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;      &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;      &#34;d9qJI4TyihrqXixZ+S73jg==&#34;,&#xA;      &#34;ZZLfaN7MH3nRy8BlgA10kg==&#34;,&#xA;      &#34;kRa60N9SRvgjl+iiwZ9fZg==&#34;,&#xA;      &#34;lh/EYac7XXFvwJr7gkU1TA==&#34;,&#xA;      &#34;RnzVpoLf3gQvIDiBFFXm6w==&#34;,&#xA;      &#34;82S4cf8ecOlHYb8LNQQn+w==&#34;,&#xA;      &#34;P1K1eUbqwgam0P6f7iB/IA==&#34;,&#xA;      &#34;wjPVtpb8yNf3j3pc1wfy6A==&#34;,&#xA;      &#34;Stfm7ne4Ofst02xkZn9K1w==&#34;,&#xA;      &#34;/m4KubgMsY+Uf3GqqbY5Og==&#34;,&#xA;      &#34;I44fXMfux3yPYaBHaNxgsg==&#34;,&#xA;      &#34;WwkM3aNBW0LnenEr6xDxWQ==&#34;,&#xA;      &#34;JLZyRakMGnyMKNtD6nnqpQ==&#34;,&#xA;      &#34;UsTHWG7fBbgk8T9K0i79Ww==&#34;,&#xA;      &#34;zFG8iDklz8FcuYliYZGkqA==&#34;,&#xA;      &#34;XKuZX/r+YD1eQ8+4f77NQQ==&#34;,&#xA;      &#34;8lLGaMUZk8kOHbicsIjPjw==&#34;&#xA;    ],&#xA;    &#34;W4amAY83CsyR7zQ0GM7zsg==&#34;: [&#xA;      &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;    ],&#xA;    &#34;WCNTEGU4JEqQUNwdkKkP0Q==&#34;: [&#xA;      &#34;gmo+iv72N8R3ZKjUbp9DXg==&#34;,&#xA;      &#34;3O4R28kD2w0Acw7XQvAZ3Q==&#34;&#xA;    ],&#xA;    &#34;WIBkwuKReD+vnev0WY88mA==&#34;: [&#xA;      &#34;+SqndwadNHIvm6x16t9CQg==&#34;,&#xA;      &#34;mFUy6wspY0y/sfnCfQc0Yw==&#34;,&#xA;      &#34;pC9XVLaTUwErG9Rd01nABA==&#34;,&#xA;      &#34;NHJdq5G883S5W8foR85U2A==&#34;,&#xA;      &#34;zYQmqjwBNORHvvIZjBy6jg==&#34;&#xA;    ],&#xA;    &#34;WN9YKonIBKVWuMNAg76vrA==&#34;: [&#xA;      &#34;4MoaZecth+9t4X3jdykhZg==&#34;,&#xA;      &#34;0U0p6zwok5l6rbIxjBRN7w==&#34;&#xA;    ],&#xA;    &#34;WXfnWfq5UvDl4B0hS+0enw==&#34;: [&#xA;      &#34;XW4X9/W6MfETfE/VICA4Jw==&#34;,&#xA;      &#34;fSeU4QTAs+fY+ihLpgdM9A==&#34;,&#xA;      &#34;R1x4adkbkgVhxc9hzgUZcA==&#34;,&#xA;      &#34;n39YhRffL6tFFAy/S18A8Q==&#34;&#xA;    ],&#xA;    &#34;WgTBt6b85L1bF7WXV5bQRA==&#34;: [&#xA;      &#34;YgwLp863ho/Lz7XdBK6IXw==&#34;,&#xA;      &#34;LMrJ8zW3vxlqJrvFMbbCGA==&#34;&#xA;    ],&#xA;    &#34;WuHt6bav9qTQn9+qCLLu3w==&#34;: [&#xA;      &#34;ulsMCA3bm5VANCxYIf54Zw==&#34;,&#xA;      &#34;ZmOheSIAULld8cF9POTj/w==&#34;,&#xA;      &#34;TRd8qEGSmZkjG+mmOfTmTg==&#34;,&#xA;      &#34;ssYEt3aOFwnaqoufFlsCAw==&#34;,&#xA;      &#34;vLgELeoIueNM9KX5ZIMtjg==&#34;,&#xA;      &#34;ZUoGCxFJ/+PUPUdg60izwg==&#34;&#xA;    ],&#xA;    &#34;XD0JiZBKTweysL9d3sIzpw==&#34;: [&#xA;      &#34;LULa++Og4kM4JJrQxnZj0w==&#34;,&#xA;      &#34;eERb0a2u5NJoo8XHmwI23A==&#34;&#xA;    ],&#xA;    &#34;XMPq7+46c92RSax5sZ9PZw==&#34;: [&#xA;      &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;,&#xA;      &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;,&#xA;      &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;,&#xA;      &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;,&#xA;      &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;,&#xA;      &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;,&#xA;      &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;,&#xA;      &#34;u0cs09LPRVEEfen4PHM6gA==&#34;,&#xA;      &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;,&#xA;      &#34;cex7jEfdv/MaWi3px1ZgxQ==&#34;,&#xA;      &#34;xoMyxEWbrnIOZWHnwVuShQ==&#34;,&#xA;      &#34;HRagOYGIDOKfFoQakG4CEA==&#34;,&#xA;      &#34;VgTIKWxJpYFkd788UcqT3A==&#34;,&#xA;      &#34;vbUGycVGGL83rd1I5CfHuQ==&#34;,&#xA;      &#34;RfXeDDRCykmZZMDXVfaGtg==&#34;,&#xA;      &#34;by4qEj8r2+yQ8xw2ZHB4/Q==&#34;,&#xA;      &#34;ozbcadljjD/zIm3hj6kVaw==&#34;,&#xA;      &#34;NoEVAwQMgkCr1UvAm6iQBQ==&#34;,&#xA;      &#34;qFdiNhAK1CrksJV/dJy7OA==&#34;,&#xA;      &#34;4rkDoNFFNCrcnkPj+GN2vA==&#34;,&#xA;      &#34;QNVm3dpa9lFJUb6FBjjc1g==&#34;,&#xA;      &#34;mYgwcPpa/l0bTZdysqbplg==&#34;,&#xA;      &#34;rY2PGGazDLFtrrL5h0HYLQ==&#34;,&#xA;      &#34;hYg6jGCQ5Nuq7UsitAzuiw==&#34;,&#xA;      &#34;ZrKcftBnwBVZKQlRJoJcLw==&#34;,&#xA;      &#34;vayO6Zpv5fCNARnrSOYfGg==&#34;,&#xA;      &#34;TU6sUeJdvbpf1Uxt7QBVXQ==&#34;,&#xA;      &#34;A98JJ8FAQWnMhx8Nb3TYXA==&#34;,&#xA;      &#34;9rfGlkZ9WMAUo942FMnq5A==&#34;,&#xA;      &#34;lBoi08D0xA11v+agRADO8A==&#34;,&#xA;      &#34;vwdkC2aeXSkn642Di7lXbw==&#34;,&#xA;      &#34;kQEcZDAS6Ka6J710VZUH9w==&#34;,&#xA;      &#34;DwDznogCJiIx7SjddRcbCQ==&#34;,&#xA;      &#34;4YMcCEsfWO5KpctoAqwrFQ==&#34;,&#xA;      &#34;4hX2FW/Yj9HDbKRBqrhgdg==&#34;,&#xA;      &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;,&#xA;      &#34;bDhy7gfmPOwxr6lS2HOcFg==&#34;&#xA;    ],&#xA;    &#34;XX1gx35T8rMzed7p4qESdA==&#34;: [&#xA;      &#34;cSPoRTB3BjDaa16wszdN3g==&#34;,&#xA;      &#34;HveCNT+j0lknlUOFTaqgtg==&#34;,&#xA;      &#34;rKpZxH2tXrNLthuse32FWg==&#34;&#xA;    ],&#xA;    &#34;Xs0UZDLX+3bz2vT+iSJz7Q==&#34;: [&#xA;      &#34;PrCrIesi0sSvMQjPpvxecw==&#34;,&#xA;      &#34;klH60uFrR0WkawaSlcOEKg==&#34;,&#xA;      &#34;e0VfCD1REapdkagkByCnXQ==&#34;,&#xA;      &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;,&#xA;      &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;,&#xA;      &#34;svCt47J2Zwa45xj8gn3U/w==&#34;,&#xA;      &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;,&#xA;      &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;,&#xA;      &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;,&#xA;      &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;,&#xA;      &#34;e8Ba4iAzVtDvrookiM9XAg==&#34;,&#xA;      &#34;8Zz8gP9QPTYBttUQXDeNpg==&#34;,&#xA;      &#34;FdtzK6tyT53moDNlzBGPBQ==&#34;,&#xA;      &#34;GaZVgTbcdJiJMvdUeofqTA==&#34;,&#xA;      &#34;5xW5MMwESxiksXgaLrFCnQ==&#34;,&#xA;      &#34;nNNVXLjFvnegTKkITfCBuA==&#34;,&#xA;      &#34;JqWXvYyB4T300h7KRcWtFA==&#34;,&#xA;      &#34;x+E+r7arkKvVcXf/ay8rdg==&#34;,&#xA;      &#34;9SrODyBGF+py5BfKYxVllg==&#34;,&#xA;      &#34;5/L+eT1BzZSWVW4ZLUXszw==&#34;,&#xA;      &#34;iveVedfC78Qk/6ltHJ21kQ==&#34;,&#xA;      &#34;sHvGKpRovk0D6WznAeRDaw==&#34;,&#xA;      &#34;oVI7j6msaWseNIkn6m/3+A==&#34;&#xA;    ],&#xA;    &#34;Y2WVn7YbALZNiKrMVF83bA==&#34;: [&#xA;      &#34;GJy8g/4zoy4CPDvWLZr9kQ==&#34;,&#xA;      &#34;coZUZkSgAUHkgS8Joj97mg==&#34;,&#xA;      &#34;194woe53clmG4lfLXvwjcA==&#34;,&#xA;      &#34;3NsOBlWsKnPW4267fh2nUA==&#34;,&#xA;      &#34;CUQJjAsDbX9xkyOrUzo/mg==&#34;,&#xA;      &#34;uGxAJHfmN99PtsQCJqV/nQ==&#34;,&#xA;      &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;,&#xA;      &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;,&#xA;      &#34;76mWuVYhbmIFsc4DNorK9A==&#34;,&#xA;      &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;,&#xA;      &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;,&#xA;      &#34;lQBARBTddFvexevUD04GZA==&#34;,&#xA;      &#34;uaetuJImncB6wudykQLpEA==&#34;,&#xA;      &#34;sykv+pGN4TXggZNIwL/H4g==&#34;,&#xA;      &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;,&#xA;      &#34;Rm7aeXEOy4+PSaaC/AfGyw==&#34;,&#xA;      &#34;FzTxCzGYtLmJVoQ1syBiUQ==&#34;,&#xA;      &#34;nS3gw6C5KX889pH0DdnXbQ==&#34;,&#xA;      &#34;l5iJurZf3UzepkqgzjvSSQ==&#34;,&#xA;      &#34;qSRGSB2uV6n5bH1pdu2LUQ==&#34;,&#xA;      &#34;9lxLFgIezXSh1WnSsRhwNQ==&#34;&#xA;    ],&#xA;    &#34;YRfO+WACNVQDTEO1DaRoPw==&#34;: [&#xA;      &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;,&#xA;      &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;,&#xA;      &#34;76mWuVYhbmIFsc4DNorK9A==&#34;,&#xA;      &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;,&#xA;      &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;,&#xA;      &#34;lQBARBTddFvexevUD04GZA==&#34;,&#xA;      &#34;uaetuJImncB6wudykQLpEA==&#34;,&#xA;      &#34;sykv+pGN4TXggZNIwL/H4g==&#34;,&#xA;      &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;,&#xA;      &#34;KEWGfOVGYNjr6kNjpQx0qg==&#34;,&#xA;      &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;,&#xA;      &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;,&#xA;      &#34;/8OUfvwBnXvWQXB4Meq/rQ==&#34;,&#xA;      &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;,&#xA;      &#34;fcEhBEQT+7+nxaOwZEIInQ==&#34;,&#xA;      &#34;9CmH5Y/MDHXGbta8UBA5HQ==&#34;,&#xA;      &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;,&#xA;      &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;,&#xA;      &#34;+T/c3saENK5zeqXtZtGLNw==&#34;,&#xA;      &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;,&#xA;      &#34;9ca/WR2Db6VUKD0h31yyGw==&#34;&#xA;    ],&#xA;    &#34;ZEh/5caJmj5WMgoK5/jyfw==&#34;: [&#xA;      &#34;fHxgcXxpn2MkgE/aUd2Vkw==&#34;,&#xA;      &#34;KTLyj41W+cHfjH/HBrA7BQ==&#34;&#xA;    ],&#xA;    &#34;Znd6oNA8HDVHwd3abR/PEg==&#34;: [&#xA;      &#34;372OESqFjEs8/4MHn0xr+Q==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;      &#34;5LplZpuSZzAiOH2fmk3HWg==&#34;&#xA;    ],&#xA;    &#34;a0GQ0ecdg5PXNSF9I+cGHw==&#34;: [&#xA;      &#34;cbNKZbfbJhPfPLHi6va27w==&#34;,&#xA;      &#34;TEg+H5IUFEuL8/4VudXtEg==&#34;,&#xA;      &#34;JBIWl7TA4AzjcNVfFPjHaw==&#34;,&#xA;      &#34;QznSXY89jmEtP62PhxgH1g==&#34;,&#xA;      &#34;Lcg+9plLPEAo58BHKBlIGw==&#34;,&#xA;      &#34;vc3i6DfzTVpLFX6x0zKE4A==&#34;&#xA;    ],&#xA;    &#34;aW0vfCmvp3ku6dMkvaoZGw==&#34;: [&#xA;      &#34;2oTX17kDUCTK4lHB98r0SQ==&#34;,&#xA;      &#34;FAES1XlWFCETbKQytoq57Q==&#34;&#xA;    ],&#xA;    &#34;ao0mLJHwgqEhua26lzg6gQ==&#34;: [&#xA;      &#34;ZQsszFOlqLuLyfXZGfRKxQ==&#34;,&#xA;      &#34;0bsVwLbC3DjqoPdFlpHGrA==&#34;,&#xA;      &#34;hEt6vsfHYq4kHELEO5xWxA==&#34;,&#xA;      &#34;USroe8+XCxLDwAOkjWfs+Q==&#34;,&#xA;      &#34;mIzvIMMUHDBMdt3eAx+4Rw==&#34;,&#xA;      &#34;lTNtbu9KrTbZ2ion3t+azw==&#34;,&#xA;      &#34;alSeOMnzCu4eh8h4VjVrpA==&#34;,&#xA;      &#34;9Bnr48B1Gkm5b1u7nixqng==&#34;,&#xA;      &#34;KwXuJ1mZuqgv14dKI+DdIw==&#34;,&#xA;      &#34;l3j9C20yHr6ZHIXLApzl0A==&#34;,&#xA;      &#34;wBC264S906jsJ9EHip/24A==&#34;,&#xA;      &#34;1sD6TJmtoMKm89Mo2ka5lA==&#34;,&#xA;      &#34;L/8naYULbNo7VCB5WzvpDw==&#34;,&#xA;      &#34;4L3dk768qs7Sg3jWyr+5Ug==&#34;,&#xA;      &#34;okW8xf+CinO7BWuM9dEk4Q==&#34;,&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;icr9XD5DN3YDWvP3naYL+g==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;EB6fg0YbdpF3FjycPEVN/Q==&#34;,&#xA;      &#34;AyHFH4N7lNUZlwVfgigcMA==&#34;,&#xA;      &#34;eKvGCJDf1Iytf5g2d8kaFQ==&#34;,&#xA;      &#34;FV18DPtJsW6qZZIHDbkGJA==&#34;,&#xA;      &#34;5MGCN705vR5eWycZyFuYJQ==&#34;,&#xA;      &#34;oIxZENYISdQtE42Fc34Vyg==&#34;,&#xA;      &#34;OvvtykNCZtfooZWGyghXfg==&#34;,&#xA;      &#34;DjpSix06K6wkPOmaLpbGWg==&#34;,&#xA;      &#34;qQxzRYdLEwZ+uwtq33H+Uw==&#34;,&#xA;      &#34;8qeM99NPNtS3R0CIVDnqTw==&#34;,&#xA;      &#34;c9kKQdmqE31JfE8hW1jBfg==&#34;,&#xA;      &#34;g3/sX4CO9sGFGMvToQ+how==&#34;,&#xA;      &#34;mjV/DAgymXlZYSj9rj04pg==&#34;,&#xA;      &#34;lc0ErrFagkcQxsv9AGKTjw==&#34;,&#xA;      &#34;H04yzALMJAjmclexKFeS2w==&#34;&#xA;    ],&#xA;    &#34;arzS3GnLPLKzM8xRPFnUzw==&#34;: [&#xA;      &#34;tbhLz74i3ShwS72WbIsoOA==&#34;,&#xA;      &#34;1VKGbptJGVhPmMaic8aidg==&#34;,&#xA;      &#34;Qzh+CSMQ9O8Q+LoKZ+3MuA==&#34;,&#xA;      &#34;xhnxsdmWc6+n3gUj6yqBpw==&#34;,&#xA;      &#34;j/Ffe29Pz7uoI3ROVu3/hw==&#34;&#xA;    ],&#xA;    &#34;ax5YZqtoTsGSLh5YAOUDAA==&#34;: [&#xA;      &#34;J/vqYu1qTz7dsS8oVaCTTw==&#34;,&#xA;      &#34;vJceii8mKrpQPBtlAKleGQ==&#34;&#xA;    ],&#xA;    &#34;bbOmNWQZu2GtbHRNTT5LbA==&#34;: [&#xA;      &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;    ],&#xA;    &#34;bp0rUgZ5FkIYAX2aEVd/VA==&#34;: [&#xA;      &#34;YmjsPDVfe7xyjGwOgJunGw==&#34;,&#xA;      &#34;qsn7RE1KMH045/wAyIDw7A==&#34;,&#xA;      &#34;ZtlPcxFiuXhGia0ZM6cNBg==&#34;,&#xA;      &#34;XkiVaSOj/tcz5wNKnglN4w==&#34;,&#xA;      &#34;CQNzMQJa1wEomWRr1m5WUQ==&#34;,&#xA;      &#34;j2qyk9XQmGp7ssMhZKM8jg==&#34;,&#xA;      &#34;mXoGTWRL/KLyEYWh5uyvXQ==&#34;,&#xA;      &#34;QXekSyzWiuaI8YTxDgngHw==&#34;,&#xA;      &#34;XuMP4XKeqFlYH9jgvFKXXw==&#34;,&#xA;      &#34;TIcWaTRsDD52irGN4xUQyA==&#34;,&#xA;      &#34;KsboTEAsiwsdLEKIDivkyA==&#34;,&#xA;      &#34;BfDjqoaYrd0NKCGGxtokTg==&#34;,&#xA;      &#34;Qe1reyLPtQVZ5wKqKa9jQA==&#34;,&#xA;      &#34;RATpPhLUqjEbe+XxyYxOOw==&#34;,&#xA;      &#34;0v5F4x1W0RxkklLvRs6NKQ==&#34;,&#xA;      &#34;00cDk2w3qfvdzMbO27c/+w==&#34;,&#xA;      &#34;6LazNwUBgu5kQGKPCQnaOw==&#34;,&#xA;      &#34;e7h3lwyDkLbzwbeza9/TWw==&#34;,&#xA;      &#34;zDmU3WG0c3AQYw7NFebUCQ==&#34;,&#xA;      &#34;hxluEp8Si16NQcfaJDWcLg==&#34;,&#xA;      &#34;I3vwwgMxzxWo15otCOgvAw==&#34;,&#xA;      &#34;Q0D37bmhhLGtYILIAMgFXg==&#34;,&#xA;      &#34;GXMpRf2go/wGEbwpp9BPPQ==&#34;,&#xA;      &#34;+uMSPU5jbqI0+jsP/eX6PA==&#34;,&#xA;      &#34;KB8w2g8b8sP5A8+iqhqw8A==&#34;,&#xA;      &#34;h+nOQU6khNxAH7kkGqVqkQ==&#34;,&#xA;      &#34;5D5WFK01Su4Lrj4hhwDYGQ==&#34;,&#xA;      &#34;qug1advw8m4TjVAUPEUPiA==&#34;,&#xA;      &#34;0bK7Vo3x9SXQYvDvMmgzXA==&#34;,&#xA;      &#34;rO5a9fYyaqaIZ4bH0M8fdA==&#34;,&#xA;      &#34;zx97OaxgXH8j+mFWesQySQ==&#34;,&#xA;      &#34;JmKf//IQj2eMVJFTB1Feyw==&#34;,&#xA;      &#34;DNd0sdbW83acQbIl3FDaPw==&#34;,&#xA;      &#34;lHLNxD93t7uUJfmDhNwvCQ==&#34;,&#xA;      &#34;6asSIEJz7ggo9QEXpbSOYg==&#34;,&#xA;      &#34;YUwZZ9Cg1FloxBZV60vOCg==&#34;,&#xA;      &#34;T5Nghm4crNWWnUrYvZZItg==&#34;,&#xA;      &#34;vTajNh0ysqaO8NuTMU//uw==&#34;,&#xA;      &#34;AwUdH/KSEhHnx1nx0tagUQ==&#34;,&#xA;      &#34;kTyfGInwWoCVv7gGPYCF5g==&#34;,&#xA;      &#34;X10PEbhI2yv6KYFUPacecg==&#34;,&#xA;      &#34;NeZAaBfGrzLvaMKrJL7WlA==&#34;,&#xA;      &#34;W0TAw6aTfwXOMlJwloDkZA==&#34;,&#xA;      &#34;JD0llI0bGUOG/VBz+9LeVQ==&#34;,&#xA;      &#34;6MW1lRUdNNc4s+6uD2JNvw==&#34;,&#xA;      &#34;6LOgJE44rXWziB7/OMO/ig==&#34;,&#xA;      &#34;aQGx6Am8fU9TZmcyiMNL4A==&#34;,&#xA;      &#34;cxMZ2TEnkk6RdtuU9fDThg==&#34;,&#xA;      &#34;rJljaCTiTdw1uI1lvfy+hw==&#34;,&#xA;      &#34;u1caIbS4Tk6y8c7sz8Hvhw==&#34;,&#xA;      &#34;w1094TrprBpG+5TZJus6FA==&#34;,&#xA;      &#34;qWK7H7gz7e8gS19GJSeIIg==&#34;,&#xA;      &#34;MLyBE3p9/9+LMOMl2JBi6w==&#34;,&#xA;      &#34;s2uSNGuV+OyVW2eHDGWWKw==&#34;,&#xA;      &#34;7AoZZiCMmvqX9d9WD62FnQ==&#34;,&#xA;      &#34;7sGexlbSpX41SOBbWHg8BQ==&#34;,&#xA;      &#34;HHBOKYlzeD2Busv7btyBAA==&#34;,&#xA;      &#34;gGrGej/Pj6/poAgebFb+dg==&#34;,&#xA;      &#34;Y6TEBwH0+CoZ50j5sQV23w==&#34;,&#xA;      &#34;HSaKorahiaNwGqqE2DJSaw==&#34;,&#xA;      &#34;0YVxD0vSH+0MhijemP/Jmg==&#34;,&#xA;      &#34;eekbTUpqIafepE8Hfmhn6g==&#34;,&#xA;      &#34;Y/6FiFNJ+h2jXNTlPOzrnQ==&#34;,&#xA;      &#34;XL1Nv8y45q8aiA92A99YyA==&#34;,&#xA;      &#34;qEhRdzGH44SGjJIcqcIv/g==&#34;,&#xA;      &#34;g6spFzT6DoopzuQCE0pjRg==&#34;,&#xA;      &#34;SvhQ7tNvl6ANrVnaJ4cBNw==&#34;,&#xA;      &#34;b2xf65/2S45gOxG8Grxy0g==&#34;,&#xA;      &#34;LkJjju2s50oKpBRyBT8s0A==&#34;,&#xA;      &#34;2RZ3u6UmceVG9iB/xb73SA==&#34;,&#xA;      &#34;2UHqEqfMIIn53NkDlDEppQ==&#34;,&#xA;      &#34;6dwQWrojfQ/1hgTT2PQckg==&#34;,&#xA;      &#34;+hBhqk1qKnkU+nqn6a96qg==&#34;,&#xA;      &#34;jVeIQzIm92EdkbCIlGT1qA==&#34;,&#xA;      &#34;6o8ui0RxMttDzkyqTDO5tg==&#34;,&#xA;      &#34;kaUbMItvWrS1leJMEsAk9A==&#34;,&#xA;      &#34;saK0Qxr6f3taAu0dVT0erg==&#34;,&#xA;      &#34;oyvtOIVUDqm1ruQx8vhRhA==&#34;,&#xA;      &#34;uDfc8ZaPfrhTGcFwVaIvAA==&#34;,&#xA;      &#34;QbgvVzhz2dr5BDvAUM6wFQ==&#34;,&#xA;      &#34;o8O4Ttqnv0lQfm1yyfyVsw==&#34;,&#xA;      &#34;Ah03jmj/7fQOqUbg05PtZg==&#34;,&#xA;      &#34;+PjI2yN4wCMPyf1oygeT5Q==&#34;,&#xA;      &#34;oVgcRSL89qnSRkMXpV8N8A==&#34;,&#xA;      &#34;w8af/LTYrBLWhYkZBSi2Lg==&#34;,&#xA;      &#34;GfPY5zBbHJQI4ZGaDcJj2A==&#34;,&#xA;      &#34;r410Z5X0yojDsVg9YVcNqQ==&#34;,&#xA;      &#34;/YcdipQjiqJUDpddwhDiIw==&#34;,&#xA;      &#34;l/tOmWC5BVb4or7dYqfWjA==&#34;,&#xA;      &#34;Rd2hVVbUws+mcvoC7DaoiQ==&#34;,&#xA;      &#34;KYv6PwzjV6/5I33cZ9LUmQ==&#34;,&#xA;      &#34;3WRC4Vl08/leTJ1MFHuCEg==&#34;,&#xA;      &#34;QgRg8usqYLpC2SzTmhUKsQ==&#34;,&#xA;      &#34;zAQhwfD+1kpXY0CwZC6HxA==&#34;,&#xA;      &#34;UBzPfwycyyJOBETwdSTG/w==&#34;,&#xA;      &#34;8563iLEht/ghMGItALTFUw==&#34;,&#xA;      &#34;OXr+UvfSDAQbLGP4xOBSMw==&#34;,&#xA;      &#34;lz6O0nYiDpis8SScmTUuSg==&#34;,&#xA;      &#34;HlOu0EmTxHkjzmJeJEuJmw==&#34;,&#xA;      &#34;2sm08sXcjWtT2Gtu3CdSug==&#34;,&#xA;      &#34;8efBqSZ3OYqd+nT8a21FNA==&#34;,&#xA;      &#34;BS5Qx6nN3HmM64VVoKmayw==&#34;,&#xA;      &#34;cMY+6QfPqyOZE380Mf5rIQ==&#34;,&#xA;      &#34;BTToHfvg0weSXCH9D0acFA==&#34;,&#xA;      &#34;2I/0B+uXhxpPJWXGwNGlLw==&#34;,&#xA;      &#34;bACUKZThWu3kcO82NfO4eg==&#34;,&#xA;      &#34;19Kvl4LS7MCiBo2cRD5fxQ==&#34;,&#xA;      &#34;Ob+LJ5zYHnbjt14Yf8W7UA==&#34;,&#xA;      &#34;s6kt2DqKLHgzYSGciPtGtQ==&#34;,&#xA;      &#34;3Lvdmj//2sze9S8I3n8yrw==&#34;,&#xA;      &#34;rR226S9SV4WbmIVotM0CsQ==&#34;,&#xA;      &#34;93O9BjbBwz1jYmTNCzgkUw==&#34;,&#xA;      &#34;2luu38jiVQvy6qOXHFgpAg==&#34;,&#xA;      &#34;JtGggrfMckWn0xvfWBMJJQ==&#34;,&#xA;      &#34;GnBCRP9H+R6do428z3nOkQ==&#34;,&#xA;      &#34;QX9gQ7esz1e73iQHmwojXA==&#34;,&#xA;      &#34;AIlN8RmMOvhBveVuVAyHQQ==&#34;,&#xA;      &#34;qYORp6v9x0Jy6S8OKerZvw==&#34;,&#xA;      &#34;1WQ/LJu/kefEuHRv58l0Lw==&#34;,&#xA;      &#34;dO/rj/SVo/ZlfJAB2ajOEQ==&#34;,&#xA;      &#34;tLSR0X6hQ7hvyPbBXZslBQ==&#34;,&#xA;      &#34;cjoCrbQlAeGxtTPUlcMPuA==&#34;,&#xA;      &#34;bh7RRRlNP555+LOFASdB0w==&#34;,&#xA;      &#34;ylg3k+AtgUcIl3hJiXNMlw==&#34;,&#xA;      &#34;WACsy7vAhq3GJRyxAuj7NA==&#34;,&#xA;      &#34;ltryu+P4IG4b3EAJKjyGHQ==&#34;,&#xA;      &#34;75kzXqx/LGJU9hkFlgdGGA==&#34;,&#xA;      &#34;wQvupTbd1tnTVAWewQzJMw==&#34;,&#xA;      &#34;l5eC5C4lpe8Zt0TnNwDO+g==&#34;,&#xA;      &#34;uWnN7JCvikoCVXMugnDhoA==&#34;,&#xA;      &#34;hMc0MDqaKmmGxo7P4SKmKg==&#34;,&#xA;      &#34;wn4STzMt4ytbVHyERUyNoA==&#34;&#xA;    ],&#xA;    &#34;byfHs8LLvbAc+YzK8+QmXA==&#34;: [&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;icr9XD5DN3YDWvP3naYL+g==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;8eY8PV83CN3R/MV2hK7XHA==&#34;,&#xA;      &#34;gqWTMUdDL1db9YSLA4qpRQ==&#34;,&#xA;      &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;,&#xA;      &#34;gJ/fF2D4AXb0sjRGNWgixw==&#34;,&#xA;      &#34;wqIGHEm21/U4VCTr0VeLVw==&#34;,&#xA;      &#34;GVOb0whjVXBMMGVZhZjH0g==&#34;,&#xA;      &#34;3ehQjUp3PMzo2i+ZXMC7RA==&#34;,&#xA;      &#34;kMB61Eclf1Qb2Suk3JRmXw==&#34;,&#xA;      &#34;eoZiXVXIYF5HZwY9O+NvfQ==&#34;,&#xA;      &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;,&#xA;      &#34;SWMi5UoagLshKWAW26MJTw==&#34;,&#xA;      &#34;SsFE9yHqow9BNx1O4nMcCg==&#34;,&#xA;      &#34;5zg9huqgOp8E89z3dxtcHg==&#34;,&#xA;      &#34;V2C0OnbFKs9wiV3IrUOPew==&#34;,&#xA;      &#34;VdavXNeRp4EjkXxldYSiUw==&#34;,&#xA;      &#34;EXWaDNivW550gBh9Dm6gCQ==&#34;,&#xA;      &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;,&#xA;      &#34;8OhIIjb+vwm01NjtGgcnDw==&#34;,&#xA;      &#34;vHIEJpBGkCNiUPmahPyLqQ==&#34;,&#xA;      &#34;ZBDjl4GlHR5BEu3WvRQHHQ==&#34;,&#xA;      &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;,&#xA;      &#34;qbsbXExNvRlblIMDPNkFzA==&#34;,&#xA;      &#34;y5N73UEFT/BHwjJkVAx22A==&#34;,&#xA;      &#34;juRvPdedfeoW/YVn4PBM8Q==&#34;,&#xA;      &#34;WPBuKgPICmQT6PHBjmoC1A==&#34;,&#xA;      &#34;cm/gvI0AVbEJW8SbZVw6fw==&#34;,&#xA;      &#34;DDPdyyhkyoDS2Vq0O3We0w==&#34;,&#xA;      &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;,&#xA;      &#34;4IznDha57aCNWoI0Hc828Q==&#34;,&#xA;      &#34;1BGBx+ICmx9ndSR1J6c9Rw==&#34;,&#xA;      &#34;SKyAPnATFclliIE0mjtq+w==&#34;,&#xA;      &#34;C+2GxqMTQEZYKlJYDQE1Pg==&#34;,&#xA;      &#34;OUOPFj6v5qm/F5KSXf7dVw==&#34;,&#xA;      &#34;yubezWiwTBzlJyfKBBah5A==&#34;,&#xA;      &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;,&#xA;      &#34;k4dDUqBohIhzwbUS8fZiCA==&#34;&#xA;    ],&#xA;    &#34;c+W6x4Mcea6sasJQFpayfg==&#34;: [&#xA;      &#34;ryPu/punYtMOzifbFWj3Xg==&#34;,&#xA;      &#34;cr4RGJYSJM2QUssm6cAQ4w==&#34;,&#xA;      &#34;XH8pWtqEhhBDhQuq+NWhvQ==&#34;&#xA;    ],&#xA;    &#34;c4cAHnbL6QvzxTWvSxwSUQ==&#34;: [&#xA;      &#34;Tz9Z9WUqfvL0BrLTJjlG5g==&#34;,&#xA;      &#34;13Dkon5caDMIMuKn79Qskg==&#34;,&#xA;      &#34;jujfK7kvNttCHbG9Y1cEjw==&#34;,&#xA;      &#34;+QQwOZo/9naGhbYAyaOr+w==&#34;,&#xA;      &#34;OSUAY4vX1mm91uqYY2QyKA==&#34;,&#xA;      &#34;mjI/WzMYY52AQdc1No8ugQ==&#34;,&#xA;      &#34;ZZYlhV9nOBPxmh+lN8Wzlg==&#34;,&#xA;      &#34;WGwIYJUrzsJ4/8TTyxMGGQ==&#34;,&#xA;      &#34;3UFdmogC8LxBJ8vh97CLKg==&#34;,&#xA;      &#34;4ZcrBE+d85+98j2eHMpVTQ==&#34;,&#xA;      &#34;C+zOyZD8CwAZei0FDIvlTA==&#34;,&#xA;      &#34;qAjJcUd7scO8lHObIc+8TA==&#34;,&#xA;      &#34;pLMgO5RHEs1yrujEkb226g==&#34;,&#xA;      &#34;/w1B4Q4YhRhn+C15Pv2Mlg==&#34;,&#xA;      &#34;Xo53LSQ1UPT3k4c2guU75Q==&#34;,&#xA;      &#34;4PIM0/eLiUwExdFACTKEEw==&#34;,&#xA;      &#34;zEKtVLhCQn3xgvKNhFo2bg==&#34;,&#xA;      &#34;WlLXHoXR9O8Ph+uSZ6aDCg==&#34;,&#xA;      &#34;LTObsRKzbMcDf7ZCch9lsA==&#34;,&#xA;      &#34;CfhyOTUZXzyZ1gBqX8Jz5Q==&#34;,&#xA;      &#34;ab/GKLlj0s6Lkn9DyDnUUQ==&#34;,&#xA;      &#34;3A/kVsDzDDwZXdM+JpfWlA==&#34;,&#xA;      &#34;uFRb2siFSROrNSaSMqsvqQ==&#34;,&#xA;      &#34;2/tA0uwDqjzRb7JZP+f4Mw==&#34;,&#xA;      &#34;QMVQFQxQO9E+szLpK5nZ9w==&#34;,&#xA;      &#34;2usQa32fSqIDVo0qKM7RFA==&#34;,&#xA;      &#34;DI7HeHo8A/itZHGTOHOQIg==&#34;,&#xA;      &#34;h/OVEZRz5ndHYLHsNXXXMg==&#34;,&#xA;      &#34;xxrk6qwvf/BkNdal8rz/jA==&#34;,&#xA;      &#34;O7l2OQQ3NRM4VNrd4YvEaA==&#34;,&#xA;      &#34;b8cX6Z3ptet250uYs1XjIQ==&#34;,&#xA;      &#34;x+9X6oSMihxrE4Tni3a4Zw==&#34;,&#xA;      &#34;4iFNln+X4k0SeUiw/ueLUA==&#34;,&#xA;      &#34;Z5H14Z81HW+BVvKWtV5kDQ==&#34;,&#xA;      &#34;Km0Kj8/PT21DcOVckLYRyA==&#34;,&#xA;      &#34;U86hsRMcoSpvWp72aUJNFQ==&#34;,&#xA;      &#34;8ImlkqI0B9hvKdKXJLla/w==&#34;,&#xA;      &#34;/KRhrFyFO2WBBj1/Wnbnrg==&#34;,&#xA;      &#34;Dp0x43cNy9IQTCa5Vb7Uyw==&#34;,&#xA;      &#34;UcI2WjL14mHQYOfXIkpuzA==&#34;,&#xA;      &#34;e91QDoc1m7i0h9Urg1XIuQ==&#34;,&#xA;      &#34;u1EBYvwhn/Xoyt4PDy5M1A==&#34;,&#xA;      &#34;kQL9cvtBFPgCA0FVlrhUBg==&#34;,&#xA;      &#34;hjzu3I+m68mPWogOfZscVg==&#34;,&#xA;      &#34;+DDOZxWQYsdNCtZZs4LB2w==&#34;,&#xA;      &#34;bS+af0/VFTa2vHJUfxeH5g==&#34;,&#xA;      &#34;SqKI5VB6698Nen4zsScUuw==&#34;,&#xA;      &#34;bUleeXyDhPPtw2/S2E8kiw==&#34;,&#xA;      &#34;W01A5sOetTjsV/4bYawPgA==&#34;,&#xA;      &#34;sQzygdvKruRINz20KeXUpg==&#34;,&#xA;      &#34;jM18i6BgFcWSycW3ixuZHw==&#34;,&#xA;      &#34;qRLrD7xZAOZ93NjJgcm1Qw==&#34;,&#xA;      &#34;DrIpfcclD2b0iXSNtu+I6Q==&#34;,&#xA;      &#34;UTm7DZVRUmqWWBx0Js7vCA==&#34;,&#xA;      &#34;9U8BTRqVPM+WCls5RolwuQ==&#34;,&#xA;      &#34;c/TMKje5Txl9grWesV+S0A==&#34;,&#xA;      &#34;nVEuAeNYaydUTqNE5GOm/w==&#34;,&#xA;      &#34;sa5mIA5TIgDDEs7v0PwTjQ==&#34;,&#xA;      &#34;sfZFr+txEQMBXhlDkKUnmw==&#34;,&#xA;      &#34;lH27Z8PmZeo/EM/AegpCTA==&#34;,&#xA;      &#34;9lAt/24IrVKtsskC+grSQQ==&#34;,&#xA;      &#34;UjXmsuFAyS2A1LN7d6S/5w==&#34;,&#xA;      &#34;5sY/WncZRmQ7FUzZZ4kBfQ==&#34;,&#xA;      &#34;Ayn8XyGcXwYPR+J1PSWdHQ==&#34;,&#xA;      &#34;Ec/FYvTTz4riEqnQe1G+Fw==&#34;,&#xA;      &#34;HW1HxtJFrKBktMKHARGGeQ==&#34;,&#xA;      &#34;yOFL3ef2F8Ux3GMySAVXxg==&#34;,&#xA;      &#34;pHq3XsQe5Y157BuUHMufyg==&#34;,&#xA;      &#34;0DSgRHOq1OLwMX3biKMcbA==&#34;,&#xA;      &#34;Fys7cTDgnkqkKy/A1tAWPQ==&#34;,&#xA;      &#34;h5U/sk69K9TcWs3P9TuKxQ==&#34;,&#xA;      &#34;d1j+WeBwgxUY2DD8tjQwMA==&#34;,&#xA;      &#34;0ZQtBpkFjRCvM3RNGGREDQ==&#34;,&#xA;      &#34;7SyD51cUTMP7ddBSGNw3Iw==&#34;,&#xA;      &#34;LKHvKuMU+ZaZN+c9jQoc8A==&#34;,&#xA;      &#34;n8gOZ9FmDLirfTfnNZSfNA==&#34;,&#xA;      &#34;hIHRMVndQh85jnW2uCawbw==&#34;,&#xA;      &#34;RH0QKqHuyNcotxvkkCiTBA==&#34;,&#xA;      &#34;2CBaGFwc5Pbj3yR6Gim3fA==&#34;,&#xA;      &#34;96QbNqFHhG4RmHyIqvnk+w==&#34;,&#xA;      &#34;WOIdi+BEnCeSEkfRBmj1AA==&#34;,&#xA;      &#34;nfRozYKxaq/cbStnERagAQ==&#34;,&#xA;      &#34;CuWE9qOLaSI+JhOsCiY03Q==&#34;,&#xA;      &#34;5RT9+X+8xx3rC02gOnVsjQ==&#34;,&#xA;      &#34;Bua36N02B8W4H7+P8yixkw==&#34;,&#xA;      &#34;flC/+W9ll6TqBKBRm/YUiA==&#34;&#xA;    ],&#xA;    &#34;cGWkJkC9Qm+QCP4f8vmD+Q==&#34;: [&#xA;      &#34;cbNKZbfbJhPfPLHi6va27w==&#34;,&#xA;      &#34;TEg+H5IUFEuL8/4VudXtEg==&#34;,&#xA;      &#34;vdokiHWKHEv0aYbydeDs5Q==&#34;,&#xA;      &#34;x5MnAXJPkWBC+zd+i08Svw==&#34;,&#xA;      &#34;OJ5Ok6CMeJ8/3txCizz4cg==&#34;,&#xA;      &#34;opnb226IH8+SU+iAVOx8hw==&#34;&#xA;    ],&#xA;    &#34;caF9WsICRhpk2jJBTv5OsQ==&#34;: [&#xA;      &#34;m94VQcvA5qigjAcL/i2L2Q==&#34;,&#xA;      &#34;x4y353xwTKkgu0582Qh5wg==&#34;&#xA;    ],&#xA;    &#34;cj0M8yBzJA8j5tTGHOqDIw==&#34;: [&#xA;      &#34;FAoi5hf12Vg9h7NFehHyBg==&#34;,&#xA;      &#34;5AQXXWGtKGeqoPkMqmVzTg==&#34;&#xA;    ],&#xA;    &#34;clGQ5Kq/RKZZziBln/4BLA==&#34;: [&#xA;      &#34;koaJtTt9+fGxG4OSw5hxFA==&#34;,&#xA;      &#34;R9lgi90skf6A+gEQ2Lu8dg==&#34;&#xA;    ],&#xA;    &#34;dMY7Qly4vcBOdARECvhzxQ==&#34;: [&#xA;      &#34;ac4lX1PsJ8EE0cPV3DeA7Q==&#34;,&#xA;      &#34;VVK93SGSs31Rb325qicorA==&#34;,&#xA;      &#34;tbhLz74i3ShwS72WbIsoOA==&#34;,&#xA;      &#34;IbhdAqkTe4EMzAhoNvBoZw==&#34;,&#xA;      &#34;T6MROVROqLQIoY85LYvLww==&#34;&#xA;    ],&#xA;    &#34;dnA+092RxSVxmYLtbm4n5w==&#34;: [&#xA;      &#34;cH2BKUm0Ri3t0Dex4X9yvQ==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;      &#34;n30+9otRNHBUO3IOHvF3kA==&#34;&#xA;    ],&#xA;    &#34;dt/eA+h8BqXPeZvbQ4xjlQ==&#34;: [&#xA;      &#34;bf41zTvm6HAv6xdiXpwGWQ==&#34;,&#xA;      &#34;bpwdCug2xQZhmaazCqwIew==&#34;,&#xA;      &#34;rcUIg6JYVsZx379+fVhSVg==&#34;,&#xA;      &#34;3KVKKCxdWl+iCbo/o6cUCw==&#34;,&#xA;      &#34;PvgbBaq86gnOp8hffKEHhQ==&#34;,&#xA;      &#34;3R40oInfBrzPyywU8VZGOA==&#34;,&#xA;      &#34;YgehfkOilPM31dosmRXxDA==&#34;,&#xA;      &#34;cS8BJbrTN4Z2MOJCTGMR8w==&#34;,&#xA;      &#34;dtQx2uUyC6Kj72i0o1bELQ==&#34;,&#xA;      &#34;q7IyWv1MOsi/PXOLUGKElQ==&#34;,&#xA;      &#34;iAZzrtYDqIG5uluq/FjhDA==&#34;,&#xA;      &#34;zH/R3mCgsX+vslxcP7p4cg==&#34;,&#xA;      &#34;Vm1exr1mz0tcpwIoZQ3ySQ==&#34;,&#xA;      &#34;JAlZO0sgdy1FBW5F7Zj+Pg==&#34;,&#xA;      &#34;pvtiIO9KHqFscFbvNo86Dw==&#34;,&#xA;      &#34;uLJc9xWoMs4KcjASTFLV/A==&#34;,&#xA;      &#34;uWvHibmfs86jbjyb5h+qpg==&#34;,&#xA;      &#34;gIt1VKjk5s7zkgD1H7aLmQ==&#34;,&#xA;      &#34;IEgg0w4Stl0SPUBA3ppc4w==&#34;,&#xA;      &#34;L8FIUEPJFSQ6xN1TgXR/Yg==&#34;,&#xA;      &#34;ezX9kOOahP0wfe4oJbRg6A==&#34;,&#xA;      &#34;qvQ7cHiYiYJv4aTIPVusXA==&#34;,&#xA;      &#34;jvIOr2cGPChl6X44xwkz2w==&#34;,&#xA;      &#34;9ScYbT0nSftN/jrx/8pPuA==&#34;,&#xA;      &#34;HrQTGWot7zXPyYbisnzShg==&#34;,&#xA;      &#34;XEhX6upCFgCYuF9SSk9Iyg==&#34;,&#xA;      &#34;SKOD3G/MxX5t9s/HjT+ehg==&#34;,&#xA;      &#34;Xme6FM3Lt2Ob4s0txlAE5w==&#34;,&#xA;      &#34;VKPJSs7Cf+zeQ6s9gNUvhw==&#34;,&#xA;      &#34;sXReFixXG4Bn4+eq/AJDBA==&#34;,&#xA;      &#34;o2KTVNHERxR9Fh6aLcwbCA==&#34;,&#xA;      &#34;nPl1VYR04nooFy6e74yZlg==&#34;&#xA;    ],&#xA;    &#34;eJ5VkZHE2z3KyF5sFEKj8g==&#34;: [&#xA;      &#34;sFUeaSTxmIP9ksmZtDFy/w==&#34;&#xA;    ],&#xA;    &#34;eUjbBBk9e6ukjdxq7Ysc5Q==&#34;: [&#xA;      &#34;wj5w4kQEe9iH2tb9jj1wEA==&#34;,&#xA;      &#34;BwQexIGmUvV9ONa+9gpe2w==&#34;,&#xA;      &#34;14Etv/7765FAI8QbzsokBQ==&#34;,&#xA;      &#34;lv4eSxX+AEAW88phUmOolQ==&#34;,&#xA;      &#34;L7bRdQbudZhoHiefk8z45A==&#34;,&#xA;      &#34;xmhlBgW9Qhx+a2k3SdfUzA==&#34;,&#xA;      &#34;9RLVzTylr5Ocdbql97n+1Q==&#34;,&#xA;      &#34;0Tr3QMpqaFB6S//rbJ/Onw==&#34;,&#xA;      &#34;GeI10LHPuNgyyt295MOmIQ==&#34;,&#xA;      &#34;bDvGK7B1/5BJREOCtiSQyw==&#34;,&#xA;      &#34;C2ejCCBwa9n29Fq9gpW/sw==&#34;,&#xA;      &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;,&#xA;      &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;,&#xA;      &#34;dkvelc7KXIcNmlVEKWwOSg==&#34;,&#xA;      &#34;y1VRnBNNx34t1XvqjEl7IQ==&#34;,&#xA;      &#34;fjsXh+vV+qSWYTJhGoqerg==&#34;,&#xA;      &#34;s6zRbI6E6xMFwOoLRjlPfw==&#34;,&#xA;      &#34;fwXkQZwZsVuPtoAZBIG06w==&#34;,&#xA;      &#34;qB1uVwi5ydv4et+JpGcenw==&#34;,&#xA;      &#34;NUj8ykIgUTA27ShVMCBysA==&#34;,&#xA;      &#34;+pLPiYWkQ9M+8Zi7lKlOZA==&#34;,&#xA;      &#34;RDlpzaleAPnYWwZyjvoRug==&#34;,&#xA;      &#34;ZC2BsE3IgWbuyuu1cz3YMQ==&#34;,&#xA;      &#34;MwRbFLckfwf7ZXLrr6KBUQ==&#34;&#xA;    ],&#xA;    &#34;eckWZv7IBjaLZNS/vZ1gWg==&#34;: [&#xA;      &#34;h8RB92Gx2aWFJ7WtAQ4wDA==&#34;&#xA;    ],&#xA;    &#34;ey7Cn3NmMZ6qorZvUccGqA==&#34;: [&#xA;      &#34;/GSEB7NuV5IOBsMvXs0hOw==&#34;,&#xA;      &#34;c95Jb/MAeM4/Wnq2jSIopg==&#34;,&#xA;      &#34;ghVsimzHhtfG91QJVkK8Jg==&#34;,&#xA;      &#34;Aet749oXCwhRnnY9gEGYGw==&#34;,&#xA;      &#34;sWCyUi5vmFbqsTEOh1QQvQ==&#34;,&#xA;      &#34;dNHj9TUgbfnbgJUCEellCw==&#34;,&#xA;      &#34;A3ZYVQ8Z63tDAx8FSltQHw==&#34;,&#xA;      &#34;JVuTqfPwohmj6ucokgM2sQ==&#34;,&#xA;      &#34;GDAkupnsjiTl71rwzH5RJg==&#34;,&#xA;      &#34;VEE7ccbKf4EH2dNVXOf2uA==&#34;,&#xA;      &#34;7jE4UN8ZNzWXfNDZ8BZq3Q==&#34;,&#xA;      &#34;DUP5ugYJi+iUbcfFxoSiig==&#34;,&#xA;      &#34;T8IbBnTK2Iv5YVT88l9ngQ==&#34;,&#xA;      &#34;J1cvee8xy6oZDEdA21dqEg==&#34;,&#xA;      &#34;8TL7OmwuwkB+6m9uO5u62g==&#34;,&#xA;      &#34;sxcy9NTxyeNn/j3K+DCTCQ==&#34;,&#xA;      &#34;k6D6o9qP1X41yPQlNQ8aww==&#34;,&#xA;      &#34;X4CDljJQJsftQ2RA57ftuw==&#34;,&#xA;      &#34;gFgnmTqhW1tr7jmOrXQQQQ==&#34;,&#xA;      &#34;XsxaedsaFYv/ys7GTRoUVw==&#34;,&#xA;      &#34;Ji6OY1u39nJByKzCNwfpIw==&#34;,&#xA;      &#34;1I7VtxkB33ashDX0kB4Teg==&#34;,&#xA;      &#34;+doAGgTwsE0iptDdCED/aA==&#34;,&#xA;      &#34;791CRjnt/pj2GXzRz2PiHg==&#34;,&#xA;      &#34;gx7w+mYZCEGlSNGIkO6bLQ==&#34;,&#xA;      &#34;3skSbDjTQ02+eNiFJz716g==&#34;,&#xA;      &#34;J6JEqF6+PkBwS7J9B0Lefw==&#34;,&#xA;      &#34;JvC/rVWSiuNeMXzeTDRZHQ==&#34;,&#xA;      &#34;nuFsbkH7VzW6LS3WLhSszA==&#34;,&#xA;      &#34;e1tWGyUIVU1QafO75am9CA==&#34;,&#xA;      &#34;lWxwCNVjYSW4SdS9h9uKvg==&#34;,&#xA;      &#34;GR80zW702W+xho6dTSNlyw==&#34;,&#xA;      &#34;MEP8FBVAfPt6fwJRFfcI5w==&#34;,&#xA;      &#34;+govv3Zh4UHQ+P7JiRlanw==&#34;,&#xA;      &#34;tk58DmpOzYRq2tA73Zt4KA==&#34;,&#xA;      &#34;2s0qmbyWNwDtt7UJcKOirQ==&#34;,&#xA;      &#34;dd3EQsCq/udXJ3yVefT72Q==&#34;,&#xA;      &#34;ECzeIHiPGDDmiEUQjBzFxg==&#34;,&#xA;      &#34;b8ZUCmMy8tFNcjKWAPWexQ==&#34;,&#xA;      &#34;3XIBdvUrBg0m5KBpdJCHaA==&#34;,&#xA;      &#34;CGXPj+Vc0sEcrUqgBw+BIQ==&#34;,&#xA;      &#34;ruEPtR2s2d2PTSaLwtf04g==&#34;,&#xA;      &#34;PWWEgCX9dooaG7K56MMKDg==&#34;,&#xA;      &#34;7FDf95fwOcyZ1YXNVDIx0A==&#34;,&#xA;      &#34;Fg8qijPO2mYzPczZJG7NiQ==&#34;,&#xA;      &#34;wN+C2Zg1myHVbcMR/36bqA==&#34;,&#xA;      &#34;6+AE2YxwD/sq8tw4nc1qGA==&#34;,&#xA;      &#34;LVK2sPVncIeKs9ALN+mPDg==&#34;,&#xA;      &#34;pGkOHCsusTyFHJ/G9JGXiA==&#34;,&#xA;      &#34;uOeAKP5ZyZtLLU7CjOuFcw==&#34;,&#xA;      &#34;IGjKj/4HsFqLB1NtljhGnQ==&#34;,&#xA;      &#34;5pINgBOJXOluBJi9rQyioQ==&#34;,&#xA;      &#34;3wYf+EaP3IAW5wHFWATuaw==&#34;,&#xA;      &#34;mQKKxdEERDHEVyOMhYExEw==&#34;,&#xA;      &#34;kiHPM08GilYyFXQYDbdefw==&#34;,&#xA;      &#34;0RLigWktH24pjgFtIwRH2A==&#34;,&#xA;      &#34;bhGWI9pwDmrdv65FPEeviA==&#34;,&#xA;      &#34;yzaTkDwqkUqRGFQFgsnIAA==&#34;,&#xA;      &#34;JMm3XklIA2t/hFi6HmAXVg==&#34;,&#xA;      &#34;wgjZroGG2ECX8FlIRRqZmw==&#34;,&#xA;      &#34;roGA0nQUzXWg+M1vb3jr3g==&#34;,&#xA;      &#34;xvZ+aaak6OxbCE7Nu46XhA==&#34;,&#xA;      &#34;ra+5M5K0yyS4TNorJBFVYw==&#34;,&#xA;      &#34;39KBEdrZX0FwGoQxYgkupQ==&#34;,&#xA;      &#34;mqxlcVJc3F4dPOTEtUve1Q==&#34;,&#xA;      &#34;GPyfUVX9W8Bmxm38kovI0g==&#34;,&#xA;      &#34;xDXpto7iDgv1dyFWeDEVcQ==&#34;,&#xA;      &#34;HT2SNCYX7dkF36jwcJ6tBg==&#34;,&#xA;      &#34;WxgHh2OQ1QuZWw68VI9xSg==&#34;,&#xA;      &#34;T1AEmBcJCa6ktci+apxdAg==&#34;,&#xA;      &#34;L1oZ+rWwTAdhKgF16l3EEA==&#34;,&#xA;      &#34;AYXw2VaylssI+NkH09HL4Q==&#34;,&#xA;      &#34;QZ7uKIt3KkZJfzRLCLWsIg==&#34;,&#xA;      &#34;4vS3iu8lvGukFpBFqYCdVg==&#34;,&#xA;      &#34;T0HgzMn5d4x2X74gH/2z+g==&#34;,&#xA;      &#34;tiE5Hgw3cKrNfJ9IvmRV7w==&#34;,&#xA;      &#34;f8p5x6K3g1RRQ6ZIljxpeQ==&#34;,&#xA;      &#34;ckmL8g+r8c1O3UTEaVeJgQ==&#34;,&#xA;      &#34;c1lEpxuKpeMWatR0F4jVaw==&#34;,&#xA;      &#34;IqAfwTRGJO3I/HkfDNLMoQ==&#34;,&#xA;      &#34;mNBwoKfe9sN/pVvuupOIpQ==&#34;,&#xA;      &#34;VAImfCoV0wqw11Rnggbqlw==&#34;,&#xA;      &#34;0E3jDwz9OiQ7ty2SI9zDYQ==&#34;,&#xA;      &#34;LBzBPjCNeeSOWXyc2o2hnQ==&#34;,&#xA;      &#34;plDQVm4QhCu9lfz3pQKBFw==&#34;,&#xA;      &#34;W38wbfyrQoe88ivLfgHXaA==&#34;,&#xA;      &#34;EXLHkqcreyuJdfrNBsxdNw==&#34;,&#xA;      &#34;scmQI6T6oitCtZW5973ovw==&#34;,&#xA;      &#34;chAsSpcJWTbOWxYZ5RrJ4A==&#34;,&#xA;      &#34;zBagx41pcIC7Z4HwA6qQbQ==&#34;,&#xA;      &#34;bN/37R0s8WD9IOTdf9jzwA==&#34;,&#xA;      &#34;wfyGNkRP1AKTpRqTPf0oQQ==&#34;,&#xA;      &#34;EHm3zJn0ztZtx1t/Qo6ngA==&#34;,&#xA;      &#34;iEtbVUUM9WmTLHwIzUrGAw==&#34;,&#xA;      &#34;52sJHqmx5ZJcw5GfZwVEvg==&#34;,&#xA;      &#34;PRErogcN/aXkh7DLlBPLlw==&#34;,&#xA;      &#34;JeQmbhDl7hbl+0rcJiCpWw==&#34;,&#xA;      &#34;viJWUTYaczSUI8knrOEDyQ==&#34;,&#xA;      &#34;OIti7hlc3vRNRODodvPE4A==&#34;,&#xA;      &#34;tVQs2LJzOpi0sAtiX4H2oQ==&#34;,&#xA;      &#34;IaNq7BGSUI5KW7kcB5RXdQ==&#34;,&#xA;      &#34;9HkrQyk+mvh4YcyBYw6eQg==&#34;,&#xA;      &#34;/IZs3BxM2p7QaA473aqOUw==&#34;,&#xA;      &#34;08D4UJe9dGHvq1NhH1rKXw==&#34;,&#xA;      &#34;ezIkXhK2r/dRH2KmSwBPeA==&#34;,&#xA;      &#34;ZxcJWoacxiKADUWqPITGyA==&#34;&#xA;    ],&#xA;    &#34;fTz/BbdjDg+PD+HvcMlQ3A==&#34;: [&#xA;      &#34;B6kRennXxnam4nW6s2O9mQ==&#34;,&#xA;      &#34;N7aJA9Ztt3v7MF1iEQ71dg==&#34;,&#xA;      &#34;UykJtPxmRiaRteAhKYbbOQ==&#34;,&#xA;      &#34;DSmpC9N7HZQbvi76icwCgw==&#34;,&#xA;      &#34;Bp0jmZLVDqekxjq/Mq7PPA==&#34;,&#xA;      &#34;B6Y4wCqGGirgAxQnKrzDxQ==&#34;,&#xA;      &#34;CVEVcsUTo53Dm1KwYASf/w==&#34;,&#xA;      &#34;7cqLG7sQEqqh9WoHfpekpw==&#34;,&#xA;      &#34;vfap0EiPsFnTW4GzZ53hcA==&#34;,&#xA;      &#34;l7gfVyLrNH9qcWdXdRt9Kg==&#34;,&#xA;      &#34;0mCcBHbOVq3mhrs5PZYNvA==&#34;,&#xA;      &#34;7MUqmqmB2hEWys43ktPpcQ==&#34;,&#xA;      &#34;obTTrP5oWTTgSGItpJqyKg==&#34;,&#xA;      &#34;HtyjDn7BTHlrC40bO1Itjw==&#34;,&#xA;      &#34;L0CRHbX1682QNRh65eVCrA==&#34;,&#xA;      &#34;isT7miwloz6n/DNr9N8lHA==&#34;,&#xA;      &#34;EwaSk27OsoNLQFoZ6FCsfw==&#34;,&#xA;      &#34;oucbqlkzMDMKcvhtL5s8bg==&#34;,&#xA;      &#34;xsiKeHcIwwzMLDEPFdNSFQ==&#34;,&#xA;      &#34;7gOP9DIpChjY4waX+o9WXg==&#34;,&#xA;      &#34;NWqPMtB06drZmdGhOgqvEA==&#34;,&#xA;      &#34;Ko362Be/IvWvKgd5medxJw==&#34;,&#xA;      &#34;CV6bnIgwQPKblPGXrSplMA==&#34;,&#xA;      &#34;/SEhubz8W4ZKbKg2+yh86Q==&#34;,&#xA;      &#34;NObEgWpn6tAdrn33X3GoKw==&#34;,&#xA;      &#34;D2CamKwAHk5K+VusEH9d7Q==&#34;,&#xA;      &#34;EFfUhTiwNATI8s7BT2T3xA==&#34;,&#xA;      &#34;YHFFhFpG8nzfxX1O469onQ==&#34;,&#xA;      &#34;hJqH5PsFQ03HT/LzTwaCXA==&#34;,&#xA;      &#34;uJpX1i+k36BH7BSmiGPDBQ==&#34;,&#xA;      &#34;zYJDi0K0bIQE0iPOdJilbQ==&#34;,&#xA;      &#34;haYiiYG8S+76vEnaF2JX0g==&#34;,&#xA;      &#34;rPECjFpzDOL0Nn2WUSH6yg==&#34;,&#xA;      &#34;OlhZuHzjnGJlFRoEEZLvZw==&#34;,&#xA;      &#34;BLPjiJKh0zrGI5mH+bPIGw==&#34;,&#xA;      &#34;Sw8bDdvvxQW2LmbjS6B1hg==&#34;,&#xA;      &#34;Bo7awcYyKS5mr2PoscvH4g==&#34;,&#xA;      &#34;WHLXl098SguAfGDl/9SUeQ==&#34;,&#xA;      &#34;Es53GFQ6IFbSLBefLkbOEQ==&#34;,&#xA;      &#34;BbiEB28Kb+GaQAOEIfj+qQ==&#34;,&#xA;      &#34;7bYXVEfvDWEIL53s8ARxGg==&#34;,&#xA;      &#34;UcSRaJxHOHBFxbLpeEwTSA==&#34;,&#xA;      &#34;p5Ki7Z96ChbT07EZ4WnnKg==&#34;,&#xA;      &#34;ltoIfsso65jjPxRqV9UMRw==&#34;,&#xA;      &#34;ERpg5QsiyVdbxyySZngvaA==&#34;,&#xA;      &#34;EhcxS6FJz0RDq0+uuwuiEA==&#34;,&#xA;      &#34;peuiWx2cfvlg0ej3db5p4Q==&#34;,&#xA;      &#34;+YVz742I3o3v3ix+O1wb3g==&#34;,&#xA;      &#34;YPUY4Y/POEizUQSOdGH26g==&#34;,&#xA;      &#34;EhgsZTFIUAr2YMmtGzoFMQ==&#34;,&#xA;      &#34;LczpEojKeJQxs4tAiPNubw==&#34;,&#xA;      &#34;nS4rhARAcjvkSY8dJUFdOA==&#34;,&#xA;      &#34;y2mXLQnvQEY7S/5iFBq5VQ==&#34;,&#xA;      &#34;Hv5r2lArsZsqnS0cLJ2sfw==&#34;,&#xA;      &#34;U06t0kkLaLeKpn0QxtZUSg==&#34;,&#xA;      &#34;cgUuYY1sKP0jeDPr/wEn4w==&#34;,&#xA;      &#34;Q/06Mcx6TVo+ZKk4ymf7TA==&#34;,&#xA;      &#34;nVgNlf1p1N8UKAkTllJrCA==&#34;,&#xA;      &#34;QX/cK7dAcSVwXa3qFcSUeQ==&#34;,&#xA;      &#34;7czTMSwqOjLz2LigIYHAeg==&#34;,&#xA;      &#34;fyE+IA6J77V4hC6QL4QCJQ==&#34;,&#xA;      &#34;GVpKc+ySNcDAOMrSpk+5bQ==&#34;,&#xA;      &#34;LmpJ6GJi47QcNT9dtXcmiA==&#34;,&#xA;      &#34;g2+VTeiFdddqhRpToXK2Vw==&#34;,&#xA;      &#34;sVTwqtGyRA8GgZdyQgXnqw==&#34;,&#xA;      &#34;l8z3hCmcLYlZgxzha0zw+g==&#34;,&#xA;      &#34;Zv+LSqi94387CYLrb5PiCw==&#34;,&#xA;      &#34;9R8nFX27y8SI3yR7d7vH5A==&#34;,&#xA;      &#34;du8AOXnNlQgdqsSZceyiaQ==&#34;,&#xA;      &#34;DG5z7r6LqnKlVNwHAxeXgA==&#34;,&#xA;      &#34;Zc9mVAa+SgrDGA78Zo8GIg==&#34;,&#xA;      &#34;9/6RhDAFXPVo7L6QeEsy9w==&#34;,&#xA;      &#34;rwX0WRiXvDcxdTv5pslgxw==&#34;,&#xA;      &#34;gg092DB69lXLcZyDPZ/RtQ==&#34;,&#xA;      &#34;+dqw6lT9TwTTzMp6O2vf1w==&#34;,&#xA;      &#34;S2kC/8+NtHD0EdQuoPqXlg==&#34;,&#xA;      &#34;Vl7X+IopOqzOWh1MyUOYCw==&#34;,&#xA;      &#34;aGi0xIYQeGr5qYFMFsAN2w==&#34;,&#xA;      &#34;qcGz8bluItM475eimPK89w==&#34;,&#xA;      &#34;gNlF6/GdqE8VbQCfjdB0tg==&#34;,&#xA;      &#34;rDRtTk3Xuv5MlaUi1WKGpA==&#34;,&#xA;      &#34;7df4FOgRU0BSF6P5QJkjaQ==&#34;,&#xA;      &#34;YHdZ6rml8dKQg9XmpjCrnw==&#34;,&#xA;      &#34;AfEBBMV7R48kk4frVmVcAg==&#34;,&#xA;      &#34;sx5ziSZauoyjmcMB827V/Q==&#34;&#xA;    ],&#xA;    &#34;hGxLNL3q3tYYzz2uKfKB4A==&#34;: [&#xA;      &#34;1geoBO6lBMXVRM+dfApwgw==&#34;,&#xA;      &#34;iYahLjRBvYk4Zq4Nz9JtHg==&#34;,&#xA;      &#34;KHHIjt6Egtc7csaIbQ3mbw==&#34;,&#xA;      &#34;Hk8k4qPIhaJI1mipqA9iiw==&#34;,&#xA;      &#34;xh8zszQflFXgahc/vYUUWQ==&#34;,&#xA;      &#34;rG5ADP3EQcz3Qvp36Lywxw==&#34;,&#xA;      &#34;0EZfEnxlowgJ1Et69rh7Fg==&#34;,&#xA;      &#34;Aspz79uO5bKpApwSqMsL8A==&#34;,&#xA;      &#34;TrfUjn7Hi6JPe4l/9tuyAQ==&#34;,&#xA;      &#34;DKQ/Jfye0O77T1m4bCFM9A==&#34;,&#xA;      &#34;te0mQBJAxCZ9Xzg2xrzQcg==&#34;,&#xA;      &#34;f6muqKqBGKMbn75htgvMLQ==&#34;,&#xA;      &#34;Zx7E5aKvS5JXoyQSS0VOKg==&#34;,&#xA;      &#34;N4tVXpSdUCCcisq1+6WN4w==&#34;,&#xA;      &#34;v/fIHXRO37U49Wniv4Yhsg==&#34;,&#xA;      &#34;5xY3IHUogqpqvbFwiQURyA==&#34;,&#xA;      &#34;wTqPXpGv5suIYx7xVHwxzw==&#34;,&#xA;      &#34;RJziShukaon2ShF1sKdneQ==&#34;,&#xA;      &#34;PDkkYuYRnbObAyDWKDapig==&#34;,&#xA;      &#34;/F62/Gd7cIE4aLRbxVnfCA==&#34;,&#xA;      &#34;ldTn/Q3i3BpKZ95U4mfrcQ==&#34;,&#xA;      &#34;J3RGaCFhZHnCvtta/VAJIw==&#34;,&#xA;      &#34;JDKdFwYwkAoUNrTYp3XIYA==&#34;,&#xA;      &#34;a/YI2nxM2FSL9LuqLWCJ1A==&#34;,&#xA;      &#34;Ovx/FK8kd+H6TytgRdsBFA==&#34;,&#xA;      &#34;iRRK+UGfH5YqM+4LOHExpQ==&#34;&#xA;    ],&#xA;    &#34;hHL/OokyETnopazrev0shg==&#34;: [&#xA;      &#34;OtUtUn02ewCzaijseyEVUA==&#34;,&#xA;      &#34;u6PjuomLq+nVKrTw/0Jyeg==&#34;&#xA;    ],&#xA;    &#34;hNv7ol5w6PGaZXktwlRWPg==&#34;: [&#xA;      &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;      &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;&#xA;    ],&#xA;    &#34;hasHd85qN7fkJeIIqjjDow==&#34;: [&#xA;      &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;      &#34;92O2+eS3W5hGvsWPMPwTRQ==&#34;,&#xA;      &#34;FecDYUjbiWlU3PuXl5vs5w==&#34;&#xA;    ],&#xA;    &#34;hvKbzRSMjrg1f3y/PRzGwg==&#34;: [&#xA;      &#34;pEwkPeffucbY50JSGQdERQ==&#34;,&#xA;      &#34;Zn86UzCNWJIJ8FVaY91JYg==&#34;,&#xA;      &#34;Z1WcJp/m0RHVikTcp3uRKA==&#34;,&#xA;      &#34;+hNDIOxLd94c7zDMEtwHAQ==&#34;,&#xA;      &#34;FwvyPIBVlE1fAIgwJ1H6Sw==&#34;,&#xA;      &#34;gC8lb/CZmVxLK6PkYWC9cw==&#34;,&#xA;      &#34;Zk3m2J10w4VuwKsJJMXB2Q==&#34;,&#xA;      &#34;nAVorfcFz0ZcWPmPpZfMtg==&#34;,&#xA;      &#34;31lRdk8cNY+AWoLVxQqBUw==&#34;,&#xA;      &#34;eUkddiaCaFnfKmT+Sa6bPg==&#34;,&#xA;      &#34;NQ+dtAZLrUPoMA29mi1Odg==&#34;,&#xA;      &#34;VVUozaap6uAAqX8QCLFGyg==&#34;,&#xA;      &#34;by27tPFgbmYSIGNVHDyy/w==&#34;,&#xA;      &#34;z1fiDjJjV7T+4MZClzquUA==&#34;,&#xA;      &#34;+KQdB1idGjEGKH9of9v/Ew==&#34;,&#xA;      &#34;IDDFCE+x3YM7koS2SvW5fA==&#34;,&#xA;      &#34;McWWD4LMk3xYwv1KCFcOEQ==&#34;,&#xA;      &#34;X7vlygSvbngQQIjU19VnZQ==&#34;,&#xA;      &#34;I53ZVLR4IycE9d0CU5r5nA==&#34;,&#xA;      &#34;vLLr24Ej4L78gTG08XYkRg==&#34;,&#xA;      &#34;7y5jXLyua18Srex9lNrfkQ==&#34;,&#xA;      &#34;LAdEFhGjw+B+5uRqObeXiQ==&#34;,&#xA;      &#34;nGijNEIOx4yiwRd2hN0uZA==&#34;,&#xA;      &#34;mwpgk/i3GXoSJDpblt44zg==&#34;,&#xA;      &#34;R+49XKdX2qOOaoykdLSbyw==&#34;,&#xA;      &#34;mSEMDfE7dS8a+RoMfkjqhg==&#34;,&#xA;      &#34;WFXV6zzHKCX8JuqtokClVw==&#34;,&#xA;      &#34;NuCOPhrrauNCWs3jqnDA1A==&#34;,&#xA;      &#34;Rz0KcMyzx8GC2p+YUZpHPQ==&#34;,&#xA;      &#34;HqbYURF/7TaXoQPMqtdsIA==&#34;,&#xA;      &#34;CYkHBvLQQf6RYY/2Qkr5gw==&#34;,&#xA;      &#34;WVPPqMDSvwuthc5RexsDjg==&#34;,&#xA;      &#34;XPiYSctd10AtrHxx1Yivlw==&#34;,&#xA;      &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;      &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;      &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;      &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;      &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;      &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;      &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;      &#34;5BksN0izCeDRrtFMsNCyvg==&#34;,&#xA;      &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;      &#34;Qr2/3ufYTxjXiJuEKM7I7w==&#34;,&#xA;      &#34;T38zlL6BTag6EVZfMAMcaw==&#34;,&#xA;      &#34;2Jpm8Zc5oiON+VhscwC/4w==&#34;,&#xA;      &#34;jlm8MnE+Ua07hmnpXd564A==&#34;,&#xA;      &#34;JVp8gcuEEeRLeKprUvrBUg==&#34;,&#xA;      &#34;6XzckJlhvkdWwkN1ERVdzg==&#34;,&#xA;      &#34;oEKqq2GIVwWjorWJihmJiw==&#34;,&#xA;      &#34;lAFNCmDlAVSKGu2gqmWvBw==&#34;,&#xA;      &#34;/VvBaUxAqtfTsAgPes9bAA==&#34;,&#xA;      &#34;6+TrxTb+GrNbsX7xQgQW9Q==&#34;,&#xA;      &#34;J+a2wc6cR5fLyNj39ghgVg==&#34;,&#xA;      &#34;NW78+g0sKpejEre7I2lCOA==&#34;,&#xA;      &#34;gPjSjC7XxsCvs5w6EQPViQ==&#34;,&#xA;      &#34;f+wdQFOhBCEFYs6UTbgVcw==&#34;,&#xA;      &#34;041SU8x5Wrw6mRfaRurHIg==&#34;,&#xA;      &#34;hnVuaDEhxbGffMCkOiTy1A==&#34;,&#xA;      &#34;/h81Nr0GSz2fO9zGO8rpYw==&#34;,&#xA;      &#34;KFwkHKkJGVyJAn2RsW13sw==&#34;,&#xA;      &#34;WhQSrxicq09HlEU8PxUQSQ==&#34;,&#xA;      &#34;Z707rrfU/uxs1xujVpKMRA==&#34;,&#xA;      &#34;DIXgPb+QqAbL75dH7f2Zww==&#34;,&#xA;      &#34;V8n5VKFkjNZwkLq+W6E59g==&#34;,&#xA;      &#34;WhY0uvyUG/ImjnbaewZftw==&#34;,&#xA;      &#34;j/6W06GHqfn2irJJ7LDKTQ==&#34;,&#xA;      &#34;mESXtMr2XIcnFGpdxMD0iA==&#34;,&#xA;      &#34;Py++HyN8+aNZZa9dPe2rDQ==&#34;,&#xA;      &#34;ueWEd2PE6kwBx153FL1eIA==&#34;,&#xA;      &#34;269Lb6JhyjdTwif2gzpsMQ==&#34;,&#xA;      &#34;gaDJ+6UMi8jegvsDECsoeg==&#34;,&#xA;      &#34;UiO8eKIdcPJIKIj94tK4ug==&#34;,&#xA;      &#34;CQXGvG5qF0LSGK3lgLUXJg==&#34;,&#xA;      &#34;fu2viInfwA1Zq9LmALUkzg==&#34;,&#xA;      &#34;pzONVbRfZmj1lkGaWtUucQ==&#34;&#xA;    ],&#xA;    &#34;i1yNGcAdCbK2SnebCgMUqQ==&#34;: [&#xA;      &#34;I9Xc2JiRiPWfOFS5AHY1Ww==&#34;,&#xA;      &#34;gg6QYPBlPoN8zpwNyr7x6w==&#34;,&#xA;      &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;,&#xA;      &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;      &#34;pN9L6/wRgu21CuY/FfnkIA==&#34;,&#xA;      &#34;ki2PMarj2WoMKDbw3+XV3A==&#34;,&#xA;      &#34;QSP4YGVknCXnnhDrDAxftg==&#34;&#xA;    ],&#xA;    &#34;iBA/JBMmSIEGbBZDQlcuUQ==&#34;: [&#xA;      &#34;xNJWUdryH0nBQB/93HRNuw==&#34;,&#xA;      &#34;hfVFht+buqTExOEVhwr1xQ==&#34;&#xA;    ],&#xA;    &#34;iQnKl0+RxymKc9bhVdyuyQ==&#34;: [&#xA;      &#34;zFZE1hLph4hR8T7aNvRt0w==&#34;,&#xA;      &#34;FM2lHn17qlO5uIZtM+Ehmg==&#34;&#xA;    ],&#xA;    &#34;jADxtb7PiatU9dihVhjp/Q==&#34;: [&#xA;      &#34;XW4X9/W6MfETfE/VICA4Jw==&#34;,&#xA;      &#34;fSeU4QTAs+fY+ihLpgdM9A==&#34;,&#xA;      &#34;R1x4adkbkgVhxc9hzgUZcA==&#34;,&#xA;      &#34;n39YhRffL6tFFAy/S18A8Q==&#34;&#xA;    ],&#xA;    &#34;jSOT/FBECA7xUY+Zv/Ps+Q==&#34;: [&#xA;      &#34;sxxGu02J6Xp0UskX/yPO4w==&#34;,&#xA;      &#34;dwNH2KaulTKNFX+9quNpvw==&#34;,&#xA;      &#34;R7XEe59RfqPZwHJmDbOyww==&#34;,&#xA;      &#34;eTM7aUBt48fzJjd2YY1Kaw==&#34;,&#xA;      &#34;6PfMuZGMOADiSo4Ifx0/Qw==&#34;,&#xA;      &#34;+Hel9A1WiSK+ZclItesXnQ==&#34;&#xA;    ],&#xA;    &#34;kAc8BYCjeCgQR9YdLeGx9w==&#34;: [&#xA;      &#34;i1iqh+iGOleBv5v21I50xw==&#34;,&#xA;      &#34;bJGGlc8FG/c2T93ktUh6Ig==&#34;,&#xA;      &#34;LiT2UIJJCX7RQxuKZd5BaQ==&#34;,&#xA;      &#34;YdpqbsRbo4xx71CiWUF39Q==&#34;,&#xA;      &#34;kEe4Kuw3hXrzhJ/JDjR7wg==&#34;,&#xA;      &#34;8zIRit7VqNRaBPLxL/+VAg==&#34;&#xA;    ],&#xA;    &#34;kMrprdB/TspYL2Dyt9hBfw==&#34;: [&#xA;      &#34;nbtTb8L4YMUxpajoNaatQg==&#34;,&#xA;      &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;      &#34;qdWe9wwJNQD9uM1J1li1Vg==&#34;&#xA;    ],&#xA;    &#34;kdml4TiffKDDUHJjP7R1Tg==&#34;: [&#xA;      &#34;d/522T+B/ARMNSG+3QfAWA==&#34;&#xA;    ],&#xA;    &#34;ki6pd/LsWsx2BY6b+Np6dQ==&#34;: [&#xA;      &#34;CacO7saUr+KLTbynVQRYzg==&#34;,&#xA;      &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;      &#34;I3Zso12Z+9mUcVEvUKWJ8w==&#34;&#xA;    ],&#xA;    &#34;ktHjHCegyaFGFLaqVjqkVA==&#34;: [&#xA;      &#34;cbNKZbfbJhPfPLHi6va27w==&#34;,&#xA;      &#34;TEg+H5IUFEuL8/4VudXtEg==&#34;,&#xA;      &#34;ugk8bc5JAs//Hgj923HTXA==&#34;,&#xA;      &#34;/rGrv6ID1FHztWkSNUU0Yw==&#34;,&#xA;      &#34;todSxpG0ADSu6dX8ZW+q4A==&#34;,&#xA;      &#34;B/+SfhbeumQponnHheNEVg==&#34;&#xA;    ],&#xA;    &#34;kzHnWWgcRX/Do32aQ8TMBQ==&#34;: [&#xA;      &#34;8QRmG/+fMsQQzP2maaxOag==&#34;,&#xA;      &#34;ZNESegZx5Vgpkv3OXwE5Cw==&#34;,&#xA;      &#34;Mv7iQu0SgLhcoLH3nS/HZw==&#34;,&#xA;      &#34;vPDXRcEg4abq9PCqTBFkAg==&#34;,&#xA;      &#34;dWdVOD7SorvI9CNble8XGw==&#34;,&#xA;      &#34;uILMvGS6obqeMj18FLYSbg==&#34;,&#xA;      &#34;+wnQC0tYj+uyZzMNgN2bcw==&#34;,&#xA;      &#34;AdhtRMEnBdpFFyeSlUP6fA==&#34;,&#xA;      &#34;4comqU/5SRuDKC1qqBMlGQ==&#34;,&#xA;      &#34;PPWqABLxfDDxZRPH4wfL9g==&#34;,&#xA;      &#34;Ojd6gfhf5HOGBRFGRWmKOg==&#34;,&#xA;      &#34;noShzkxXeZ6xaXHAA8su4g==&#34;,&#xA;      &#34;I2w7mAdeccRvDV/HeaBOoA==&#34;,&#xA;      &#34;QTcHwvmTXpVKkHS0xdfb9g==&#34;,&#xA;      &#34;vnQE6sVVricZrrWA9Xv5RQ==&#34;,&#xA;      &#34;6tML+4g9GkMhdrrSDsX4Zw==&#34;,&#xA;      &#34;MGoFQMcsriBEPanvv9LYcQ==&#34;,&#xA;      &#34;SmczXqxeZRCcJykxG3Abrg==&#34;,&#xA;      &#34;H8XwHNDIkW12mW+y74dsdQ==&#34;,&#xA;      &#34;Q2EySKz2roj2mYOhGJQA3A==&#34;,&#xA;      &#34;O+a4984RTSUBIVVJsZTw1A==&#34;,&#xA;      &#34;kkxgUCDqJw1GL8dK+Je2RA==&#34;,&#xA;      &#34;KXAIwMyIqS4MKyyyosxjhw==&#34;&#xA;    ],&#xA;    &#34;lITnNJqHTfcVQiCGHjWozA==&#34;: [&#xA;      &#34;ScOp6HuJxBp54FxFpTVDnA==&#34;,&#xA;      &#34;TsVNXuAeF3PhiRZhIOjjtQ==&#34;,&#xA;      &#34;DtkRUkQTzcJrj8ZsC36kqQ==&#34;,&#xA;      &#34;gpPTgXxcA95Uk2vaf3/2dw==&#34;,&#xA;      &#34;jGwIyHTli8TFB8vvlYRLgQ==&#34;,&#xA;      &#34;o16kBwzDyL2DXuhbCPWX9Q==&#34;&#xA;    ],&#xA;    &#34;lwkb5oxxrG7ZgPYzSyvcZQ==&#34;: [&#xA;      &#34;Daj39cn0p5rpBblQYRpPNw==&#34;,&#xA;      &#34;9uo4qIbgVv97/yzslhE6/g==&#34;,&#xA;      &#34;EhGXJy3ul8A4j+8SbzYCkw==&#34;,&#xA;      &#34;uW/TgHSIKlO53BnXG1YZSA==&#34;,&#xA;      &#34;yNIngFjcdt+ETIv0YvW+4Q==&#34;,&#xA;      &#34;BXlYoXrAW947O+Adruh7Zw==&#34;,&#xA;      &#34;uFR2NXYHCgkD0jUkHBTh3g==&#34;,&#xA;      &#34;PJ/Blkuxb9rGhjSw0f3NrA==&#34;,&#xA;      &#34;jDj44frt+6TCj0cwExt14w==&#34;,&#xA;      &#34;xNOfe6PszfMbCxNEPk4FCg==&#34;,&#xA;      &#34;CYbzKTdqzfhVDluEF23Dxg==&#34;,&#xA;      &#34;n78TtR5pw5YtOwMk7gVGmg==&#34;,&#xA;      &#34;WHMzYQNPFNnp30WX8W+gnw==&#34;,&#xA;      &#34;5Prc3wgX2qu0EaSsAQiCqw==&#34;,&#xA;      &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;,&#xA;      &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;,&#xA;      &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;,&#xA;      &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;,&#xA;      &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;,&#xA;      &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;,&#xA;      &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;,&#xA;      &#34;u0cs09LPRVEEfen4PHM6gA==&#34;,&#xA;      &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;,&#xA;      &#34;pg+SRV3v3Mv4Yg+0x76+jg==&#34;,&#xA;      &#34;YfE+7ocdRscmJ75uekg0tA==&#34;,&#xA;      &#34;LTbAvxPwXv/MF/Dqg/sWFw==&#34;,&#xA;      &#34;qPGxfT+FyuMifHo1C/aY6w==&#34;,&#xA;      &#34;tKVE3VH+DixxL49Cbeit6Q==&#34;,&#xA;      &#34;J1MkSCEBivWCQoYUEvHXOw==&#34;,&#xA;      &#34;6E1YTgmxENPqo7FirtVNvw==&#34;,&#xA;      &#34;32PT0J5usgv3laBJ37g1fA==&#34;,&#xA;      &#34;S9GgHs7lpMPNDjvswObhPg==&#34;,&#xA;      &#34;b9Kb4WNexa+E+t+B4ZpfRA==&#34;,&#xA;      &#34;dr+z30s3mVMvpF2iMBJ7YA==&#34;,&#xA;      &#34;eKKwwoH894W3Vae5kYCKtA==&#34;,&#xA;      &#34;fLtdaHqvu72qO520MbPg/A==&#34;,&#xA;      &#34;ETHiyyNutSsXU1p7nfcRIA==&#34;&#xA;    ],&#xA;    &#34;lxyER9sFQyH/cLua8fAlfw==&#34;: [&#xA;      &#34;p2+Y5XRhYt7mgZ7H+35S0w==&#34;,&#xA;      &#34;/MWzwBJlhhNbF+zp0zgq+A==&#34;&#xA;    ],&#xA;    &#34;ly9SmBBH7WsYXh1oG69XaQ==&#34;: [&#xA;      &#34;G/EKAYKB/V29JLdsy1wFCA==&#34;&#xA;    ],&#xA;    &#34;mLZQEF4KLS62c+8BB/jz0Q==&#34;: [&#xA;      &#34;Q1F3DVZZ3gpMNQT3yhbiSg==&#34;,&#xA;      &#34;C7VuSVoDHe6g3ERpzwYLFg==&#34;,&#xA;      &#34;i6aHe7Qjo768bvS9xSorFw==&#34;,&#xA;      &#34;v+qPraJNH1peMhjiTk1OgA==&#34;,&#xA;      &#34;fBIyxzoMf4PtxmiD953WFg==&#34;,&#xA;      &#34;8dqpgv7n5GVlIYVt/hP0Gg==&#34;&#xA;    ],&#xA;    &#34;mLtyJkgiain09bfdUDF0tA==&#34;: [&#xA;      &#34;4aR9t5J6YwMk5D9wZ0BV7w==&#34;&#xA;    ],&#xA;    &#34;mRRefE/Wm2s5CZDmwUJ8jg==&#34;: [&#xA;      &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;&#xA;    ],&#xA;    &#34;mS/mU0XqXurt5b2cC0G2wA==&#34;: [&#xA;      &#34;tW4ew6Bpf68YpYbdwMyYGA==&#34;,&#xA;      &#34;sgKxepKQb+uxgfzzrcWS7w==&#34;&#xA;    ],&#xA;    &#34;me8N6gnEhOLccvD/431aCw==&#34;: [&#xA;      &#34;sna4IH0E1Ui1jpzpKgnFOg==&#34;,&#xA;      &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;      &#34;bDMsFO9+dr7IgrwHxKJ/2g==&#34;&#xA;    ],&#xA;    &#34;mqd6XOc7hJ7OKe7FI62YlA==&#34;: [&#xA;      &#34;a5tv38r7RoeoKCznzGbyPQ==&#34;,&#xA;      &#34;8WJdLrW8n72AHCvZK8pH9w==&#34;&#xA;    ],&#xA;    &#34;n2BikwI3Mg2dIr4kYK8New==&#34;: [&#xA;      &#34;j7yoSCks+i8LevHtgFwCwQ==&#34;&#xA;    ],&#xA;    &#34;nC22unSxVi1R4g6taYLM9Q==&#34;: [&#xA;      &#34;vyA1wlYQO8dho14dAhrP+g==&#34;,&#xA;      &#34;1cpz1Hzz2hsR9fx5YrxP3g==&#34;&#xA;    ],&#xA;    &#34;nRx5HCyZ2M4L1LvJSclibw==&#34;: [&#xA;      &#34;vSLFgRYoehmDve19rxyjcw==&#34;,&#xA;      &#34;gOogxiWB/WP4jrEWNQnPXA==&#34;,&#xA;      &#34;6GILJqctNxTbZFPR6fLtoA==&#34;,&#xA;      &#34;2vdCDySzHer9qKv7EOUGqQ==&#34;,&#xA;      &#34;nF1VC5iJhTtrDBwL8mfOiw==&#34;,&#xA;      &#34;SdlHZBjfHlAbNa/I1YXwQA==&#34;,&#xA;      &#34;Mrux1XY1LZVvkWuUp2MCHQ==&#34;,&#xA;      &#34;D5TjVz7ghGYgdoVa5+N8bw==&#34;,&#xA;      &#34;fKSzg5ZVW35n1QRKSQYbUA==&#34;,&#xA;      &#34;TAntNn3gBlGhX3mRHNXfWw==&#34;,&#xA;      &#34;r105o04EqvvFDoXWzu0UAQ==&#34;,&#xA;      &#34;jZXEa4mdIQd85t4aOIhsfA==&#34;,&#xA;      &#34;Ft+9wGiX7gFQHYNS5do1oA==&#34;&#xA;    ],&#xA;    &#34;nUBBsXgA+QSl6Tx9eXi6Mw==&#34;: [&#xA;      &#34;DqajPgSmNnfF5+bVSuLXZQ==&#34;,&#xA;      &#34;NVw9L7wf5CkACfCMTn/ArA==&#34;&#xA;    ],&#xA;    &#34;noZz3cbDBX3Q1ohSWIKe1g==&#34;: [&#xA;      &#34;pBJCL45M2NleSRKXAGAPTw==&#34;,&#xA;      &#34;6J86dffyd+kQEKbjTTbD2Q==&#34;,&#xA;      &#34;q4W6wpO2YbOLS87LUXPVBw==&#34;,&#xA;      &#34;TNb7OrRxFn2Bis7zp2oi8A==&#34;,&#xA;      &#34;uFXEnN9gepJ4+HtQWdLrOg==&#34;,&#xA;      &#34;qMBdcJlDiWOfl15fflzyow==&#34;,&#xA;      &#34;abYhvv2PIAbu240JiMWauA==&#34;,&#xA;      &#34;GuM8+Ku1VtBzfPk3/FCgzw==&#34;,&#xA;      &#34;0u2Zo3eZYFAXhVSIZh+vXQ==&#34;,&#xA;      &#34;KC4H6WRPkYrWvXb9OC+odg==&#34;,&#xA;      &#34;Ihq7mkhGM9sf/8QM05o7gw==&#34;,&#xA;      &#34;Ub9JoNToSyT09hD5MOIlGA==&#34;,&#xA;      &#34;uglqkYqbcsDd4SCu9NI2Ww==&#34;,&#xA;      &#34;+o9j0Llb6+ISl2S6vmkRkQ==&#34;,&#xA;      &#34;FAgeMhGaGcH9QOhQHw5rhQ==&#34;,&#xA;      &#34;vz18/+7m2wxxY2NMQUQ6Yg==&#34;,&#xA;      &#34;tEG4S6zEddB/Fl32LgLV+A==&#34;,&#xA;      &#34;4K4SQ2PlDqXihbvwEXiB/w==&#34;,&#xA;      &#34;CCQ15lzJdM5OqfQf0dLnJQ==&#34;,&#xA;      &#34;AOVkipVLZLxGjwVCB/7mwg==&#34;,&#xA;      &#34;NDTeUbmjAj/XEHx68pTD9A==&#34;,&#xA;      &#34;2t1KBK7sA8rKgVHavF6SZA==&#34;,&#xA;      &#34;EpmDyksRTsldGi5rxDcMlA==&#34;,&#xA;      &#34;cw4W3PskPKPJZy+QzFk5bA==&#34;,&#xA;      &#34;iJ/65EjB0RUIoiFFN5HgAw==&#34;,&#xA;      &#34;k/2DvTn2KLL28Yuh/WFLmw==&#34;,&#xA;      &#34;DPcSz1MBKzyaMMMhJWVyEA==&#34;,&#xA;      &#34;i+IfpRQo89HWL/sPRoOFsw==&#34;,&#xA;      &#34;3f5N5l71YgnMV/U9whrIuA==&#34;,&#xA;      &#34;4n9Ikrh9k/dcuFfUsd+cxQ==&#34;,&#xA;      &#34;NAN7p79skZ+eBA0xQMnnqw==&#34;,&#xA;      &#34;RxmnlWamNxvphCIuarducQ==&#34;,&#xA;      &#34;zwpNi+NBoVUfQ5Ed4vkNug==&#34;,&#xA;      &#34;cbSiFirRdrVkpUeOLy/CjA==&#34;,&#xA;      &#34;hinEteXkZ2xZbWF5lSQDEw==&#34;,&#xA;      &#34;aUFq3vh1h0/30jIMgLEGbg==&#34;,&#xA;      &#34;GwdBWjTMLLj14UbkCrmh/A==&#34;,&#xA;      &#34;o94cfzaEslnrzBtYm19DkA==&#34;,&#xA;      &#34;TCtup4kp9cBGgmnLMbI+rw==&#34;,&#xA;      &#34;vWwpCPVTGndMb9IraxXgGg==&#34;,&#xA;      &#34;0nQVynV3NMmwash6dBc+8Q==&#34;,&#xA;      &#34;xjE2Ua1GOmdwVi+xIIGVeQ==&#34;,&#xA;      &#34;eaW+XnaOzUpP/JmOZv+wCg==&#34;,&#xA;      &#34;SduSwzmffGiGJfqQDrSyEA==&#34;,&#xA;      &#34;QNrS4atSfp1tFVuWE/Cnqg==&#34;,&#xA;      &#34;kRqkfuoNHXgeW9vp8iyzQw==&#34;,&#xA;      &#34;AEXyQvL2wFfW+v4I9XmTaQ==&#34;,&#xA;      &#34;obSzOBXxlQxURPk04eb+8Q==&#34;,&#xA;      &#34;CrxvMdhOPgYpnOjfUKfH3Q==&#34;,&#xA;      &#34;EVXEAewBnzdtEIOYHBpZfA==&#34;,&#xA;      &#34;eeetX6Vv3iXNMfmjNIPkQg==&#34;,&#xA;      &#34;I5CKvoKqBhFd1vY7fxFKtQ==&#34;,&#xA;      &#34;rm3fF4UjNztR1JpYwTPaVg==&#34;,&#xA;      &#34;PwX0RLPO5W1w6VDjSgcV8A==&#34;,&#xA;      &#34;/U8Jx7SKI9t4H3q4Xm/KEQ==&#34;,&#xA;      &#34;YVYIQ/H++AefhUYldlykPg==&#34;&#xA;    ],&#xA;    &#34;nwgNWiqPWTP9jQpHdB8CFA==&#34;: [&#xA;      &#34;c/EuG5G0xeL87UQs3yxxqQ==&#34;&#xA;    ],&#xA;    &#34;o0sNxhdrQvn3LtgSlydcdw==&#34;: [&#xA;      &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;    ],&#xA;    &#34;o3loazzxvm2hQ5N1QRaYvg==&#34;: [&#xA;      &#34;5K1UAD5Q5lqCB0j11S6DcA==&#34;,&#xA;      &#34;VDqplxSZcK9CHQ9RjGiEqQ==&#34;,&#xA;      &#34;FTUrLe1XMNYvUzaxMdsWeQ==&#34;,&#xA;      &#34;c0R7sQMFyTIRhp8ZTCTmlw==&#34;,&#xA;      &#34;U2w6LmoqKmaGSd6IxLZGKg==&#34;,&#xA;      &#34;eXNCnm2O3ulyDBrjgqgngA==&#34;,&#xA;      &#34;TFku8MBahkkWbmKYS7dbIQ==&#34;,&#xA;      &#34;PrCrIesi0sSvMQjPpvxecw==&#34;,&#xA;      &#34;klH60uFrR0WkawaSlcOEKg==&#34;,&#xA;      &#34;e0VfCD1REapdkagkByCnXQ==&#34;,&#xA;      &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;,&#xA;      &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;,&#xA;      &#34;svCt47J2Zwa45xj8gn3U/w==&#34;,&#xA;      &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;,&#xA;      &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;,&#xA;      &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;,&#xA;      &#34;w8vuCHS+4au/MfXahCBARA==&#34;,&#xA;      &#34;2GOqqUt4mwKng/FA0FV67w==&#34;,&#xA;      &#34;U47k8+SGMpP7nHNJFxv5oA==&#34;,&#xA;      &#34;LDhDJjeJTHD14xx6vYgQUQ==&#34;,&#xA;      &#34;B3tKTgCVG9JSLHIgfbUFmw==&#34;,&#xA;      &#34;DtYmtBkxVMK6KVHn4U+2Yw==&#34;,&#xA;      &#34;mPAC5fvINjFbBEv6qTd6tQ==&#34;&#xA;    ],&#xA;    &#34;oCbJhi6fmGrlKcF1SlNuYw==&#34;: [&#xA;      &#34;8QRmG/+fMsQQzP2maaxOag==&#34;,&#xA;      &#34;4Gs7xCHPPMrNepkQNCPnkg==&#34;,&#xA;      &#34;OhQ6agVzWuY02NakmnlJmw==&#34;,&#xA;      &#34;1378JmiuKDjVj7PZAMUvLg==&#34;,&#xA;      &#34;WqlqRQL17MeMqdTx+SuEyw==&#34;,&#xA;      &#34;YgD8tCzB10z/Jq6XOfCfgQ==&#34;,&#xA;      &#34;qFhnV7djagzTbJn2rH4ndA==&#34;,&#xA;      &#34;Oz/6eC07LwyvcoelwlI47w==&#34;,&#xA;      &#34;Wy87cIX7luFb8A/riFwUyw==&#34;,&#xA;      &#34;9Wku9APf1oJxEbcM0XqrLQ==&#34;,&#xA;      &#34;HNWibMRA8AF0jyyBYQthdA==&#34;,&#xA;      &#34;JMuZ2WXBBx9rW6/jTPLu0A==&#34;,&#xA;      &#34;ygPqOnRCEHz9NjTVM+wIZA==&#34;,&#xA;      &#34;OIcx4C9IsgtrAE0nDs9GdA==&#34;,&#xA;      &#34;nxT/hl64jXfWptNxWhmDuA==&#34;,&#xA;      &#34;/pWkiqt8QgDCUksSSa24UQ==&#34;,&#xA;      &#34;ZiZuAbc4Tq3tBRSI53FjWg==&#34;,&#xA;      &#34;13fIhbDHRYF0KXmxmJIfiA==&#34;,&#xA;      &#34;/eIvRWSFFmU3q3Ki3j/gKA==&#34;,&#xA;      &#34;bfa/XbakkA2/5GrUyvwSyw==&#34;,&#xA;      &#34;XXYPGOxEabdavz27Qo+rWQ==&#34;,&#xA;      &#34;qb5Q/H2wcR/YimCQn+AUYw==&#34;,&#xA;      &#34;p4PSGpZ+FENmdQZ22vQ2FQ==&#34;&#xA;    ],&#xA;    &#34;oGWSEEsLb6ToIwJ1tUBkwg==&#34;: [&#xA;      &#34;0UxirvKJMj5gY8fbrSf6sA==&#34;,&#xA;      &#34;l2+nQ26t0lYvVluseJErUQ==&#34;&#xA;    ],&#xA;    &#34;og/hyn7iqbsNsfIv/8VHFg==&#34;: [&#xA;      &#34;HveCNT+j0lknlUOFTaqgtg==&#34;,&#xA;      &#34;ugAB401UYtKGrqztlPOlZA==&#34;,&#xA;      &#34;LlIx9R1y9EWEYmMjr1l1rw==&#34;&#xA;    ],&#xA;    &#34;om/hnbn42itSjLCSeL6+2A==&#34;: [&#xA;      &#34;BBVHDYnqIwi0Vk9ZX1yGIw==&#34;,&#xA;      &#34;JmAt+4wqaQRWn+7jyy1oCQ==&#34;,&#xA;      &#34;QBNxNqNCcUL/GHKqOh7Fyw==&#34;&#xA;    ],&#xA;    &#34;p9BcHmUiqsfiDX2HpNFM5g==&#34;: [&#xA;      &#34;APh1+6yq/mlF0fXLxUkIDw==&#34;,&#xA;      &#34;ymKqobod4xPivmLT/iq9oQ==&#34;,&#xA;      &#34;4Oz54fEBFyAJBdTJ/p2wxA==&#34;,&#xA;      &#34;OlzUZywb212kcLte3jiS3g==&#34;&#xA;    ],&#xA;    &#34;pc8TmjOHnExT3yvCQuGR7Q==&#34;: [&#xA;      &#34;rmKqD8ZR5vrHqnZkFulqdg==&#34;,&#xA;      &#34;dKzgwwkG/spsYd8PVvrk6A==&#34;,&#xA;      &#34;Ywdulqdw8k75jjL2qb8gPg==&#34;,&#xA;      &#34;+81WHs4+NlxNNP8OWMLJ2g==&#34;,&#xA;      &#34;81pNWZHPHOUJjusdIRcrCg==&#34;&#xA;    ],&#xA;    &#34;peDze6790+ubKa/8hacS+w==&#34;: [&#xA;      &#34;VNA7ljkMyeRq9SDNO9drHQ==&#34;,&#xA;      &#34;DhiTSAV5nEGdAk1xkbjRsw==&#34;,&#xA;      &#34;SbrfelK/hRkg8QJAv7881A==&#34;,&#xA;      &#34;KhtP1/ZJ9jcZ6Whijt7vkw==&#34;,&#xA;      &#34;081ZZUa7+goThe2JzRBcxw==&#34;,&#xA;      &#34;r0yngP+sUJvKraMLgaaWww==&#34;,&#xA;      &#34;n9h0mZrBntcdO8rut9mZew==&#34;,&#xA;      &#34;lIzMhy2E3/kAp+LsQCQyCA==&#34;,&#xA;      &#34;s+/PgMrbczH4dntN+Uku4A==&#34;,&#xA;      &#34;walyEMfvPvVh3KXxCNA/pQ==&#34;,&#xA;      &#34;Bd+yU6xHUdyyaw65uiacIw==&#34;,&#xA;      &#34;oGKMWwqd8g23cJbO7k5MNA==&#34;,&#xA;      &#34;Cr4I2Hcgcf8xO3Bc2/KIfA==&#34;,&#xA;      &#34;4evfzAbeD7HXRBHHbDpAwA==&#34;,&#xA;      &#34;8Ug8/LJbCT7/mzHPjLi21A==&#34;,&#xA;      &#34;F1KNP85q9V8sONVWKuOzrw==&#34;,&#xA;      &#34;Qimhraux3dZtFrPRbNJqyw==&#34;,&#xA;      &#34;FcmkgsiNKCrDAJ6OFK/Y8g==&#34;,&#xA;      &#34;NkAsviHzXhNrys9cILlYeQ==&#34;,&#xA;      &#34;EX/jsJKUxl+Y92LbkHwIVg==&#34;,&#xA;      &#34;xP/kV8YDeJxssrXaMcjXUg==&#34;,&#xA;      &#34;KM3euWq+O2CS0VP936TjVg==&#34;,&#xA;      &#34;vpkqaxRDIkUCRIT3f2sk6Q==&#34;,&#xA;      &#34;BofAiVtqC38hX5ZAkBLTpA==&#34;,&#xA;      &#34;J9wD9ZF9kAJd1nu03TllBQ==&#34;,&#xA;      &#34;kHC7JlgJ1gpjDIHxKgXZuQ==&#34;,&#xA;      &#34;IkLJJWoz7DjiEwkwHd9+Bw==&#34;,&#xA;      &#34;v+VZolEvt4HU4yiZTpFx+Q==&#34;,&#xA;      &#34;A/za5QfQmT4HYcIQ4RyCzA==&#34;,&#xA;      &#34;naO+9RNjE/hIMaezFHe7IA==&#34;,&#xA;      &#34;//2gjbgNV4aF0qefir+7Ng==&#34;,&#xA;      &#34;CFRtSPlXDJlgi28bdADXZg==&#34;,&#xA;      &#34;1qsA4RvCYZB2uDwgIo8TuQ==&#34;,&#xA;      &#34;6GzxFtf19XU1Y6ySz6SgYQ==&#34;,&#xA;      &#34;bklfMYFV2WKM17hKPU+5BA==&#34;,&#xA;      &#34;cWbhx4ozV3Pkh4rK/phNRA==&#34;,&#xA;      &#34;4PW1pGs0HJlG6XNR1xk0ZA==&#34;,&#xA;      &#34;833/aZmn4g2C0czWW40RBQ==&#34;,&#xA;      &#34;IDAwc/hZzIcM4IBkaUT9YA==&#34;,&#xA;      &#34;fZX9tMkRg8Ij95v2HLw9Ew==&#34;,&#xA;      &#34;TGjVfFW0jWP1/Slr8hCo8Q==&#34;,&#xA;      &#34;o52gvb+djtuOAe8fWpXboQ==&#34;,&#xA;      &#34;Ga3lVfExNl500JGwW345sQ==&#34;,&#xA;      &#34;rPWZNH+en7vYfObneQGeUA==&#34;,&#xA;      &#34;8dARvXsFfslEQUJNpOVqyQ==&#34;,&#xA;      &#34;EahYBNc6RsapXfHOvUMG/A==&#34;,&#xA;      &#34;4jKXN+o/0vyACgd6hmLCbw==&#34;,&#xA;      &#34;KlFwXzVoVlebAInsnw41Qw==&#34;,&#xA;      &#34;mOQ3hJyzcYBnd65M1VVdFA==&#34;,&#xA;      &#34;FjluGqmW83eEOEvyKIkrSA==&#34;,&#xA;      &#34;KxS2ZtWgZx0lQavGmel4Wg==&#34;,&#xA;      &#34;x80ydqeeoahPQLNiV1VXvQ==&#34;,&#xA;      &#34;U86r1ELAOJanBnxwrapY0g==&#34;,&#xA;      &#34;YGKNwwPTf6g9pxsaSlPd0g==&#34;,&#xA;      &#34;UeiYbCd+yCsmz4K385pQkQ==&#34;,&#xA;      &#34;YusnUSJD47mdstk8KsgGZQ==&#34;,&#xA;      &#34;cpsr/YFJ0iUNtv72fOtdjw==&#34;,&#xA;      &#34;4ifTGHhVbtDPeqLwYDVyJA==&#34;,&#xA;      &#34;BqzAZ5iQVHE6OkJ+a2YydQ==&#34;,&#xA;      &#34;2+grY6RsLOFJVlzFN96AuQ==&#34;,&#xA;      &#34;u6YfnQt98V+kYlUqAP+rFg==&#34;,&#xA;      &#34;QPsg6Jr0bVMm0tr2j4YMwA==&#34;,&#xA;      &#34;X5o2Qoo8DgfpPtqZ+d9MzQ==&#34;,&#xA;      &#34;pENgwsqn4gloGqUZSMstFA==&#34;,&#xA;      &#34;X2XVS8beM5noGWCQGlVZ6g==&#34;,&#xA;      &#34;Zwyz7XImU98ApFQj0FPRmw==&#34;,&#xA;      &#34;FWn8i7eSvTTcwwX8x1YMmg==&#34;,&#xA;      &#34;ZAG3qysphRz8tGIp96ls9A==&#34;,&#xA;      &#34;aHbxsEzv/m7Yq5sqD6BR6A==&#34;&#xA;    ],&#xA;    &#34;pff1wMeg2U6ebqlGIkRlMg==&#34;: [&#xA;      &#34;8QRmG/+fMsQQzP2maaxOag==&#34;,&#xA;      &#34;9feM+1JJIYgC5OZCglyV3w==&#34;,&#xA;      &#34;+0Id+AHw3V8pYW+ywWnP+g==&#34;,&#xA;      &#34;U/ITon4/vjzN/EsZEGI38Q==&#34;,&#xA;      &#34;u0i6Tc2zpzW8/pMdj7AH4w==&#34;,&#xA;      &#34;9Ad5Q6DJD1JusuIjCNfUvQ==&#34;,&#xA;      &#34;R1Akf7BYKFH+Usf+3IS0Cg==&#34;,&#xA;      &#34;CD0KTiCn+kQ9+lGQdzy4Lw==&#34;,&#xA;      &#34;fD8Z9mQCc8h27ZwElVMLmA==&#34;,&#xA;      &#34;NJQIxCJu/MH10b3rWNiBVw==&#34;,&#xA;      &#34;m02T5S9rBezyv/+a/R6Fkw==&#34;,&#xA;      &#34;B1THb18jP+rSUaY77CvPng==&#34;,&#xA;      &#34;a+77t9fGz9BxOnJlGe2W1Q==&#34;,&#xA;      &#34;goLAuNZUT0caQTKiv7m0Fg==&#34;,&#xA;      &#34;WLpGLJSV+lV8a0xggVfA3A==&#34;,&#xA;      &#34;mBrf1Yfgr5icNwG8S0edeA==&#34;,&#xA;      &#34;JZVeRC2oy93Tv6vLZpVqJQ==&#34;,&#xA;      &#34;s/wLIAA4VDi9HrbyrnYgbg==&#34;,&#xA;      &#34;Y2pXpR4HKVIWAZ1sDtjo8A==&#34;,&#xA;      &#34;8oKavHMm8C7p1QC+rNA0zA==&#34;,&#xA;      &#34;DK1x7B/vzgaKlXynN3g1KA==&#34;,&#xA;      &#34;fI1ruEtJ325PbGUQKXuiVA==&#34;,&#xA;      &#34;IENtFrOwfEqYX/lp+0u2Gw==&#34;&#xA;    ],&#xA;    &#34;ptT0YL/h24MTjTTVlPAZVg==&#34;: [&#xA;      &#34;FOhuL+ZLaAMigc1crKc/uA==&#34;,&#xA;      &#34;BBVHDYnqIwi0Vk9ZX1yGIw==&#34;,&#xA;      &#34;ryv0HUHLJe8DIxGNl9VAgQ==&#34;&#xA;    ],&#xA;    &#34;qIHoKDOcFEbVk0+xQvglbQ==&#34;: [&#xA;      &#34;3E/EPC1OcoKQToPb+efdaQ==&#34;,&#xA;      &#34;VDQb6roo+zwBamxPu+hGeQ==&#34;,&#xA;      &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;,&#xA;      &#34;ca+BSCGp5tEYAgJqvm8GFw==&#34;,&#xA;      &#34;Sal0GJMIh5Nqb3U4N6ro0g==&#34;,&#xA;      &#34;QSEpEyTM9A7rsX/qx644wQ==&#34;,&#xA;      &#34;g9gU2/SbcO/F9X65zpT4Uw==&#34;,&#xA;      &#34;yUucg71orzE08FiDgaKBPQ==&#34;,&#xA;      &#34;PdWXJaz3tjlEOUmbSqfsDQ==&#34;,&#xA;      &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;,&#xA;      &#34;QqK1O3FCNB9QbClJ7bZ6YA==&#34;,&#xA;      &#34;B1FsL93s2G1YxIvrdDvTfg==&#34;,&#xA;      &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;,&#xA;      &#34;wG1iwTc5HBr1VKWUstaeHw==&#34;,&#xA;      &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;,&#xA;      &#34;gxC5QcXnizTYqfkIqc6zTA==&#34;,&#xA;      &#34;ixD2h349uZz3eCy55KxIlw==&#34;,&#xA;      &#34;5amguv6OT1njd8r+RXMCQQ==&#34;,&#xA;      &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;,&#xA;      &#34;piA8HykwHgm/u3haFYSPzw==&#34;,&#xA;      &#34;K5fLrkou5COixf2q2qhQ5Q==&#34;,&#xA;      &#34;sTWSbUm1UHqZR0zHxPPV1A==&#34;,&#xA;      &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;,&#xA;      &#34;JS9NNql9cJTDkzzfXyJzDQ==&#34;,&#xA;      &#34;D7U85Qc3CYAscEzhSfT76A==&#34;,&#xA;      &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;,&#xA;      &#34;m0VRm0XEm9FSwttsQ8QLaQ==&#34;,&#xA;      &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;,&#xA;      &#34;FkxoK2aSVfPglVllnxzplw==&#34;,&#xA;      &#34;YCFy9R5BUcPVuUEYQkJQ4w==&#34;,&#xA;      &#34;K/Jzpgc6xwHh47HFu+S8BQ==&#34;,&#xA;      &#34;wh8UL6jE02MHJgululn0nA==&#34;,&#xA;      &#34;y7I268PAr74OoToX85XE8w==&#34;,&#xA;      &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;      &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;      &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;      &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;      &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;      &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;      &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;      &#34;5BksN0izCeDRrtFMsNCyvg==&#34;,&#xA;      &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;      &#34;ZhxWQvKqBGgL77fuUQ4Ghg==&#34;,&#xA;      &#34;26JRymquUeoxtDSKcKSDSg==&#34;,&#xA;      &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;,&#xA;      &#34;HHpOVRDbzmY2UhydU+uwcg==&#34;,&#xA;      &#34;6pBzw2YiS9JmVvplQUxl2Q==&#34;,&#xA;      &#34;K12v1aAHn6bz+NiEB1W7GA==&#34;,&#xA;      &#34;T507T5wFbtPlOW9lG7LxIA==&#34;,&#xA;      &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;,&#xA;      &#34;v5GtOUp47xYv9Rr0sFi4PQ==&#34;,&#xA;      &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;,&#xA;      &#34;lsfrxxENmZMCtV8uOKkr8Q==&#34;,&#xA;      &#34;/+0dqY3HS0Vwp8Izm3R04Q==&#34;,&#xA;      &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;,&#xA;      &#34;8Ldq46rf2Z9JTBjkrtfV0g==&#34;,&#xA;      &#34;3bb0a18NQSPWO0aeq9twVw==&#34;,&#xA;      &#34;dkGOl+YKkRksmyjmvQ3FsA==&#34;,&#xA;      &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;,&#xA;      &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;,&#xA;      &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;,&#xA;      &#34;EhVqWSecC9djAkoW+k/+hQ==&#34;,&#xA;      &#34;PgPRtFXcN+6zuIY77w+muQ==&#34;,&#xA;      &#34;uXRgwaipa8s2OMXjAf1Thg==&#34;,&#xA;      &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;,&#xA;      &#34;M3xoPIiF+fvDRyYkizrMWQ==&#34;,&#xA;      &#34;78ARTcr/iVbEbtXWNEyadA==&#34;,&#xA;      &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;,&#xA;      &#34;5IIoRCBMIgus62mGlE3F9A==&#34;,&#xA;      &#34;Argl342WI7oZtgSo+p9kMA==&#34;,&#xA;      &#34;l2fXal/tlhZFSzN3bmiLSg==&#34;,&#xA;      &#34;Lc7NiV76Y8Ubl6+6Vgd+sw==&#34;,&#xA;      &#34;xsP7BCzVmEb3+qivw8mFIQ==&#34;,&#xA;      &#34;PdNX5RN9keIsqOloxy7mkg==&#34;,&#xA;      &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;&#xA;    ],&#xA;    &#34;qTTyL80F/2JUAy85WSpobg==&#34;: [&#xA;      &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;&#xA;    ],&#xA;    &#34;rTAf2eiAGJSR1vI+tk12zg==&#34;: [&#xA;      &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;      &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;&#xA;    ],&#xA;    &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: [&#xA;      &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;&#xA;    ],&#xA;    &#34;rkUaC636uKZYge61PN1dew==&#34;: [&#xA;      &#34;nFaODSvvA4RrGIiPJ9FjRA==&#34;,&#xA;      &#34;lCd4ciOqH+xVdJTAK6erDg==&#34;&#xA;    ],&#xA;    &#34;ryPyL0/oZK1jJ8umBZkZBA==&#34;: [&#xA;      &#34;7+mdkcJcBwtv88RB9AcmHQ==&#34;,&#xA;      &#34;ky4IJ5u2Ib7CaDmE7xOysg==&#34;&#xA;    ],&#xA;    &#34;szNvvFbgC3+nu7+FkWHQxA==&#34;: [&#xA;      &#34;QhESIu1eoXqoSNW7jNhlZg==&#34;,&#xA;      &#34;QQ1upjXEDW7OiB4aR8O/8A==&#34;&#xA;    ],&#xA;    &#34;tOoZIHzytN01BRAw3es1Yg==&#34;: [&#xA;      &#34;HMF5qYGPMt4Fb5i6RtdwRA==&#34;,&#xA;      &#34;tC2r7U8qVBEhU9NaT3fMVg==&#34;&#xA;    ],&#xA;    &#34;tsX00aIcJlVDdnN8EABj3g==&#34;: [&#xA;      &#34;EEMnwT7ARQJ+dbVETnKljw==&#34;,&#xA;      &#34;SSAJUNd+iNG0Dh0JEHjSXA==&#34;&#xA;    ],&#xA;    &#34;u95OKK2MhRQlEYI4tmvSVQ==&#34;: [&#xA;      &#34;Qmv/HFfBCKuu6eMPjatnfw==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;      &#34;kDZjsaAjptkThRRg1TjTRg==&#34;&#xA;    ],&#xA;    &#34;uXpj8krYkomg5XDZ83F2kg==&#34;: [&#xA;      &#34;qtpMNZ+V4szO/Tox+eT3Cg==&#34;,&#xA;      &#34;936XDvlfcwVB/34fQscf7w==&#34;&#xA;    ],&#xA;    &#34;uwkXfq5VvKEldZwWOwGq4w==&#34;: [&#xA;      &#34;i3BrKsmhYf5wZYkQCBxUGw==&#34;,&#xA;      &#34;/EvgSih2YVXl7ohENLMJIQ==&#34;&#xA;    ],&#xA;    &#34;vSRLH3asu5knZtxqOxtnwQ==&#34;: [&#xA;      &#34;e3z/W9uylzA9XCJCS6Je3A==&#34;,&#xA;      &#34;869xwjsmIoG+JuVnJO5pSA==&#34;&#xA;    ],&#xA;    &#34;vVZXXrZNgHNmTJM7knKqAQ==&#34;: [&#xA;      &#34;MdEybCUhVKCoyI/dXRvNlA==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;      &#34;B9qUokfV8wr0vL8EYHLo5g==&#34;&#xA;    ],&#xA;    &#34;vaBZgtoGX6VZtIwrD9w+EQ==&#34;: [&#xA;      &#34;Mukn5ixgUb/zb+mcMFd16Q==&#34;&#xA;    ],&#xA;    &#34;vtNcuXyRth8r8K/W3sfqrQ==&#34;: [&#xA;      &#34;9LiBp4nDSgt/Uyk2VD23Ig==&#34;,&#xA;      &#34;tc3yI78GS4DzyIWUxAPWyg==&#34;,&#xA;      &#34;yR8yQT8vjjYwY0t0RI5P5A==&#34;,&#xA;      &#34;4TUE8wYBdfhOKrJqWCYBNg==&#34;,&#xA;      &#34;W5SSItV7fPTUmtVkE5E9HQ==&#34;,&#xA;      &#34;ITpj/wESnpXzi/8j4E382w==&#34;,&#xA;      &#34;v9qMLnWqPbLz+WC1hPhb9g==&#34;,&#xA;      &#34;3AbYXrLwWtddQg0NqJQudw==&#34;,&#xA;      &#34;4os+HU28VQ7buZvoEKQ/kg==&#34;,&#xA;      &#34;W4i+1AnMm5l6mD/A/2lJnQ==&#34;,&#xA;      &#34;SSReN3l+Qu29CQbqRghmtA==&#34;,&#xA;      &#34;Xms/F5NRiyBcCNuPxw8aoA==&#34;,&#xA;      &#34;a8lEoliaJpwjl9bCwQSdLA==&#34;,&#xA;      &#34;GMnASWjZHihDlhJdlv57Iw==&#34;,&#xA;      &#34;MtOwgWyogkVoNGuQavHN8g==&#34;,&#xA;      &#34;//8buewiV8gb20qv4g1cqQ==&#34;,&#xA;      &#34;SJA+1v6mehbGh4JXJ2n5jA==&#34;,&#xA;      &#34;gn3bQe/78AdzPhooNm1KQw==&#34;,&#xA;      &#34;2No3jCnnmCwOEpCbk+TZGA==&#34;,&#xA;      &#34;BDC/Jijmwb4kfsAYqG7t2Q==&#34;&#xA;    ],&#xA;    &#34;wXu3MDegq/TfLSbBy6aoBQ==&#34;: [&#xA;      &#34;3k2lNJd2kR3VB6gGhj547g==&#34;,&#xA;      &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;      &#34;Kqi7XT4SGpqJzglrXFbYsQ==&#34;&#xA;    ],&#xA;    &#34;wsc0mBnyNwrXYdpo0V+0aw==&#34;: [&#xA;      &#34;TteHTvD/qC9z9/bg4D+o8w==&#34;,&#xA;      &#34;YSdK7PYtLQ7JLXu7W4mdRQ==&#34;&#xA;    ],&#xA;    &#34;xC2PhiBOHiQbniVjaMltjw==&#34;: [&#xA;      &#34;j7yoSCks+i8LevHtgFwCwQ==&#34;&#xA;    ],&#xA;    &#34;xSR/sMJIXbuFPYhZS2ZN2Q==&#34;: [&#xA;      &#34;5MqCycBYSRDsdNOzvOandQ==&#34;,&#xA;      &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;      &#34;WhaoYkvfheR7Tz30m0/IKA==&#34;&#xA;    ],&#xA;    &#34;xdunfqVk+0spTcWoJA7wPw==&#34;: [&#xA;      &#34;hRSnphgIhBaU8a2RyBPsuA==&#34;,&#xA;      &#34;s20Tn7zOYHvK/n/K8/hWrA==&#34;,&#xA;      &#34;+0pi5+jw8FdwHp5pZIVTBg==&#34;,&#xA;      &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;&#xA;    ],&#xA;    &#34;y9sflCLWTaHWSSC+w8u7bQ==&#34;: [&#xA;      &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;&#xA;    ],&#xA;    &#34;yLdg/zIMr1LMvkW9tAZlGw==&#34;: [&#xA;      &#34;fT2bR3Pvvu+yOGDatxsWcw==&#34;,&#xA;      &#34;0tfYnYhAiMREOXyqf/1Urw==&#34;,&#xA;      &#34;h8nlVtUPrGKdJF9xyffy7g==&#34;,&#xA;      &#34;skjryijgaN9YVeVVq8xZmA==&#34;,&#xA;      &#34;ggJq5z8YW0kySCUAGUYdXg==&#34;,&#xA;      &#34;j8vL1GycOevI00+qC9aKmw==&#34;&#xA;    ],&#xA;    &#34;yXx0rhfj7kyXaTrxOLQSfA==&#34;: [&#xA;      &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;      &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;&#xA;    ],&#xA;    &#34;z/d/zUXK6aF2L4H7dfeSZw==&#34;: [&#xA;      &#34;j7yoSCks+i8LevHtgFwCwQ==&#34;&#xA;    ],&#xA;    &#34;zPYyryKVwACz98/WbfSW6w==&#34;: [&#xA;      &#34;hWXaFNGw43ZC0VkI4/s2Pw==&#34;,&#xA;      &#34;jlQB8YKpspXbBoHQT0JY7A==&#34;,&#xA;      &#34;YlN21JbaOAqORXBYjgJOYA==&#34;,&#xA;      &#34;o/JG334q9R0nTyZD1vNw7w==&#34;,&#xA;      &#34;CaVsGPkqzxcrIauiEFdPpw==&#34;,&#xA;      &#34;GXObP88ZOLkWQuVeVgHh/g==&#34;&#xA;    ],&#xA;    &#34;zpqzIc9TY4hiXJG024jdBQ==&#34;: [&#xA;      &#34;Tz9Z9WUqfvL0BrLTJjlG5g==&#34;,&#xA;      &#34;13Dkon5caDMIMuKn79Qskg==&#34;,&#xA;      &#34;jujfK7kvNttCHbG9Y1cEjw==&#34;,&#xA;      &#34;+QQwOZo/9naGhbYAyaOr+w==&#34;,&#xA;      &#34;OSUAY4vX1mm91uqYY2QyKA==&#34;,&#xA;      &#34;mjI/WzMYY52AQdc1No8ugQ==&#34;,&#xA;      &#34;ZZYlhV9nOBPxmh+lN8Wzlg==&#34;,&#xA;      &#34;WGwIYJUrzsJ4/8TTyxMGGQ==&#34;,&#xA;      &#34;3UFdmogC8LxBJ8vh97CLKg==&#34;,&#xA;      &#34;4ZcrBE+d85+98j2eHMpVTQ==&#34;,&#xA;      &#34;C+zOyZD8CwAZei0FDIvlTA==&#34;,&#xA;      &#34;qAjJcUd7scO8lHObIc+8TA==&#34;,&#xA;      &#34;pLMgO5RHEs1yrujEkb226g==&#34;,&#xA;      &#34;/w1B4Q4YhRhn+C15Pv2Mlg==&#34;,&#xA;      &#34;Xo53LSQ1UPT3k4c2guU75Q==&#34;,&#xA;      &#34;4PIM0/eLiUwExdFACTKEEw==&#34;,&#xA;      &#34;zEKtVLhCQn3xgvKNhFo2bg==&#34;,&#xA;      &#34;WlLXHoXR9O8Ph+uSZ6aDCg==&#34;,&#xA;      &#34;LTObsRKzbMcDf7ZCch9lsA==&#34;,&#xA;      &#34;CfhyOTUZXzyZ1gBqX8Jz5Q==&#34;,&#xA;      &#34;ab/GKLlj0s6Lkn9DyDnUUQ==&#34;,&#xA;      &#34;3A/kVsDzDDwZXdM+JpfWlA==&#34;,&#xA;      &#34;uFRb2siFSROrNSaSMqsvqQ==&#34;,&#xA;      &#34;2/tA0uwDqjzRb7JZP+f4Mw==&#34;,&#xA;      &#34;QMVQFQxQO9E+szLpK5nZ9w==&#34;,&#xA;      &#34;2usQa32fSqIDVo0qKM7RFA==&#34;,&#xA;      &#34;3E5wmOETiTx03Y24iDJEUg==&#34;,&#xA;      &#34;JeqcZQqZ6re77qRb9vpAHQ==&#34;,&#xA;      &#34;dxRzT6G0UObuWf8SWujnng==&#34;,&#xA;      &#34;CVNFdSU8eHIr3mZk7+SX/Q==&#34;,&#xA;      &#34;iKVtZrDNXfISjmDp1xYKBQ==&#34;,&#xA;      &#34;izYg2kL7sTEI8ASmlxRCdA==&#34;,&#xA;      &#34;okRzJuZWda3BPI4wHU6OSg==&#34;,&#xA;      &#34;xqLSmaq+0/3ps+9zoCEL9g==&#34;,&#xA;      &#34;YQVoCJX8BLl6S5wPwmTGtg==&#34;,&#xA;      &#34;9lqG2xu+85HJHcn8UQyZ2A==&#34;,&#xA;      &#34;zRaIctSo0IHgkpOD2xBvHw==&#34;,&#xA;      &#34;dT4TBdsMnRpAlGfPboRcFg==&#34;,&#xA;      &#34;6otwEH3RP+2A14zXLvGXpg==&#34;,&#xA;      &#34;jweM09oSTMKt4t5s2Lpg9g==&#34;,&#xA;      &#34;2tFr9TQJkcgsTrNAQX0kdw==&#34;,&#xA;      &#34;R/1pH8uHGa3Vo+JZ4isuOQ==&#34;,&#xA;      &#34;j7ssITCzXW4N87uje7nkZg==&#34;,&#xA;      &#34;6Q0Sg/Y1lskU2n7rbcxAIw==&#34;,&#xA;      &#34;Lsd0oY+cRz3Y5y3+G6CYMA==&#34;,&#xA;      &#34;ajN2ub+i7la5x0tiLPy3pQ==&#34;,&#xA;      &#34;G1ju8KSMzz6zOg31bF5lRw==&#34;,&#xA;      &#34;z+NiHm13dFQpx3ZynhKpIQ==&#34;,&#xA;      &#34;bj9lurrpBxE/q4lRd2Wp7A==&#34;,&#xA;      &#34;rPXe6sMC/46EZbom2R58Iw==&#34;,&#xA;      &#34;Pp6wwZ+94c04WPY1/Wy+4A==&#34;,&#xA;      &#34;HemNnBPTgSHasXNahNqsQg==&#34;,&#xA;      &#34;6ysC6D7BSkYQ7y8vZ1O7HA==&#34;,&#xA;      &#34;rDx7RcnC1Ce961LxuRo53Q==&#34;,&#xA;      &#34;xEtBJoALTqnQBn0TOsRe9w==&#34;,&#xA;      &#34;sWPZolO+x42N83xPk/byrw==&#34;,&#xA;      &#34;NfM08djkMgc3ukqHI37OMg==&#34;,&#xA;      &#34;BgLn2RypgHsjIVj0SLunZg==&#34;,&#xA;      &#34;XcaHXhT/kGXPIEcG1BNy1g==&#34;,&#xA;      &#34;UEW14H6J4RBSZEjpG6p4bw==&#34;,&#xA;      &#34;JMtxzN1jgVs2Gwo2QsOKnQ==&#34;,&#xA;      &#34;IIfJmT1yzMqBOVKMy3nlyQ==&#34;,&#xA;      &#34;/HT2WOXIuvVNrzT1Wp3ntw==&#34;,&#xA;      &#34;o2Jv7s2Wil4Jz6qK6599ww==&#34;,&#xA;      &#34;10T7L0U8GuP9Qhz3unCqvw==&#34;,&#xA;      &#34;6W4lt5SjUgXnbxNap1O0Cg==&#34;,&#xA;      &#34;5gK/V8vtqDYoHf1LFdtSbA==&#34;,&#xA;      &#34;h7rVfEQf7/yrRLndyq6HvA==&#34;,&#xA;      &#34;GKtgrnguQJIeMtP51nnNZQ==&#34;,&#xA;      &#34;00MQS+g+VNjKvRbuFWsWbQ==&#34;,&#xA;      &#34;nM+XWkmaG537tz4PDM13+w==&#34;,&#xA;      &#34;v6t7qJCF3xL8IO0nPwJX1g==&#34;,&#xA;      &#34;IUI8ka2AYA1twZAQi4gL5Q==&#34;,&#xA;      &#34;DlzGGXSItv6fZobEGaNWCA==&#34;,&#xA;      &#34;IoeuDKI/vu/XCDGoDKzX3g==&#34;,&#xA;      &#34;quxt3+YB7vB2VUonbp8+2g==&#34;,&#xA;      &#34;VxNINARrmRd6QnZ2htNesA==&#34;,&#xA;      &#34;pqvnt6puEE8VbSe1ozlTfg==&#34;,&#xA;      &#34;f6S0OqBhSEfNFL2mdF01Og==&#34;,&#xA;      &#34;gjn1JHWHaWtPNhKrrRINWw==&#34;,&#xA;      &#34;r3htJBqpa1VO27wdQgcGyw==&#34;,&#xA;      &#34;ibGOv13N1m/577Kb32wGxw==&#34;,&#xA;      &#34;NeoXfJYSR9hqSpA4BJOyWQ==&#34;,&#xA;      &#34;DI5ofU0JT+/wsYx2AeXNiA==&#34;,&#xA;      &#34;htRPPeb7P9MNS47zhEuuaw==&#34;,&#xA;      &#34;Kp6vEAyTjVJyCperHJ2MsQ==&#34;&#xA;    ]&#xA;  },&#xA;  &#34;enrichments&#34;: {}&#xA;}&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-clair-scan-pod | container step-oci-attach-report: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll&#xA;Attaching clair-report-amd64.json to quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll@sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#xA;Executing: oras attach --no-tty --format go-template={{.digest}} --registry-config /home/oras/auth.json --artifact-type application/vnd.redhat.clair-report+json quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll@sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d clair-report-amd64.json:application/vnd.redhat.clair-report+json&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-clair-scan-pod | container step-conftest-vulnerabilities: &#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/clair-result-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 3,&#xA;&#x9;&#x9;&#34;warnings&#34;: [&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with high vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libcurl-devel-7.76.1-19.el9_1.1 (CVE-2023-38545), bsdtar-3.5.3-3.el9 (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424), nodejs-libs-1:16.18.1-3.el9_1 (CVE-2023-30581, CVE-2023-32002, CVE-2023-32006, CVE-2023-32067, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23083, CVE-2025-23166, CVE-2025-3277, CVE-2025-55130, CVE-2025-55131, CVE-2025-59465, CVE-2025-6965, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135), sqlite-3.34.1-6.el9_1 (CVE-2025-6965), openssl-devel-1:3.0.1-47.el9_1 (CVE-2024-12797, CVE-2025-15467), subscription-manager-1.29.30.1-1.el9_1 (CVE-2023-3899), python3-libs-3.9.14-1.el9_1.2 (CVE-2023-24329, CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4138, CVE-2025-4517, CVE-2026-4519, CVE-2026-4786, CVE-2026-6100), libtiff-devel-4.4.0-5.el9_1 (CVE-2025-8176, CVE-2025-9900, CVE-2026-4775), go-srpm-macros-3.0.9-9.el9 (CVE-2025-61726, CVE-2026-25679), nodejs-full-i18n-1:16.18.1-3.el9_1 (CVE-2023-30581, CVE-2023-32002, CVE-2023-32006, CVE-2023-32067, CVE-2023-44487, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019, CVE-2024-27983, CVE-2025-23083, CVE-2025-23166, CVE-2025-3277, CVE-2025-55130, CVE-2025-55131, CVE-2025-59465, CVE-2025-6965, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135), golang-1.18.9-1.el9_1 (CVE-2023-24540, CVE-2023-29403, CVE-2023-29404, CVE-2023-29405, CVE-2023-39325, CVE-2023-44487, CVE-2023-45288, CVE-2024-1394, CVE-2024-34156, CVE-2025-22874, CVE-2025-4674, CVE-2025-61726, CVE-2025-61729, CVE-2025-61731, CVE-2025-61732, CVE-2026-25679), gnupg2-2.3.3-2.el9_0 (CVE-2025-68973), libbrotli-1.0.9-6.el9 (CVE-2025-6176), libxslt-devel-1.1.34-9.el9 (CVE-2024-55549, CVE-2025-24855), brotli-devel-1.0.9-6.el9 (CVE-2025-6176), libpng-devel-2:1.6.37-12.el9 (CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2026-25646), python3-subscription-manager-rhsm-1.29.30.1-1.el9_1 (CVE-2023-3899), libcurl-minimal-7.76.1-19.el9_1.1 (CVE-2023-38545), rsync-3.2.3-18.el9 (CVE-2024-12085), glibc-2.34-40.el9_1.1 (CVE-2023-4911, CVE-2024-2961, CVE-2024-33599), libtiff-4.4.0-5.el9_1 (CVE-2025-8176, CVE-2025-9900, CVE-2026-4775), openssl-libs-1:3.0.1-47.el9_1 (CVE-2024-12797, CVE-2025-15467), glibc-common-2.34-40.el9_1.1 (CVE-2023-4911, CVE-2024-2961, CVE-2024-33599), emacs-filesystem-1:27.2-6.el9 (CVE-2023-2491, CVE-2023-28617, CVE-2025-1244), golang-bin-1.18.9-1.el9_1 (CVE-2023-24540, CVE-2023-29403, CVE-2023-29404, CVE-2023-29405, CVE-2023-39325, CVE-2023-44487, CVE-2023-45288, CVE-2024-1394, CVE-2024-34156, CVE-2025-22874, CVE-2025-4674, CVE-2025-61726, CVE-2025-61729, CVE-2025-61731, CVE-2025-61732, CVE-2026-25679), python3-cloud-what-1.29.30.1-1.el9_1 (CVE-2023-3899), npm-1:8.19.2-1.16.18.1.3.el9_1 (CVE-2023-30581, CVE-2023-32002, CVE-2023-32006, CVE-2023-32067, CVE-2023-44487, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019, CVE-2024-27983, CVE-2025-23083, CVE-2025-23166, CVE-2025-3277, CVE-2025-55130, CVE-2025-55131, CVE-2025-59465, CVE-2025-6965, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135), openssh-8.7p1-24.el9_1 (CVE-2023-38408, CVE-2024-6387, CVE-2026-3497, CVE-2026-35385), libpng-2:1.6.37-12.el9 (CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2026-25646), glibc-langpack-en-2.34-40.el9_1.1 (CVE-2023-4911, CVE-2024-2961, CVE-2024-33599), git-core-doc-2.31.1-3.el9_1 (CVE-2023-25652, CVE-2023-29007, CVE-2024-32002, CVE-2024-32004, CVE-2025-48384, CVE-2025-48385), openssh-clients-8.7p1-24.el9_1 (CVE-2023-38408, CVE-2024-6387, CVE-2026-3497, CVE-2026-35385), libdnf-plugin-subscription-manager-1.29.30.1-1.el9_1 (CVE-2023-3899), nodejs-docs-1:16.18.1-3.el9_1 (CVE-2023-30581, CVE-2023-32002, CVE-2023-32006, CVE-2023-32067, CVE-2023-44487, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019, CVE-2024-27983, CVE-2025-23083, CVE-2025-23166, CVE-2025-3277, CVE-2025-55130, CVE-2025-55131, CVE-2025-59465, CVE-2025-6965, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135), git-2.31.1-3.el9_1 (CVE-2023-25652, CVE-2023-29007, CVE-2024-32002, CVE-2024-32004, CVE-2025-48384, CVE-2025-48385), libnghttp2-1.43.0-5.el9 (CVE-2023-44487, CVE-2026-27135), libwebp-1.2.0-3.el9 (CVE-2023-1999, CVE-2023-4863), git-core-2.31.1-3.el9_1 (CVE-2023-25652, CVE-2023-29007, CVE-2024-32002, CVE-2024-32004, CVE-2025-48384, CVE-2025-48385), expat-2.4.9-1.el9_1.1 (CVE-2025-59375), delve-1.8.3-1.el9 (CVE-2024-34156), pam-1.5.1-12.el9 (CVE-2024-10963, CVE-2025-6020, CVE-2025-8941), python3-setuptools-53.0.0-10.el9_1.1 (CVE-2024-6345), libwebp-devel-1.2.0-3.el9 (CVE-2023-1999, CVE-2023-4863), glibc-headers-2.34-40.el9_1.1 (CVE-2023-4911, CVE-2024-2961, CVE-2024-33599), openssl-1:3.0.1-47.el9_1 (CVE-2024-12797, CVE-2025-15467), python3-urllib3-1.26.5-3.el9 (CVE-2025-66418, CVE-2025-66471, CVE-2026-21441), libxslt-1.1.34-9.el9 (CVE-2024-55549, CVE-2025-24855), freetype-devel-2.10.4-9.el9 (CVE-2025-27363), go-toolset-1.18.9-1.el9_1 (CVE-2023-29403, CVE-2023-29404, CVE-2023-29405, CVE-2023-45288, CVE-2024-1394, CVE-2024-34156, CVE-2025-22874, CVE-2025-4674, CVE-2025-61726, CVE-2025-61729, CVE-2025-61731, CVE-2025-61732, CVE-2026-25679), vim-filesystem-2:8.2.2637-20.el9_1 (CVE-2026-34982), sqlite-libs-3.34.1-6.el9_1 (CVE-2025-6965), less-590-1.el9_0 (CVE-2024-32487), libeconf-0.4.1-2.el9 (CVE-2023-30079), perl-Git-2.31.1-3.el9_1 (CVE-2023-25652, CVE-2023-29007, CVE-2024-32002, CVE-2024-32004, CVE-2025-48384, CVE-2025-48385), glibc-devel-2.34-40.el9_1.1 (CVE-2023-4911, CVE-2024-2961, CVE-2024-33599), python3-setuptools-wheel-53.0.0-10.el9_1.1 (CVE-2024-6345), freetype-2.10.4-9.el9 (CVE-2025-27363), glibc-locale-source-2.34-40.el9_1.1 (CVE-2023-4911, CVE-2024-2961, CVE-2024-33599), nodejs-1:16.18.1-3.el9_1 (CVE-2023-30581, CVE-2023-32002, CVE-2023-32006, CVE-2023-32067, CVE-2023-44487, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019, CVE-2024-27983, CVE-2025-23083, CVE-2025-23166, CVE-2025-3277, CVE-2025-55130, CVE-2025-55131, CVE-2025-59465, CVE-2025-6965, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135), libpq-13.5-1.el9 (CVE-2025-1094), vim-minimal-2:8.2.2637-20.el9_1 (CVE-2026-33412, CVE-2026-34982), libpq-devel-13.5-1.el9 (CVE-2025-1094), glibc-minimal-langpack-2.34-40.el9_1.1 (CVE-2023-4911, CVE-2024-2961, CVE-2024-33599), curl-minimal-7.76.1-19.el9_1.1 (CVE-2023-38545), krb5-libs-1.19.1-24.el9_1 (CVE-2023-39975, CVE-2024-3596), libxml2-devel-2.9.13-3.el9_1 (CVE-2024-56171, CVE-2025-24928, CVE-2025-49794, CVE-2025-49796, CVE-2025-7425), glibc-gconv-extra-2.34-40.el9_1.1 (CVE-2023-4911, CVE-2024-2961, CVE-2024-33599), sqlite-devel-3.34.1-6.el9_1 (CVE-2025-6965), libarchive-3.5.3-3.el9 (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424), brotli-1.0.9-6.el9 (CVE-2025-6176), golang-src-1.18.9-1.el9_1 (CVE-2023-24540, CVE-2023-29403, CVE-2023-29404, CVE-2023-29405, CVE-2023-39325, CVE-2023-44487, CVE-2023-45288, CVE-2024-1394, CVE-2024-34156, CVE-2025-22874, CVE-2025-4674, CVE-2025-61726, CVE-2025-61729, CVE-2025-61731, CVE-2025-61732, CVE-2026-25679), python3-3.9.14-1.el9_1.2 (CVE-2023-24329, CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4138, CVE-2025-4517, CVE-2026-4519, CVE-2026-4786, CVE-2026-6100), libcap-2.48-8.el9 (CVE-2026-4878), libxml2-2.9.13-3.el9_1 (CVE-2024-56171, CVE-2025-24928, CVE-2025-49794, CVE-2025-49796, CVE-2025-7425)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_high_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 330&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched high vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: gdb-headless-10.2-10.el9 (CVE-2026-6846), golang-1.18.9-1.el9_1 (CVE-2026-27137, CVE-2026-27140, CVE-2026-32280, CVE-2026-33810), libpng-devel-2:1.6.37-12.el9 (CVE-2026-22020), rsync-3.2.3-18.el9 (CVE-2026-41035), golang-bin-1.18.9-1.el9_1 (CVE-2026-27137, CVE-2026-27140, CVE-2026-32280, CVE-2026-33810), libpng-2:1.6.37-12.el9 (CVE-2026-22020), gdb-gdbserver-10.2-10.el9 (CVE-2026-6846), gdb-10.2-10.el9 (CVE-2026-6846), go-toolset-1.18.9-1.el9_1 (CVE-2025-61726, CVE-2025-61732, CVE-2026-27137, CVE-2026-27140, CVE-2026-32280, CVE-2026-33810), gnutls-3.7.6-12.el9_0 (CVE-2026-33845, CVE-2026-33846), krb5-libs-1.19.1-24.el9_1 (CVE-2026-40356), golang-src-1.18.9-1.el9_1 (CVE-2026-27137, CVE-2026-27140, CVE-2026-32280, CVE-2026-33810)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_high_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 27&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with medium vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: perl-IO-1.43-479.el9 (CVE-2023-47038, CVE-2025-40909), libX11-devel-1.7.0-7.el9 (CVE-2023-3138, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787), util-linux-2.37.4-9.el9 (CVE-2025-14104), libcurl-devel-7.76.1-19.el9_1.1 (CVE-2023-23916, CVE-2023-27535, CVE-2023-27536, CVE-2023-27538, CVE-2023-28321, CVE-2023-46218, CVE-2024-2398, CVE-2025-9086), pixman-0.40.0-5.el9 (CVE-2022-44638), bsdtar-3.5.3-3.el9 (CVE-2025-25724, CVE-2026-5121), libX11-1.7.0-7.el9 (CVE-2023-3138, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787), nodejs-libs-1:16.18.1-3.el9_1 (CVE-2021-35065, CVE-2022-25881, CVE-2022-4904, CVE-2023-23918, CVE-2023-23936, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31130, CVE-2023-31147, CVE-2023-32559, CVE-2024-22025, CVE-2024-27982, CVE-2024-28182, CVE-2025-22150, CVE-2025-23085, CVE-2025-31498, CVE-2025-55132, CVE-2025-59466, CVE-2026-1525, CVE-2026-1527, CVE-2026-21637, CVE-2026-21711, CVE-2026-21712, CVE-2026-21713, CVE-2026-21714, CVE-2026-21717, CVE-2026-25547, CVE-2026-2581, CVE-2026-26996, CVE-2026-27904), tar-2:1.34-6.el9_1 (CVE-2025-45582), sqlite-3.34.1-6.el9_1 (CVE-2023-7104), perl-NDBM_File-1.15-479.el9 (CVE-2023-47038, CVE-2025-40909), perl-mro-1.23-479.el9 (CVE-2023-47038, CVE-2025-40909), openssl-devel-1:3.0.1-47.el9_1 (CVE-2023-0466, CVE-2023-2650, CVE-2023-5363, CVE-2024-6119, CVE-2025-11187, CVE-2025-69419, CVE-2025-9230), python3-libs-3.9.14-1.el9_1.2 (CVE-2023-27043, CVE-2024-0450, CVE-2024-11168, CVE-2024-6232, CVE-2024-6923, CVE-2024-8088, CVE-2024-9287, CVE-2025-0938, CVE-2025-12084, CVE-2025-15366, CVE-2025-15367, CVE-2025-4330, CVE-2025-4435, CVE-2025-6069, CVE-2025-8194, CVE-2025-8291, CVE-2026-0865, CVE-2026-1299), libicu-67.1-9.el9 (CVE-2025-5222), libtiff-devel-4.4.0-5.el9_1 (CVE-2017-17095, CVE-2022-3570, CVE-2022-3597, CVE-2022-3598, CVE-2022-3599, CVE-2022-3626, CVE-2022-3627, CVE-2022-3970, CVE-2022-40090, CVE-2022-4645, CVE-2022-48281, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0799, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804, CVE-2023-26965, CVE-2023-26966, CVE-2023-2731, CVE-2023-30086, CVE-2023-30774, CVE-2023-30775, CVE-2023-3316, CVE-2023-3576, CVE-2023-3618, CVE-2023-40745, CVE-2023-41175, CVE-2023-52355, CVE-2023-52356, CVE-2024-7006), libicu-devel-67.1-9.el9 (CVE-2025-5222), harfbuzz-2.7.4-8.el9 (CVE-2023-25193), go-srpm-macros-3.0.9-9.el9 (CVE-2025-47906), perl-lib-0.65-479.el9 (CVE-2023-47038, CVE-2025-40909), nodejs-full-i18n-1:16.18.1-3.el9_1 (CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2022-3517, CVE-2022-43548, CVE-2022-4904, CVE-2023-23918, CVE-2023-23919, CVE-2023-23936, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31130, CVE-2023-31147, CVE-2023-32559, CVE-2023-38552, CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-22020, CVE-2024-22025, CVE-2024-27982, CVE-2024-28182, CVE-2024-28863, CVE-2025-22150, CVE-2025-23085, CVE-2025-23167, CVE-2025-31498, CVE-2025-55132, CVE-2025-59466, CVE-2026-1525, CVE-2026-1527, CVE-2026-21637, CVE-2026-21711, CVE-2026-21712, CVE-2026-21713, CVE-2026-21714, CVE-2026-21717, CVE-2026-25547, CVE-2026-2581, CVE-2026-26996, CVE-2026-27904), systemd-pam-250-12.el9_1.3 (CVE-2023-7008, CVE-2025-4598, CVE-2026-29111), golang-1.18.9-1.el9_1 (CVE-2023-24532, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24538, CVE-2023-24539, CVE-2023-29400, CVE-2023-29402, CVE-2023-29406, CVE-2023-29409, CVE-2023-39326, CVE-2023-45285, CVE-2023-45289, CVE-2023-45290, CVE-2024-24783, CVE-2024-24784, CVE-2024-24785, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-9355, CVE-2025-22866, CVE-2025-22871, CVE-2025-4673, CVE-2025-47906, CVE-2025-47907, CVE-2025-58183, CVE-2025-61728, CVE-2025-68121), libgcrypt-1.10.0-8.el9_0 (CVE-2024-2236), libuuid-2.37.4-9.el9 (CVE-2025-14104), perl-FileHandle-2.03-479.el9 (CVE-2023-47038, CVE-2025-40909), perl-Errno-1.30-479.el9 (CVE-2023-47038, CVE-2025-40909), cpp-11.3.1-2.1.el9 (CVE-2020-11023), util-linux-core-2.37.4-9.el9 (CVE-2025-14104), libxslt-devel-1.1.34-9.el9 (CVE-2023-40403), libpng-devel-2:1.6.37-12.el9 (CVE-2026-22695, CVE-2026-22801), libcurl-minimal-7.76.1-19.el9_1.1 (CVE-2023-23916, CVE-2023-27535, CVE-2023-27536, CVE-2023-27538, CVE-2023-28321, CVE-2023-46218, CVE-2024-2398, CVE-2025-9086), wget-1.21.1-7.el9 (CVE-2024-38428), perl-overload-1.31-479.el9 (CVE-2023-47038, CVE-2025-40909), perl-File-Basename-2.85-479.el9 (CVE-2023-47038, CVE-2025-40909), rsync-3.2.3-18.el9 (CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-10158), libstdc++-11.3.1-2.1.el9 (CVE-2020-11023), glibc-2.34-40.el9_1.1 (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2024-33600, CVE-2025-0395, CVE-2025-4802, CVE-2025-5702, CVE-2025-8058, CVE-2026-0915), libtiff-4.4.0-5.el9_1 (CVE-2017-17095, CVE-2022-3570, CVE-2022-3597, CVE-2022-3598, CVE-2022-3599, CVE-2022-3626, CVE-2022-3627, CVE-2022-3970, CVE-2022-40090, CVE-2022-4645, CVE-2022-48281, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0799, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804, CVE-2023-26965, CVE-2023-26966, CVE-2023-2731, CVE-2023-30086, CVE-2023-30774, CVE-2023-30775, CVE-2023-3316, CVE-2023-3576, CVE-2023-3618, CVE-2023-40745, CVE-2023-41175, CVE-2023-52355, CVE-2023-52356, CVE-2024-7006), openssl-libs-1:3.0.1-47.el9_1 (CVE-2023-0466, CVE-2023-2650, CVE-2023-5363, CVE-2024-6119, CVE-2025-11187, CVE-2025-69419, CVE-2025-9230), perl-overloading-0.02-479.el9 (CVE-2023-47038, CVE-2025-40909), glibc-common-2.34-40.el9_1.1 (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2024-33600, CVE-2025-0395, CVE-2025-4802, CVE-2025-5702, CVE-2025-8058), emacs-filesystem-1:27.2-6.el9 (CVE-2022-45939, CVE-2022-48337, CVE-2022-48338, CVE-2022-48339, CVE-2024-30203, CVE-2024-30204, CVE-2024-30205, CVE-2024-39331, CVE-2024-53920), golang-bin-1.18.9-1.el9_1 (CVE-2023-24532, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24538, CVE-2023-24539, CVE-2023-29400, CVE-2023-29402, CVE-2023-29406, CVE-2023-29409, CVE-2023-39326, CVE-2023-45285, CVE-2023-45289, CVE-2023-45290, CVE-2024-24783, CVE-2024-24784, CVE-2024-24785, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-9355, CVE-2025-22866, CVE-2025-22871, CVE-2025-4673, CVE-2025-47906, CVE-2025-47907, CVE-2025-58183, CVE-2025-61728, CVE-2025-68121), bzip2-1.0.8-8.el9 (CVE-2019-12900), rpm-build-libs-4.16.1.3-19.el9_1 (CVE-2021-35937, CVE-2021-35938, CVE-2021-35939), systemd-libs-250-12.el9_1.3 (CVE-2023-7008, CVE-2025-4598, CVE-2026-29111), perl-B-1.80-479.el9 (CVE-2023-47038, CVE-2025-40909), libXpm-3.5.13-8.el9_1 (CVE-2023-43788, CVE-2023-43789), harfbuzz-icu-2.7.4-8.el9 (CVE-2023-25193), libjpeg-turbo-devel-2.0.90-5.el9 (CVE-2021-29390, CVE-2021-46822), libblkid-devel-2.37.4-9.el9 (CVE-2025-14104), libX11-common-1.7.0-7.el9 (CVE-2023-3138, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787), perl-HTTP-Tiny-0.076-460.el9 (CVE-2023-31486), npm-1:8.19.2-1.16.18.1.3.el9_1 (CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2022-3517, CVE-2022-43548, CVE-2022-4904, CVE-2023-23918, CVE-2023-23919, CVE-2023-23936, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31130, CVE-2023-31147, CVE-2023-32559, CVE-2023-38552, CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-22020, CVE-2024-22025, CVE-2024-27982, CVE-2024-28182, CVE-2024-28863, CVE-2025-22150, CVE-2025-23085, CVE-2025-23167, CVE-2025-31498, CVE-2025-55132, CVE-2025-59466, CVE-2026-1525, CVE-2026-21637, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904), qt5-srpm-macros-5.15.3-1.el9 (CVE-2023-33285, CVE-2023-34410), dbus-1:1.12.20-7.el9_1 (CVE-2023-34969), perl-IPC-Open3-1.21-479.el9 (CVE-2023-47038, CVE-2025-40909), harfbuzz-devel-2.7.4-8.el9 (CVE-2023-25193), openssh-8.7p1-24.el9_1 (CVE-2023-25136, CVE-2023-48795, CVE-2023-51385, CVE-2024-6409, CVE-2025-26465, CVE-2025-61984, CVE-2025-61985, CVE-2026-35414), rpm-4.16.1.3-19.el9_1 (CVE-2021-35937, CVE-2021-35938, CVE-2021-35939), libpng-2:1.6.37-12.el9 (CVE-2026-22695, CVE-2026-22801), glibc-langpack-en-2.34-40.el9_1.1 (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2024-33600, CVE-2025-0395, CVE-2025-4802, CVE-2025-5702, CVE-2025-8058), gcc-11.3.1-2.1.el9 (CVE-2020-11023), git-core-doc-2.31.1-3.el9_1 (CVE-2022-24765, CVE-2022-29187, CVE-2022-39253, CVE-2022-39260, CVE-2023-22490, CVE-2023-23946, CVE-2024-32465, CVE-2024-52005, CVE-2025-27613, CVE-2025-27614), openssh-clients-8.7p1-24.el9_1 (CVE-2023-25136, CVE-2023-48795, CVE-2023-51385, CVE-2024-6409, CVE-2025-26465, CVE-2025-61984, CVE-2025-61985, CVE-2026-35414), nodejs-docs-1:16.18.1-3.el9_1 (CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2022-3517, CVE-2022-43548, CVE-2022-4904, CVE-2023-23918, CVE-2023-23919, CVE-2023-23936, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31130, CVE-2023-31147, CVE-2023-32559, CVE-2023-38552, CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-22020, CVE-2024-22025, CVE-2024-27982, CVE-2024-28182, CVE-2024-28863, CVE-2025-22150, CVE-2025-23085, CVE-2025-23167, CVE-2025-31498, CVE-2025-55132, CVE-2025-59466, CVE-2026-1525, CVE-2026-1527, CVE-2026-21637, CVE-2026-21711, CVE-2026-21712, CVE-2026-21713, CVE-2026-21714, CVE-2026-21717, CVE-2026-25547, CVE-2026-2581, CVE-2026-26996, CVE-2026-27904), libmount-devel-2.37.4-9.el9 (CVE-2025-14104), libstdc++-devel-11.3.1-2.1.el9 (CVE-2020-11023), python3-idna-2.10-7.el9 (CVE-2024-3651), git-2.31.1-3.el9_1 (CVE-2022-24765, CVE-2022-29187, CVE-2022-39253, CVE-2022-39260, CVE-2023-22490, CVE-2023-23946, CVE-2024-32465, CVE-2024-52005, CVE-2025-27613, CVE-2025-27614), gcc-c++-11.3.1-2.1.el9 (CVE-2020-11023), libnghttp2-1.43.0-5.el9 (CVE-2024-28182), python3-requests-2.25.1-6.el9 (CVE-2023-32681, CVE-2024-35195, CVE-2024-47081), rpm-libs-4.16.1.3-19.el9_1 (CVE-2021-35937, CVE-2021-35938, CVE-2021-35939), perl-vars-1.05-479.el9 (CVE-2023-47038, CVE-2025-40909), perl-File-Find-1.37-479.el9 (CVE-2023-47038, CVE-2025-40909), git-core-2.31.1-3.el9_1 (CVE-2022-24765, CVE-2022-29187, CVE-2022-39253, CVE-2022-39260, CVE-2023-22490, CVE-2023-23946, CVE-2024-32465, CVE-2024-52005, CVE-2025-27613, CVE-2025-27614), perl-File-stat-1.09-479.el9 (CVE-2023-47038, CVE-2025-40909), expat-2.4.9-1.el9_1.1 (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-50602, CVE-2024-8176), delve-1.8.3-1.el9 (CVE-2024-45336, CVE-2025-22866, CVE-2025-58183, CVE-2025-68121), pam-1.5.1-12.el9 (CVE-2024-10041, CVE-2024-22365), python3-setuptools-53.0.0-10.el9_1.1 (CVE-2025-47273), glibc-headers-2.34-40.el9_1.1 (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2024-33600, CVE-2025-0395, CVE-2025-4802, CVE-2025-5702, CVE-2025-8058), openssl-1:3.0.1-47.el9_1 (CVE-2023-0466, CVE-2023-2650, CVE-2023-5363, CVE-2024-6119, CVE-2025-11187, CVE-2025-69419, CVE-2025-9230), libgcc-11.3.1-2.1.el9 (CVE-2020-11023), libtasn1-4.16.0-8.el9_1 (CVE-2024-12133), perl-Class-Struct-0.66-479.el9 (CVE-2023-47038, CVE-2025-40909), dbus-libs-1:1.12.20-7.el9_1 (CVE-2023-34969), python3-urllib3-1.26.5-3.el9 (CVE-2023-43804, CVE-2023-45803, CVE-2024-37891), libxslt-1.1.34-9.el9 (CVE-2023-40403), glib2-devel-2.68.4-5.el9 (CVE-2024-34397, CVE-2024-52533, CVE-2025-13601, CVE-2025-4373), perl-subs-1.03-479.el9 (CVE-2023-47038, CVE-2025-40909), perl-SelectSaver-1.02-479.el9 (CVE-2023-47038, CVE-2025-40909), python3-rpm-4.16.1.3-19.el9_1 (CVE-2021-35937, CVE-2021-35938, CVE-2021-35939), libjpeg-turbo-2.0.90-5.el9 (CVE-2021-29390, CVE-2021-46822), gmp-1:6.2.0-10.el9 (CVE-2021-43618), go-toolset-1.18.9-1.el9_1 (CVE-2023-29402, CVE-2023-39326, CVE-2023-45285, CVE-2023-45289, CVE-2023-45290, CVE-2024-24783, CVE-2024-24784, CVE-2024-24785, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-9355, CVE-2025-22866, CVE-2025-22871, CVE-2025-4673, CVE-2025-47906, CVE-2025-47907, CVE-2025-58183, CVE-2025-61728, CVE-2025-68121), perl-libs-4:5.32.1-479.el9 (CVE-2023-47038, CVE-2025-40909), dbus-common-1:1.12.20-7.el9_1 (CVE-2023-34969), gnutls-3.7.6-12.el9_0 (CVE-2023-0361, CVE-2023-5981, CVE-2024-0553, CVE-2024-0567, CVE-2024-12243, CVE-2024-28834, CVE-2024-28835, CVE-2025-14831, CVE-2025-32988, CVE-2025-32989, CVE-2025-32990, CVE-2025-6395), vim-filesystem-2:8.2.2637-20.el9_1 (CVE-2025-53905), bzip2-devel-1.0.8-8.el9 (CVE-2019-12900), rpm-sign-libs-4.16.1.3-19.el9_1 (CVE-2021-35937, CVE-2021-35938, CVE-2021-35939), sqlite-libs-3.34.1-6.el9_1 (CVE-2023-7104), perl-Getopt-Std-1.12-479.el9 (CVE-2023-47038, CVE-2025-40909), less-590-1.el9_0 (CVE-2022-46663, CVE-2022-48624), libeconf-0.4.1-2.el9 (CVE-2023-22652), perl-Git-2.31.1-3.el9_1 (CVE-2022-24765, CVE-2022-29187, CVE-2022-39253, CVE-2022-39260, CVE-2023-22490, CVE-2023-23946, CVE-2024-32465, CVE-2024-52005, CVE-2025-27613, CVE-2025-27614), libX11-xcb-1.7.0-7.el9 (CVE-2023-3138, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787), libgomp-11.3.1-2.1.el9 (CVE-2020-11023), libfdisk-2.37.4-9.el9 (CVE-2025-14104), perl-Symbol-1.08-479.el9 (CVE-2023-47038, CVE-2025-40909), perl-File-Compare-1.100.600-479.el9 (CVE-2023-47038, CVE-2025-40909), perl-base-2.27-479.el9 (CVE-2023-47038, CVE-2025-40909), libblkid-2.37.4-9.el9 (CVE-2025-14104), libmount-2.37.4-9.el9 (CVE-2025-14104), glibc-devel-2.34-40.el9_1.1 (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2024-33600, CVE-2025-0395, CVE-2025-4802, CVE-2025-5702, CVE-2025-8058), bzip2-libs-1.0.8-8.el9 (CVE-2019-12900), python3-setuptools-wheel-53.0.0-10.el9_1.1 (CVE-2025-47273), glibc-locale-source-2.34-40.el9_1.1 (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2024-33600, CVE-2025-0395, CVE-2025-4802, CVE-2025-5702, CVE-2025-8058), ncurses-base-6.2-8.20210508.el9 (CVE-2023-29491), nodejs-1:16.18.1-3.el9_1 (CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2022-3517, CVE-2022-43548, CVE-2022-4904, CVE-2023-23918, CVE-2023-23919, CVE-2023-23936, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31130, CVE-2023-31147, CVE-2023-32559, CVE-2023-38552, CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-22020, CVE-2024-22025, CVE-2024-27982, CVE-2024-28182, CVE-2024-28863, CVE-2025-22150, CVE-2025-23085, CVE-2025-23167, CVE-2025-31498, CVE-2025-55132, CVE-2025-59466, CVE-2026-1525, CVE-2026-1527, CVE-2026-21637, CVE-2026-21711, CVE-2026-21712, CVE-2026-21713, CVE-2026-21714, CVE-2026-21717, CVE-2026-25547, CVE-2026-2581, CVE-2026-26996, CVE-2026-27904), libXpm-devel-3.5.13-8.el9_1 (CVE-2023-43788, CVE-2023-43789), dmidecode-1:3.3-7.el9 (CVE-2023-30630), libpq-13.5-1.el9 (CVE-2025-12818), systemd-rpm-macros-250-12.el9_1.3 (CVE-2023-7008, CVE-2025-4598, CVE-2026-29111), ncurses-libs-6.2-8.20210508.el9 (CVE-2023-29491), perl-POSIX-1.94-479.el9 (CVE-2023-47038, CVE-2025-40909), tpm2-tss-3.0.3-8.el9 (CVE-2023-22745), glib2-2.68.4-5.el9 (CVE-2024-34397, CVE-2024-52533, CVE-2025-13601, CVE-2025-4373), vim-minimal-2:8.2.2637-20.el9_1 (CVE-2025-53905, CVE-2026-25749, CVE-2026-28421), libpq-devel-13.5-1.el9 (CVE-2025-12818), perl-interpreter-4:5.32.1-479.el9 (CVE-2023-47038, CVE-2025-40909), perl-DynaLoader-1.47-479.el9 (CVE-2023-47038, CVE-2025-40909), glibc-minimal-langpack-2.34-40.el9_1.1 (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2024-33600, CVE-2025-0395, CVE-2025-4802, CVE-2025-5702, CVE-2025-8058), perl-AutoLoader-5.74-479.el9 (CVE-2023-47038, CVE-2025-40909), curl-minimal-7.76.1-19.el9_1.1 (CVE-2023-23916, CVE-2023-27535, CVE-2023-27536, CVE-2023-27538, CVE-2023-28321, CVE-2023-46218, CVE-2024-2398, CVE-2025-9086), perl-if-0.60.800-479.el9 (CVE-2023-47038, CVE-2025-40909), krb5-libs-1.19.1-24.el9_1 (CVE-2020-17049, CVE-2023-36054, CVE-2024-26462, CVE-2024-37370, CVE-2024-37371, CVE-2025-24528, CVE-2025-3576), libxml2-devel-2.9.13-3.el9_1 (CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2023-39615, CVE-2024-25062, CVE-2025-32414, CVE-2025-32415, CVE-2025-6021, CVE-2025-9714), libsmartcols-2.37.4-9.el9 (CVE-2025-14104), glibc-gconv-extra-2.34-40.el9_1.1 (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2024-33600, CVE-2025-0395, CVE-2025-4802, CVE-2025-5702, CVE-2025-8058), systemd-250-12.el9_1.3 (CVE-2023-7008, CVE-2025-4598, CVE-2026-29111), sqlite-devel-3.34.1-6.el9_1 (CVE-2023-7104), binutils-gold-2.35.2-24.el9 (CVE-2022-4285, CVE-2025-11083), binutils-2.35.2-24.el9 (CVE-2022-4285, CVE-2025-11083), libarchive-3.5.3-3.el9 (CVE-2025-25724, CVE-2026-5121), perl-File-Copy-2.34-479.el9 (CVE-2023-47038, CVE-2025-40909), golang-src-1.18.9-1.el9_1 (CVE-2023-24532, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24538, CVE-2023-24539, CVE-2023-29400, CVE-2023-29402, CVE-2023-29406, CVE-2023-29409, CVE-2023-39326, CVE-2023-45285, CVE-2023-45289, CVE-2023-45290, CVE-2024-24783, CVE-2024-24784, CVE-2024-24785, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-9355, CVE-2025-22866, CVE-2025-22871, CVE-2025-4673, CVE-2025-47906, CVE-2025-47907, CVE-2025-58183, CVE-2025-61728, CVE-2025-68121), python3-3.9.14-1.el9_1.2 (CVE-2023-27043, CVE-2024-0450, CVE-2024-11168, CVE-2024-6232, CVE-2024-6923, CVE-2024-8088, CVE-2024-9287, CVE-2025-0938, CVE-2025-12084, CVE-2025-15366, CVE-2025-15367, CVE-2025-4330, CVE-2025-4435, CVE-2025-6069, CVE-2025-8194, CVE-2025-8291, CVE-2026-0865, CVE-2026-1299), libcap-2.48-8.el9 (CVE-2023-2603), perl-Fcntl-1.13-479.el9 (CVE-2023-47038, CVE-2025-40909), ncurses-6.2-8.20210508.el9 (CVE-2023-29491), libxml2-2.9.13-3.el9_1 (CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2023-39615, CVE-2024-25062, CVE-2025-32414, CVE-2025-32415, CVE-2025-6021, CVE-2025-9714), gcc-plugin-annobin-11.3.1-2.1.el9 (CVE-2020-11023)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 843&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched medium vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libX11-devel-1.7.0-7.el9 (CVE-2022-3554), util-linux-2.37.4-9.el9 (CVE-2026-27456), libcurl-devel-7.76.1-19.el9_1.1 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805, CVE-2026-4873, CVE-2026-5545, CVE-2026-5773, CVE-2026-6253, CVE-2026-6429), openldap-compat-2.6.2-3.el9 (CVE-2026-22185), bsdtar-3.5.3-3.el9 (CVE-2023-30571, CVE-2025-60753, CVE-2026-4426, CVE-2026-5745), libX11-1.7.0-7.el9 (CVE-2022-3554), nodejs-libs-1:16.18.1-3.el9_1 (CVE-2021-27290, CVE-2021-3807, CVE-2022-25883, CVE-2023-38552, CVE-2023-46809, CVE-2024-24806, CVE-2025-29087, CVE-2025-59464, CVE-2025-62408, CVE-2025-64118, CVE-2025-64756, CVE-2025-7458, CVE-2026-1527, CVE-2026-21712, CVE-2026-21713, CVE-2026-21714, CVE-2026-21717, CVE-2026-25547, CVE-2026-2581, CVE-2026-27903, CVE-2026-27904, CVE-2026-33671, CVE-2026-33672, CVE-2026-33750), tar-2:1.34-6.el9_1 (CVE-2025-64118, CVE-2026-33056, CVE-2026-5704), openssl-devel-1:3.0.1-47.el9_1 (CVE-2026-28390, CVE-2026-31790), python3-libs-3.9.14-1.el9_1.2 (CVE-2025-11468, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2025-4516, CVE-2026-0672, CVE-2026-1502, CVE-2026-3644, CVE-2026-4224, CVE-2026-5713, CVE-2026-6019), libtiff-devel-4.4.0-5.el9_1 (CVE-2023-25433, CVE-2023-25434, CVE-2023-25435, CVE-2023-3164, CVE-2023-6277, CVE-2025-61143, CVE-2025-61144, CVE-2025-61145, CVE-2025-8851), harfbuzz-2.7.4-8.el9 (CVE-2026-22693), go-srpm-macros-3.0.9-9.el9 (CVE-2024-8244, CVE-2026-32282), nodejs-full-i18n-1:16.18.1-3.el9_1 (CVE-2021-27290, CVE-2021-3807, CVE-2022-25883, CVE-2023-38552, CVE-2023-46809, CVE-2024-24806, CVE-2025-29087, CVE-2025-59464, CVE-2025-62408, CVE-2025-64118, CVE-2025-64756, CVE-2025-7458, CVE-2026-1527, CVE-2026-21712, CVE-2026-21713, CVE-2026-21714, CVE-2026-21717, CVE-2026-25547, CVE-2026-2581, CVE-2026-27903, CVE-2026-27904, CVE-2026-33671, CVE-2026-33672, CVE-2026-33750), systemd-pam-250-12.el9_1.3 (CVE-2026-4105), gdb-headless-10.2-10.el9 (CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-5245, CVE-2026-4647, CVE-2026-6844, CVE-2026-6845), golang-1.18.9-1.el9_1 (CVE-2021-3115, CVE-2021-42574, CVE-2023-39323, CVE-2025-22870, CVE-2025-22873, CVE-2025-47912, CVE-2025-58190, CVE-2025-61724, CVE-2025-61727, CVE-2025-68119, CVE-2026-27142, CVE-2026-27143, CVE-2026-27144, CVE-2026-32281, CVE-2026-32282, CVE-2026-32288, CVE-2026-32289, CVE-2026-33809, CVE-2026-33812, CVE-2026-6993), libgcrypt-1.10.0-8.el9_0 (CVE-2026-41989), libuuid-2.37.4-9.el9 (CVE-2026-27456), xz-libs-5.2.5-8.el9_0 (CVE-2026-34743), gnupg2-2.3.3-2.el9_0 (CVE-2025-68972), util-linux-core-2.37.4-9.el9 (CVE-2026-27456), libxslt-devel-1.1.34-9.el9 (CVE-2025-10911), libpng-devel-2:1.6.37-12.el9 (CVE-2025-28164, CVE-2025-64505, CVE-2025-64506, CVE-2026-33416, CVE-2026-33636, CVE-2026-34757), libcurl-minimal-7.76.1-19.el9_1.1 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805, CVE-2026-4873, CVE-2026-5545, CVE-2026-5773, CVE-2026-6253, CVE-2026-6429), wget-1.21.1-7.el9 (CVE-2021-31879, CVE-2024-10524), rsync-3.2.3-18.el9 (CVE-2024-12086), glibc-2.34-40.el9_1.1 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), libtiff-4.4.0-5.el9_1 (CVE-2023-25433, CVE-2023-25434, CVE-2023-25435, CVE-2023-3164, CVE-2023-6277, CVE-2025-61143, CVE-2025-61144, CVE-2025-61145, CVE-2025-8851), openssl-libs-1:3.0.1-47.el9_1 (CVE-2026-28390, CVE-2026-31790), glibc-common-2.34-40.el9_1.1 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), golang-bin-1.18.9-1.el9_1 (CVE-2021-3115, CVE-2021-42574, CVE-2023-39323, CVE-2025-22870, CVE-2025-22873, CVE-2025-47912, CVE-2025-58190, CVE-2025-61724, CVE-2025-61727, CVE-2025-68119, CVE-2026-27142, CVE-2026-27143, CVE-2026-27144, CVE-2026-32281, CVE-2026-32282, CVE-2026-32288, CVE-2026-32289, CVE-2026-33809, CVE-2026-33812, CVE-2026-6993), systemd-libs-250-12.el9_1.3 (CVE-2026-4105), harfbuzz-icu-2.7.4-8.el9 (CVE-2026-22693), libblkid-devel-2.37.4-9.el9 (CVE-2026-27456), libX11-common-1.7.0-7.el9 (CVE-2022-3554), npm-1:8.19.2-1.16.18.1.3.el9_1 (CVE-2021-27290, CVE-2021-3807, CVE-2022-25883, CVE-2023-38552, CVE-2023-46809, CVE-2024-24806, CVE-2025-29087, CVE-2025-59464, CVE-2025-62408, CVE-2025-64118, CVE-2025-64756, CVE-2025-7458, CVE-2026-1527, CVE-2026-21712, CVE-2026-21713, CVE-2026-21714, CVE-2026-21717, CVE-2026-25547, CVE-2026-2581, CVE-2026-27903, CVE-2026-27904, CVE-2026-33671, CVE-2026-33672, CVE-2026-33750), qt5-srpm-macros-5.15.3-1.el9 (CVE-2021-38593, CVE-2023-24607, CVE-2025-5683), harfbuzz-devel-2.7.4-8.el9 (CVE-2026-22693), openssh-8.7p1-24.el9_1 (CVE-2023-51767, CVE-2025-32728), libpng-2:1.6.37-12.el9 (CVE-2025-28164, CVE-2025-64505, CVE-2025-64506, CVE-2026-33416, CVE-2026-33636, CVE-2026-34757), glibc-langpack-en-2.34-40.el9_1.1 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), git-core-doc-2.31.1-3.el9_1 (CVE-2025-48386), openssh-clients-8.7p1-24.el9_1 (CVE-2023-51767, CVE-2025-32728), nodejs-docs-1:16.18.1-3.el9_1 (CVE-2021-27290, CVE-2021-3807, CVE-2022-25883, CVE-2023-38552, CVE-2023-46809, CVE-2024-24806, CVE-2025-29087, CVE-2025-59464, CVE-2025-62408, CVE-2025-64118, CVE-2025-64756, CVE-2025-7458, CVE-2026-1527, CVE-2026-21712, CVE-2026-21713, CVE-2026-21714, CVE-2026-21717, CVE-2026-25547, CVE-2026-2581, CVE-2026-27903, CVE-2026-27904, CVE-2026-33671, CVE-2026-33672, CVE-2026-33750), libmount-devel-2.37.4-9.el9 (CVE-2026-27456), git-2.31.1-3.el9_1 (CVE-2025-48386), git-core-2.31.1-3.el9_1 (CVE-2025-48386), expat-2.4.9-1.el9_1.1 (CVE-2026-32776, CVE-2026-32777, CVE-2026-32778), glibc-headers-2.34-40.el9_1.1 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), openssl-1:3.0.1-47.el9_1 (CVE-2026-28390, CVE-2026-31790), openldap-2.6.2-3.el9 (CVE-2026-22185), gdb-gdbserver-10.2-10.el9 (CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-5245, CVE-2026-4647, CVE-2026-6844, CVE-2026-6845), libxslt-1.1.34-9.el9 (CVE-2025-10911), glib2-devel-2.68.4-5.el9 (CVE-2025-14087, CVE-2025-14512, CVE-2026-1484, CVE-2026-1489), freetype-devel-2.10.4-9.el9 (CVE-2026-23865), gdb-10.2-10.el9 (CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-5245, CVE-2026-4647, CVE-2026-6844, CVE-2026-6845), go-toolset-1.18.9-1.el9_1 (CVE-2020-28362, CVE-2021-3115, CVE-2021-42574, CVE-2022-1705, CVE-2022-1962, CVE-2022-28131, CVE-2022-30630, CVE-2022-30631, CVE-2022-30632, CVE-2022-30633, CVE-2022-30635, CVE-2022-32148, CVE-2023-39323, CVE-2025-22870, CVE-2025-22873, CVE-2025-47912, CVE-2025-58190, CVE-2025-61724, CVE-2025-61727, CVE-2025-61728, CVE-2025-68119, CVE-2025-68121, CVE-2026-27142, CVE-2026-27143, CVE-2026-27144, CVE-2026-32281, CVE-2026-32282, CVE-2026-32288, CVE-2026-32289, CVE-2026-33809, CVE-2026-33812, CVE-2026-6993), gnutls-3.7.6-12.el9_0 (CVE-2026-3833), vim-filesystem-2:8.2.2637-20.el9_1 (CVE-2025-29768, CVE-2026-28418, CVE-2026-28419, CVE-2026-28420, CVE-2026-35177, CVE-2026-39881, CVE-2026-41411), xz-5.2.5-8.el9_0 (CVE-2026-34743), perl-Git-2.31.1-3.el9_1 (CVE-2025-48386), libX11-xcb-1.7.0-7.el9 (CVE-2022-3554), coreutils-single-8.32-32.el9 (CVE-2025-5278), libfdisk-2.37.4-9.el9 (CVE-2026-27456), libblkid-2.37.4-9.el9 (CVE-2026-27456), libmount-2.37.4-9.el9 (CVE-2026-27456), glibc-devel-2.34-40.el9_1.1 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), freetype-2.10.4-9.el9 (CVE-2026-23865), xz-devel-5.2.5-8.el9_0 (CVE-2026-34743), glibc-locale-source-2.34-40.el9_1.1 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), nodejs-1:16.18.1-3.el9_1 (CVE-2021-27290, CVE-2021-3807, CVE-2022-25883, CVE-2023-38552, CVE-2023-46809, CVE-2024-24806, CVE-2025-29087, CVE-2025-59464, CVE-2025-62408, CVE-2025-64118, CVE-2025-64756, CVE-2025-7458, CVE-2026-1527, CVE-2026-21712, CVE-2026-21713, CVE-2026-21714, CVE-2026-21717, CVE-2026-25547, CVE-2026-2581, CVE-2026-27903, CVE-2026-27904, CVE-2026-33671, CVE-2026-33672, CVE-2026-33750), libpq-13.5-1.el9 (CVE-2025-4207), systemd-rpm-macros-250-12.el9_1.3 (CVE-2026-4105), python3-pip-wheel-21.2.3-6.el9 (CVE-2023-45803, CVE-2025-50181, CVE-2025-50182, CVE-2026-25645, CVE-2026-32284), tpm2-tss-3.0.3-8.el9 (CVE-2024-29040), glib2-2.68.4-5.el9 (CVE-2025-14087, CVE-2025-14512, CVE-2026-1484, CVE-2026-1489), vim-minimal-2:8.2.2637-20.el9_1 (CVE-2025-29768, CVE-2026-28418, CVE-2026-28419, CVE-2026-28420, CVE-2026-35177, CVE-2026-39881, CVE-2026-41411), llvm-libs-14.0.6-1.el9 (CVE-2026-27903), libpq-devel-13.5-1.el9 (CVE-2025-4207), glibc-minimal-langpack-2.34-40.el9_1.1 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), curl-minimal-7.76.1-19.el9_1.1 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805, CVE-2026-4873, CVE-2026-5545, CVE-2026-5773, CVE-2026-6253, CVE-2026-6429), krb5-libs-1.19.1-24.el9_1 (CVE-2026-40355), libxml2-devel-2.9.13-3.el9_1 (CVE-2026-0990, CVE-2026-1757, CVE-2026-6732), libsmartcols-2.37.4-9.el9 (CVE-2026-27456), glibc-gconv-extra-2.34-40.el9_1.1 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), systemd-250-12.el9_1.3 (CVE-2026-4105), binutils-gold-2.35.2-24.el9 (CVE-2021-20197, CVE-2021-45078, CVE-2025-11081, CVE-2025-11082, CVE-2025-5245, CVE-2025-7545, CVE-2026-4647, CVE-2026-6844, CVE-2026-6845), binutils-2.35.2-24.el9 (CVE-2021-20197, CVE-2021-45078, CVE-2025-11081, CVE-2025-11082, CVE-2025-5245, CVE-2025-7545, CVE-2026-4647, CVE-2026-6844, CVE-2026-6845), libarchive-3.5.3-3.el9 (CVE-2023-30571, CVE-2025-60753, CVE-2026-4426, CVE-2026-5745), golang-src-1.18.9-1.el9_1 (CVE-2021-3115, CVE-2021-42574, CVE-2023-39323, CVE-2025-22870, CVE-2025-22873, CVE-2025-47912, CVE-2025-58190, CVE-2025-61724, CVE-2025-61727, CVE-2025-68119, CVE-2026-27142, CVE-2026-27143, CVE-2026-27144, CVE-2026-32281, CVE-2026-32282, CVE-2026-32288, CVE-2026-32289, CVE-2026-33809, CVE-2026-33812, CVE-2026-6993), python3-3.9.14-1.el9_1.2 (CVE-2025-11468, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2025-4516, CVE-2026-0672, CVE-2026-1502, CVE-2026-3644, CVE-2026-4224, CVE-2026-5713, CVE-2026-6019), libxml2-2.9.13-3.el9_1 (CVE-2026-0990, CVE-2026-1757, CVE-2026-6732)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 483&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with low/negligible vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libcurl-devel-7.76.1-19.el9_1.1 (CVE-2022-35252, CVE-2022-43552, CVE-2023-27533, CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), bsdtar-3.5.3-3.el9 (CVE-2022-36227), procps-ng-3.3.17-8.el9 (CVE-2023-4016), nodejs-libs-1:16.18.1-3.el9_1 (CVE-2023-23920, CVE-2023-24807, CVE-2023-31124, CVE-2024-25629, CVE-2025-23165, CVE-2026-21715, CVE-2026-21716), openssl-devel-1:3.0.1-47.el9_1 (CVE-2022-3358, CVE-2023-0464, CVE-2023-0465, CVE-2023-1255, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2023-6129, CVE-2023-6237, CVE-2024-0727, CVE-2024-2511, CVE-2024-4603, CVE-2024-4741, CVE-2024-5535, CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796), python3-libs-3.9.14-1.el9_1.2 (CVE-2024-0397, CVE-2024-4032, CVE-2024-5642, CVE-2024-7592, CVE-2025-6075), libtiff-devel-4.4.0-5.el9_1 (CVE-2023-6228), nodejs-full-i18n-1:16.18.1-3.el9_1 (CVE-2023-23920, CVE-2023-24807, CVE-2023-31124, CVE-2023-39333, CVE-2023-45143, CVE-2024-22018, CVE-2024-25629, CVE-2024-36137, CVE-2025-23165, CVE-2026-21715, CVE-2026-21716), gdb-headless-10.2-10.el9 (CVE-2021-3826), golang-1.18.9-1.el9_1 (CVE-2024-45341), libcurl-minimal-7.76.1-19.el9_1.1 (CVE-2022-35252, CVE-2022-43552, CVE-2023-27533, CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), glibc-2.34-40.el9_1.1 (CVE-2024-33601, CVE-2024-33602, CVE-2025-15281, CVE-2026-0861), lua-libs-5.4.4-2.el9_1 (CVE-2022-28805), libtiff-4.4.0-5.el9_1 (CVE-2023-6228), openssl-libs-1:3.0.1-47.el9_1 (CVE-2022-3358, CVE-2023-0464, CVE-2023-0465, CVE-2023-1255, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2023-6129, CVE-2023-6237, CVE-2024-0727, CVE-2024-2511, CVE-2024-4603, CVE-2024-4741, CVE-2024-5535, CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796), file-5.39-10.el9 (CVE-2022-48554), glibc-common-2.34-40.el9_1.1 (CVE-2024-33601, CVE-2024-33602), golang-bin-1.18.9-1.el9_1 (CVE-2024-45341), npm-1:8.19.2-1.16.18.1.3.el9_1 (CVE-2023-23920, CVE-2023-24807, CVE-2023-31124, CVE-2023-39333, CVE-2023-45143, CVE-2024-22018, CVE-2024-25629, CVE-2024-36137, CVE-2025-23165), qt5-srpm-macros-5.15.3-1.el9 (CVE-2023-32573), openssh-8.7p1-24.el9_1 (CVE-2026-35386, CVE-2026-35387, CVE-2026-35388), glibc-langpack-en-2.34-40.el9_1.1 (CVE-2024-33601, CVE-2024-33602), git-core-doc-2.31.1-3.el9_1 (CVE-2023-25815, CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2024-52006, CVE-2025-46835), openssh-clients-8.7p1-24.el9_1 (CVE-2026-35386, CVE-2026-35387, CVE-2026-35388), nodejs-docs-1:16.18.1-3.el9_1 (CVE-2023-23920, CVE-2023-24807, CVE-2023-31124, CVE-2023-39333, CVE-2023-45143, CVE-2024-22018, CVE-2024-25629, CVE-2024-36137, CVE-2025-23165, CVE-2026-21715, CVE-2026-21716), git-2.31.1-3.el9_1 (CVE-2023-25815, CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2024-52006, CVE-2025-46835), git-core-2.31.1-3.el9_1 (CVE-2023-25815, CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2024-52006, CVE-2025-46835), shadow-utils-2:4.9-5.el9 (CVE-2023-4641, CVE-2024-56433), file-libs-5.39-10.el9 (CVE-2022-48554), delve-1.8.3-1.el9 (CVE-2024-45341), glibc-headers-2.34-40.el9_1.1 (CVE-2024-33601, CVE-2024-33602), openssl-1:3.0.1-47.el9_1 (CVE-2022-3358, CVE-2023-0464, CVE-2023-0465, CVE-2023-1255, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2023-6129, CVE-2023-6237, CVE-2024-0727, CVE-2024-2511, CVE-2024-4603, CVE-2024-4741, CVE-2024-5535, CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796), gdb-gdbserver-10.2-10.el9 (CVE-2021-3826), glib2-devel-2.68.4-5.el9 (CVE-2023-29499, CVE-2023-32611, CVE-2023-32665), gdb-10.2-10.el9 (CVE-2021-3826), go-toolset-1.18.9-1.el9_1 (CVE-2024-45341), gnutls-3.7.6-12.el9_0 (CVE-2025-9820), vim-filesystem-2:8.2.2637-20.el9_1 (CVE-2021-3903, CVE-2023-4752), perl-Git-2.31.1-3.el9_1 (CVE-2023-25815, CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2024-52006, CVE-2025-46835), glibc-devel-2.34-40.el9_1.1 (CVE-2024-33601, CVE-2024-33602), glibc-locale-source-2.34-40.el9_1.1 (CVE-2024-33601, CVE-2024-33602), ncurses-base-6.2-8.20210508.el9 (CVE-2022-29458), nodejs-1:16.18.1-3.el9_1 (CVE-2023-23920, CVE-2023-24807, CVE-2023-31124, CVE-2023-39333, CVE-2023-45143, CVE-2024-22018, CVE-2024-25629, CVE-2024-36137, CVE-2025-23165, CVE-2026-21715, CVE-2026-21716), libpq-13.5-1.el9 (CVE-2022-41862), ncurses-libs-6.2-8.20210508.el9 (CVE-2022-29458), glib2-2.68.4-5.el9 (CVE-2023-29499, CVE-2023-32611, CVE-2023-32665), vim-minimal-2:8.2.2637-20.el9_1 (CVE-2021-3903, CVE-2023-4752), libpq-devel-13.5-1.el9 (CVE-2022-41862), glibc-minimal-langpack-2.34-40.el9_1.1 (CVE-2024-33601, CVE-2024-33602), curl-minimal-7.76.1-19.el9_1.1 (CVE-2022-35252, CVE-2022-43552, CVE-2023-27533, CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), krb5-libs-1.19.1-24.el9_1 (CVE-2024-26458, CVE-2024-26461), glibc-gconv-extra-2.34-40.el9_1.1 (CVE-2024-33601, CVE-2024-33602), libarchive-3.5.3-3.el9 (CVE-2022-36227), golang-src-1.18.9-1.el9_1 (CVE-2024-45341), python3-3.9.14-1.el9_1.2 (CVE-2024-0397, CVE-2024-4032, CVE-2024-5642, CVE-2024-7592, CVE-2025-6075), libcap-2.48-8.el9 (CVE-2023-2602), ncurses-6.2-8.20210508.el9 (CVE-2022-29458)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_low_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 235&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libX11-devel-1.7.0-7.el9 (CVE-2022-3555), libcurl-devel-7.76.1-19.el9_1.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224, CVE-2026-6276), bsdtar-3.5.3-3.el9 (CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), libX11-1.7.0-7.el9 (CVE-2022-3555), nodejs-libs-1:16.18.1-3.el9_1 (CVE-2023-39333, CVE-2023-45143, CVE-2024-21538, CVE-2025-47279, CVE-2025-5889, CVE-2025-70873, CVE-2026-21715, CVE-2026-21716, CVE-2026-22036, CVE-2026-27171), tar-2:1.34-6.el9_1 (CVE-2023-39804), sqlite-3.34.1-6.el9_1 (CVE-2024-0232, CVE-2025-70873), openssl-devel-1:3.0.1-47.el9_1 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232, CVE-2026-2673, CVE-2026-28388, CVE-2026-28389, CVE-2026-31789), python3-libs-3.9.14-1.el9_1.2 (CVE-2025-1795, CVE-2026-2297, CVE-2026-3479), libtiff-devel-4.4.0-5.el9_1 (CVE-2017-16232, CVE-2022-1056, CVE-2023-1916, CVE-2024-13978, CVE-2025-8961, CVE-2025-9165), pcre2-utf16-10.40-2.el9 (CVE-2022-41409), nodejs-full-i18n-1:16.18.1-3.el9_1 (CVE-2023-39333, CVE-2023-45143, CVE-2024-21538, CVE-2025-47279, CVE-2025-5889, CVE-2025-70873, CVE-2026-21715, CVE-2026-21716, CVE-2026-22036, CVE-2026-27171), pcre2-devel-10.40-2.el9 (CVE-2022-41409), gdb-headless-10.2-10.el9 (CVE-2022-47007, CVE-2022-47010, CVE-2022-47011, CVE-2024-57360, CVE-2025-11412, CVE-2025-11413, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-1150, CVE-2025-1151, CVE-2025-1152, CVE-2025-1153, CVE-2025-11839, CVE-2025-11840, CVE-2025-3198, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69644, CVE-2025-69645, CVE-2025-69646, CVE-2025-69647, CVE-2025-69648, CVE-2025-69649, CVE-2025-69650, CVE-2025-69651, CVE-2025-69652), golang-1.18.9-1.el9_1 (CVE-2026-27138, CVE-2026-27139), pcre2-utf32-10.40-2.el9 (CVE-2022-41409), libgcrypt-1.10.0-8.el9_0 (CVE-2026-41990), gnupg2-2.3.3-2.el9_0 (CVE-2022-3219, CVE-2025-30258, CVE-2026-24883), cpp-11.3.1-2.1.el9 (CVE-2022-27943), libxslt-devel-1.1.34-9.el9 (CVE-2025-11731), libpng-devel-2:1.6.37-12.el9 (CVE-2022-3857), libcurl-minimal-7.76.1-19.el9_1.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224, CVE-2026-6276), rsync-3.2.3-18.el9 (CVE-2026-27171), libstdc++-11.3.1-2.1.el9 (CVE-2022-27943), glibc-2.34-40.el9_1.1 (CVE-2026-4438), libtiff-4.4.0-5.el9_1 (CVE-2017-16232, CVE-2022-1056, CVE-2023-1916, CVE-2024-13978, CVE-2025-8961, CVE-2025-9165), openssl-libs-1:3.0.1-47.el9_1 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232, CVE-2026-2673, CVE-2026-28388, CVE-2026-28389, CVE-2026-31789), pkgconf-pkg-config-1.7.3-9.el9 (CVE-2023-24056), glibc-common-2.34-40.el9_1.1 (CVE-2026-4438), emacs-filesystem-1:27.2-6.el9 (CVE-2017-1000383), golang-bin-1.18.9-1.el9_1 (CVE-2026-27138, CVE-2026-27139), gawk-5.1.0-6.el9 (CVE-2023-4156), libX11-common-1.7.0-7.el9 (CVE-2022-3555), npm-1:8.19.2-1.16.18.1.3.el9_1 (CVE-2023-39333, CVE-2023-45143, CVE-2024-21538, CVE-2025-47279, CVE-2025-5889, CVE-2025-70873, CVE-2026-21715, CVE-2026-21716, CVE-2026-22036, CVE-2026-27171), qt5-srpm-macros-5.15.3-1.el9 (CVE-2025-23050), elfutils-default-yama-scope-0.187-5.el9 (CVE-2024-25260, CVE-2025-1371, CVE-2025-1376, CVE-2025-1377), libpng-2:1.6.37-12.el9 (CVE-2022-3857), glibc-langpack-en-2.34-40.el9_1.1 (CVE-2026-4438), gcc-11.3.1-2.1.el9 (CVE-2022-27943), nodejs-docs-1:16.18.1-3.el9_1 (CVE-2023-39333, CVE-2023-45143, CVE-2024-21538, CVE-2025-47279, CVE-2025-5889, CVE-2025-70873, CVE-2026-21715, CVE-2026-21716, CVE-2026-22036, CVE-2026-27171), patch-2.7.6-16.el9 (CVE-2021-45261), libstdc++-devel-11.3.1-2.1.el9 (CVE-2022-27943), gcc-c++-11.3.1-2.1.el9 (CVE-2022-27943), expat-2.4.9-1.el9_1.1 (CVE-2025-66382, CVE-2026-24515, CVE-2026-41080), glibc-headers-2.34-40.el9_1.1 (CVE-2026-4438), openssl-1:3.0.1-47.el9_1 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232, CVE-2026-2673, CVE-2026-28388, CVE-2026-28389, CVE-2026-31789), libgcc-11.3.1-2.1.el9 (CVE-2022-27943), gdb-gdbserver-10.2-10.el9 (CVE-2022-47007, CVE-2022-47010, CVE-2022-47011, CVE-2024-57360, CVE-2025-11412, CVE-2025-11413, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-1150, CVE-2025-1151, CVE-2025-1152, CVE-2025-1153, CVE-2025-11839, CVE-2025-11840, CVE-2025-3198, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69644, CVE-2025-69645, CVE-2025-69646, CVE-2025-69647, CVE-2025-69648, CVE-2025-69649, CVE-2025-69650, CVE-2025-69651, CVE-2025-69652), libtasn1-4.16.0-8.el9_1 (CVE-2025-13151), libxslt-1.1.34-9.el9 (CVE-2025-11731), glib2-devel-2.68.4-5.el9 (CVE-2023-32636, CVE-2025-3360, CVE-2025-7039, CVE-2026-0988, CVE-2026-1485), gdb-10.2-10.el9 (CVE-2022-47007, CVE-2022-47010, CVE-2022-47011, CVE-2024-57360, CVE-2025-11412, CVE-2025-11413, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-1150, CVE-2025-1151, CVE-2025-1152, CVE-2025-1153, CVE-2025-11839, CVE-2025-11840, CVE-2025-3198, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69644, CVE-2025-69645, CVE-2025-69646, CVE-2025-69647, CVE-2025-69648, CVE-2025-69649, CVE-2025-69650, CVE-2025-69651, CVE-2025-69652), unzip-6.0-56.el9 (CVE-2021-4217, CVE-2022-0529, CVE-2022-0530), go-toolset-1.18.9-1.el9_1 (CVE-2026-27138, CVE-2026-27139), elfutils-libelf-0.187-5.el9 (CVE-2024-25260, CVE-2025-1371, CVE-2025-1376, CVE-2025-1377), libpkgconf-1.7.3-9.el9 (CVE-2023-24056), gnutls-3.7.6-12.el9_0 (CVE-2026-3832), vim-filesystem-2:8.2.2637-20.el9_1 (CVE-2021-3927, CVE-2021-3928, CVE-2021-3968, CVE-2021-3973, CVE-2021-3974, CVE-2021-4136, CVE-2021-4166, CVE-2021-4173, CVE-2021-4187, CVE-2022-0213, CVE-2022-0351, CVE-2022-1616, CVE-2022-1619, CVE-2022-1620, CVE-2022-1674, CVE-2022-1720, CVE-2022-1725, CVE-2022-2042, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-2129, CVE-2022-2175, CVE-2022-2182, CVE-2022-2183, CVE-2022-2206, CVE-2022-2207, CVE-2022-2208, CVE-2022-2210, CVE-2022-2257, CVE-2022-2284, CVE-2022-2285, CVE-2022-2286, CVE-2022-2287, CVE-2022-2304, CVE-2022-2343, CVE-2022-2344, CVE-2022-2345, CVE-2022-2522, CVE-2022-2817, CVE-2022-2819, CVE-2022-2845, CVE-2022-2849, CVE-2022-2862, CVE-2022-2874, CVE-2022-2889, CVE-2022-2923, CVE-2022-2946, CVE-2022-2980, CVE-2022-2982, CVE-2022-3016, CVE-2022-3037, CVE-2022-3099, CVE-2022-3134, CVE-2022-3153, CVE-2022-3234, CVE-2022-3235, CVE-2022-3256, CVE-2022-3278, CVE-2022-3296, CVE-2022-3297, CVE-2022-3324, CVE-2022-3352, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2023-0512, CVE-2023-1127, CVE-2023-1170, CVE-2023-1175, CVE-2023-1264, CVE-2023-2609, CVE-2023-2610, CVE-2023-46246, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4751, CVE-2023-4781, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2024-22667, CVE-2024-41957, CVE-2024-41965, CVE-2024-43374, CVE-2024-43802, CVE-2024-45306, CVE-2024-47814, CVE-2025-1215, CVE-2025-22134, CVE-2025-24014, CVE-2025-26603, CVE-2026-26269, CVE-2026-28422), sqlite-libs-3.34.1-6.el9_1 (CVE-2024-0232, CVE-2025-70873), pcre2-syntax-10.40-2.el9 (CVE-2022-41409), zlib-devel-1.2.11-35.el9_1 (CVE-2026-27171), libX11-xcb-1.7.0-7.el9 (CVE-2022-3555), libgomp-11.3.1-2.1.el9 (CVE-2022-27943), elfutils-libs-0.187-5.el9 (CVE-2024-25260, CVE-2025-1371, CVE-2025-1376, CVE-2025-1377), glibc-devel-2.34-40.el9_1.1 (CVE-2026-4438), pkgconf-m4-1.7.3-9.el9 (CVE-2023-24056), glibc-locale-source-2.34-40.el9_1.1 (CVE-2026-4438), ncurses-base-6.2-8.20210508.el9 (CVE-2023-50495), nodejs-1:16.18.1-3.el9_1 (CVE-2023-39333, CVE-2023-45143, CVE-2024-21538, CVE-2025-47279, CVE-2025-5889, CVE-2025-70873, CVE-2026-21715, CVE-2026-21716, CVE-2026-22036, CVE-2026-27171), ncurses-libs-6.2-8.20210508.el9 (CVE-2023-50495), python3-pip-wheel-21.2.3-6.el9 (CVE-2021-3572), glib2-2.68.4-5.el9 (CVE-2023-32636, CVE-2025-3360, CVE-2025-7039, CVE-2026-0988, CVE-2026-1485), vim-minimal-2:8.2.2637-20.el9_1 (CVE-2021-3927, CVE-2021-3928, CVE-2021-3968, CVE-2021-3973, CVE-2021-3974, CVE-2021-4136, CVE-2021-4166, CVE-2021-4173, CVE-2021-4187, CVE-2022-0213, CVE-2022-0351, CVE-2022-1616, CVE-2022-1619, CVE-2022-1620, CVE-2022-1674, CVE-2022-1720, CVE-2022-1725, CVE-2022-2042, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-2129, CVE-2022-2175, CVE-2022-2182, CVE-2022-2183, CVE-2022-2206, CVE-2022-2207, CVE-2022-2208, CVE-2022-2210, CVE-2022-2257, CVE-2022-2284, CVE-2022-2285, CVE-2022-2286, CVE-2022-2287, CVE-2022-2304, CVE-2022-2343, CVE-2022-2344, CVE-2022-2345, CVE-2022-2522, CVE-2022-2817, CVE-2022-2819, CVE-2022-2845, CVE-2022-2849, CVE-2022-2862, CVE-2022-2874, CVE-2022-2889, CVE-2022-2923, CVE-2022-2946, CVE-2022-2980, CVE-2022-2982, CVE-2022-3016, CVE-2022-3037, CVE-2022-3099, CVE-2022-3134, CVE-2022-3153, CVE-2022-3234, CVE-2022-3235, CVE-2022-3256, CVE-2022-3278, CVE-2022-3296, CVE-2022-3297, CVE-2022-3324, CVE-2022-3352, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2023-0512, CVE-2023-1127, CVE-2023-1170, CVE-2023-1175, CVE-2023-1264, CVE-2023-2609, CVE-2023-2610, CVE-2023-46246, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4751, CVE-2023-4781, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2024-22667, CVE-2024-41957, CVE-2024-41965, CVE-2024-43374, CVE-2024-43802, CVE-2024-45306, CVE-2024-47814, CVE-2025-1215, CVE-2025-22134, CVE-2025-24014, CVE-2025-26603, CVE-2026-26269, CVE-2026-28422), cmake-filesystem-3.20.2-7.el9 (CVE-2025-9301), elfutils-debuginfod-client-0.187-5.el9 (CVE-2024-25260, CVE-2025-1371, CVE-2025-1376, CVE-2025-1377), glibc-minimal-langpack-2.34-40.el9_1.1 (CVE-2026-4438), zlib-1.2.11-35.el9_1 (CVE-2026-27171), curl-minimal-7.76.1-19.el9_1.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224, CVE-2026-6276), libxml2-devel-2.9.13-3.el9_1 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170, CVE-2026-0989, CVE-2026-0992), glibc-gconv-extra-2.34-40.el9_1.1 (CVE-2026-4438), sqlite-devel-3.34.1-6.el9_1 (CVE-2024-0232, CVE-2025-70873), pkgconf-1.7.3-9.el9 (CVE-2023-24056), binutils-gold-2.35.2-24.el9 (CVE-2021-3826, CVE-2022-38533, CVE-2022-44840, CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011, CVE-2023-1972, CVE-2024-57360, CVE-2025-11412, CVE-2025-11413, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-1150, CVE-2025-1151, CVE-2025-1152, CVE-2025-1153, CVE-2025-11839, CVE-2025-11840, CVE-2025-3198, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69644, CVE-2025-69645, CVE-2025-69646, CVE-2025-69647, CVE-2025-69648, CVE-2025-69649, CVE-2025-69650, CVE-2025-69651, CVE-2025-69652), pcre2-10.40-2.el9 (CVE-2022-41409), binutils-2.35.2-24.el9 (CVE-2021-3826, CVE-2022-38533, CVE-2022-44840, CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011, CVE-2023-1972, CVE-2024-57360, CVE-2025-11412, CVE-2025-11413, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-1150, CVE-2025-1151, CVE-2025-1152, CVE-2025-1153, CVE-2025-11839, CVE-2025-11840, CVE-2025-3198, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69644, CVE-2025-69645, CVE-2025-69646, CVE-2025-69647, CVE-2025-69648, CVE-2025-69649, CVE-2025-69650, CVE-2025-69651, CVE-2025-69652), libarchive-3.5.3-3.el9 (CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), golang-src-1.18.9-1.el9_1 (CVE-2026-27138, CVE-2026-27139), python3-3.9.14-1.el9_1.2 (CVE-2025-1795, CVE-2026-2297, CVE-2026-3479), ncurses-6.2-8.20210508.el9 (CVE-2023-50495), libxml2-2.9.13-3.el9_1 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170, CVE-2026-0989, CVE-2026-0992), gcc-plugin-annobin-11.3.1-2.1.el9 (CVE-2022-27943)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_low_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 613&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unknown vulnerabilities. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libwebp-1.2.0-3.el9 (CVE-2023-5129), libwebp-devel-1.2.0-3.el9 (CVE-2023-5129)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unknown_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 2&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;]&#xA;&#x9;}&#xA;]&#xA;{&#34;vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:330,&#34;medium&#34;:843,&#34;low&#34;:235,&#34;unknown&#34;:2},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:27,&#34;medium&#34;:483,&#34;low&#34;:613,&#34;unknown&#34;:0}}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#34;, &#34;digests&#34;: [&#34;sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#34;]}}&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:11:18+00:00&#34;,&#34;note&#34;:&#34;Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-clamav-scan-pod | init container: prepare&#xA;2026/05/06 07:07:29 Entrypoint initialization&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-clamav-scan-pod | init container: place-scripts&#xA;2026/05/06 07:08:09 Decoded script /tekton/scripts/script-0-6tv2q&#xA;2026/05/06 07:08:09 Decoded script /tekton/scripts/script-1-4qltg&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-clamav-scan-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll@sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 169.178 sec (2 m 49 s)&#xA;Start Date: 2026:05:06 07:08:52&#xA;End Date:   2026:05:06 07:11:41&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27992/Tue May  5 06:26:41 2026 Database version: 27992&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1778051502&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778051502&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778051502&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#34;, &#34;digests&#34;: [&#34;sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#34;]}}&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-clamav-scan-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll&#xA;Attaching to quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b@sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading a011038cb1ac clamscan-result-amd64.log&#xA;Uploading 1706cd7339ff clamscan-ec-test-amd64.json&#xA;Uploaded  a011038cb1ac clamscan-result-amd64.log&#xA;Uploaded  1706cd7339ff clamscan-ec-test-amd64.json&#xA;Uploading f1606a421b89 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  f1606a421b89 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b@sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#xA;Digest: sha256:f1606a421b89f6bc9ab82c9566bee99b71c7a0ad19624f881df0b0caae99df64&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-clone-repository-pod | init container: prepare&#xA;2026/05/06 07:03:50 Entrypoint initialization&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-clone-repository-pod | init container: place-scripts&#xA;2026/05/06 07:03:51 Decoded script /tekton/scripts/script-0-kr42g&#xA;2026/05/06 07:03:51 Decoded script /tekton/scripts/script-1-57dmc&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051035.567318,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051035.762987,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/group-snapshot-multi-component @ a5839952a803695473c9db1daaf20da0c2f5d74b (grafted, HEAD) in path /workspace/output/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051035.7630491,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778051035.7865872,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /workspace/output/source&#34;}&#xA;Merge option disabled. Using checked-out revision a5839952a803695473c9db1daaf20da0c2f5d74b directly.&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-init-pod | init container: prepare&#xA;2026/05/06 07:03:40 Entrypoint initialization&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-init-pod | container step-init: &#xA;time=&#34;2026-05-06T07:03:43Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-06T07:03:43Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-06T07:03:43Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-06T07:03:43Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-06T07:03:43Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-06T07:03:43Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:03:43Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-06T07:03:43Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-06T07:03:43Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-push-dockerfile-pod | init container: prepare&#xA;2026/05/06 07:08:44 Entrypoint initialization&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-push-dockerfile-pod | init container: working-dir-initializer&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-push-dockerfile-pod | container step-push: &#xA;time=&#34;2026-05-06T07:08:48Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#34;&#xA;time=&#34;2026-05-06T07:08:48Z&#34; level=info msg=&#34;[param] image-digest: sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#34;&#xA;time=&#34;2026-05-06T07:08:48Z&#34; level=info msg=&#34;[param] containerfile: docker/Dockerfile&#34;&#xA;time=&#34;2026-05-06T07:08:48Z&#34; level=info msg=&#34;[param] context: go-component&#34;&#xA;time=&#34;2026-05-06T07:08:48Z&#34; level=info msg=&#34;[param] tag-suffix: .dockerfile&#34;&#xA;time=&#34;2026-05-06T07:08:48Z&#34; level=info msg=&#34;[param] artifact-type: application/vnd.konflux.dockerfile&#34;&#xA;time=&#34;2026-05-06T07:08:48Z&#34; level=info msg=&#34;[param] source: source&#34;&#xA;time=&#34;2026-05-06T07:08:48Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-06T07:08:48Z&#34; level=info msg=&#34;[param] alternative-filename: Dockerfile&#34;&#xA;time=&#34;2026-05-06T07:08:49Z&#34; level=info msg=&#34;oras [stdout] quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll@sha256:05aaf91de526831a3433869e89c10d6e2439d0a6f18e8ff250257fceb5cbb089&#34; logger=CliExecutor&#xA;time=&#34;2026-05-06T07:08:49Z&#34; level=info msg=&#34;Containerfile &#39;/workspace/workspace/source/go-component/docker/Dockerfile&#39; is pushed to registry with tag: sha256-c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d.dockerfile&#34;&#xA;{&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll@sha256:05aaf91de526831a3433869e89c10d6e2439d0a6f18e8ff250257fceb5cbb089&#34;}&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-sast-snyk-check-pod | init container: prepare&#xA;2026/05/06 07:08:46 Entrypoint initialization&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-sast-snyk-check-pod | init container: place-scripts&#xA;2026/05/06 07:08:48 Decoded script /tekton/scripts/script-0-75fcz&#xA;2026/05/06 07:08:48 Decoded script /tekton/scripts/script-1-88gzl&#xA;&#xA; pod: go-component-dlsyll-on-pull-request-j8lb7-sast-snyk-check-pod | init container: working-dir-initializer&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-sast-snyk-check-pod | container step-sast-snyk-check: &#xA;INFO: The PROJECT_NAME used is: go-component-dlsyll&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;{&#34;result&#34;:&#34;SKIPPED&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:08:55+00:00&#34;,&#34;note&#34;:&#34;Task sast-snyk-check skipped: If you wish to use the Snyk code SAST task, please create a secret name snyk-secret with the key &#39;snyk_token&#39; containing the Snyk token by following the steps given [here](https://konflux-ci.dev/docs/testing/build/snyk/)&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA;pod: go-component-dlsyll-on-pull-request-j8lb7-sast-snyk-check-pod | container step-upload: &#xA;No sast_snyk_check_out.sarif exists. Skipping upload.&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: go-component-dlsyll-on-pull9ee313c35627e8c84fa3e281c81f3a74-pod | init container: prepare&#xA;2026/05/06 07:04:10 Entrypoint initialization&#xA;&#xA; pod: go-component-dlsyll-on-pull9ee313c35627e8c84fa3e281c81f3a74-pod | init container: place-scripts&#xA;2026/05/06 07:04:10 Decoded script /tekton/scripts/script-0-mclg2&#xA;&#xA;pod: go-component-dlsyll-on-pull9ee313c35627e8c84fa3e281c81f3a74-pod | container step-prefetch-dependencies: &#xA;Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using mounted service CA bundle: /mnt/service-ca/ca-bundle.crt&#xA;&#39;/mnt/service-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/service-ca.crt&#39;&#xA;time=&#34;2026-05-06T07:04:16Z&#34; level=debug msg=&#34;Starting prefetch-dependencies&#34;&#xA;time=&#34;2026-05-06T07:04:16Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:04:16Z&#34; level=info msg=&#34;Not using package registry proxy because allow-package-registry-proxy is not set to `true` on the cluster level&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-06T07:04:16Z&#34; level=info msg=&#34;[param] source-dir: /workspace/source/source&#34;&#xA;time=&#34;2026-05-06T07:04:16Z&#34; level=info msg=&#34;[param] output-dir: /workspace/source/cachi2/output&#34;&#xA;time=&#34;2026-05-06T07:04:16Z&#34; level=info msg=&#34;[param] sbom-format: spdx&#34;&#xA;time=&#34;2026-05-06T07:04:16Z&#34; level=info msg=&#34;[param] mode: strict&#34;&#xA;time=&#34;2026-05-06T07:04:16Z&#34; level=info msg=&#34;[param] output-dir-mount-point: /cachi2/output&#34;&#xA;time=&#34;2026-05-06T07:04:16Z&#34; level=info msg=&#34;[param] env-files: [/workspace/source/cachi2/cachi2.env /workspace/source/cachi2/prefetch.env /workspace/source/cachi2/prefetch-env.json]&#34;&#xA;time=&#34;2026-05-06T07:04:16Z&#34; level=info msg=&#34;[param] git-auth-directory: /workspace/git-basic-auth&#34;&#xA;time=&#34;2026-05-06T07:04:17Z&#34; level=info msg=&#34;hermeto [stdout] hermeto 0.51.0&#34; logger=CliExecutor&#xA;time=&#34;2026-05-06T07:04:18Z&#34; level=warning msg=&#34;No input provided; skipping prefetch-dependencies&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-06T07:04:18Z&#34; level=debug msg=&#34;Finished prefetch-dependencies&#34;&#xA;&#xA; pod: go-component-dlsyll-on-pullbcb951ca44a6643c8edadc8b2f306a2a-pod | init container: prepare&#xA;2026/05/06 07:08:27 Entrypoint initialization&#xA;&#xA; pod: go-component-dlsyll-on-pullbcb951ca44a6643c8edadc8b2f306a2a-pod | init container: place-scripts&#xA;2026/05/06 07:08:28 Decoded script /tekton/scripts/script-0-jqm7h&#xA;2026/05/06 07:08:28 Decoded script /tekton/scripts/script-1-zxnkf&#xA;2026/05/06 07:08:29 Decoded script /tekton/scripts/script-2-sv4hx&#xA;2026/05/06 07:08:29 Decoded script /tekton/scripts/script-3-6nt6z&#xA;2026/05/06 07:08:29 Decoded script /tekton/scripts/script-4-776bq&#xA;2026/05/06 07:08:29 Decoded script /tekton/scripts/script-5-jgmrl&#xA;&#xA;pod: go-component-dlsyll-on-pullbcb951ca44a6643c8edadc8b2f306a2a-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#xA;The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: go-component-dlsyll-on-pullbcb951ca44a6643c8edadc8b2f306a2a-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#xA;Using token for quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: go-component-dlsyll-on-pullbcb951ca44a6643c8edadc8b2f306a2a-pod | container step-set-skip-for-bundles: &#xA;2026/05/06 07:08:50 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: go-component-dlsyll-on-pullbcb951ca44a6643c8edadc8b2f306a2a-pod | container step-app-check: &#xA;time=&#34;2026-05-06T07:08:51Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.17.2 &lt;commit: eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&gt;&#34;&#xA;time=&#34;2026-05-06T07:08:52Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b for platform amd64&#34;&#xA;time=&#34;2026-05-06T07:08:52Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#34;&#xA;time=&#34;2026-05-06T07:09:16Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-2113255330/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-05-06T07:09:16Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-05-06T07:09:16Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-05-06T07:09:16Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-05-06T07:09:16Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages result=PASSED&#xA;time=&#34;2026-05-06T07:09:16Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=PASSED&#xA;time=&#34;2026-05-06T07:09:16Z&#34; level=info msg=&#34;USER 1001 specified that is non-root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-06T07:09:16Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=PASSED&#xA;time=&#34;2026-05-06T07:09:46Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-05-06T07:09:46Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=PASSED&#xA;time=&#34;2026-05-06T07:09:46Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b will be paired with digest sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.17.2&#34;,&#xA;        &#34;commit&#34;: &#34;eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 110,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 29541,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 391,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: []&#xA;    }&#xA;}&#xA;time=&#34;2026-05-06T07:09:46Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;&#xA;pod: go-component-dlsyll-on-pullbcb951ca44a6643c8edadc8b2f306a2a-pod | container step-app-set-outcome: &#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1778051387&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#xA;&#xA;pod: go-component-dlsyll-on-pullbcb951ca44a6643c8edadc8b2f306a2a-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1778051387&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}&#xA; pod: go-component-dlsyll-on-pulldfcd628380e10417233ca582b3fb3ea5-pod | init container: prepare&#xA;2026/05/06 07:08:44 Entrypoint initialization&#xA;&#xA; pod: go-component-dlsyll-on-pulldfcd628380e10417233ca582b3fb3ea5-pod | init container: place-scripts&#xA;2026/05/06 07:08:44 Decoded script /tekton/scripts/script-0-4f7tx&#xA;2026/05/06 07:08:44 Decoded script /tekton/scripts/script-1-6m54g&#xA;&#xA; pod: go-component-dlsyll-on-pulldfcd628380e10417233ca582b3fb3ea5-pod | init container: working-dir-initializer&#xA;&#xA;pod: go-component-dlsyll-on-pulldfcd628380e10417233ca582b3fb3ea5-pod | container step-sast-unicode-check: &#xA;+ . /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;INFO: The PROJECT_NAME used is: go-component-dlsyll&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=go-component-dlsyll&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: go-component-dlsyll&#39;&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;+ SCAN_PROP=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58&#xA;+ FUC_EXIT_CODE=0&#xA;+ declare -a ALL_TARGETS&#xA;+ OLD_IFS=&#39; &#x9;&#xA;&#39;&#xA;+ IFS=,&#xA;+ for d in $TARGET_DIRS&#xA;+ ALL_TARGETS+=(&#34;${SOURCE_CODE_DIR}/source/${d}&#34;)&#xA;+ IFS=&#39; &#x9;&#xA;&#39;&#xA;+ LANG=en_US.utf8&#xA;+ find_unicode_control.py -p bidi -v -d -t /workspace/workspace/source/.&#xA;+ [[ 0 -ne 0 ]]&#xA;+ sed -i raw_sast_unicode_check_out.txt -E -e &#39;s|(.*:[0-9]+)(.*)|\1: warning:\2|&#39; -e &#39;s|^|Error: UNICONTROL_WARNING:\n|&#39;&#xA;+ CSGERP_OPTS=(--mode=json --remove-duplicates --embed-context=3 --set-scan-prop=&#34;${SCAN_PROP}&#34; --strip-path-prefix=&#34;${SOURCE_CODE_DIR}&#34;/source/)&#xA;+ csgrep --mode=json --remove-duplicates --embed-context=3 --set-scan-prop=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58 --strip-path-prefix=/workspace/workspace/source/ raw_sast_unicode_check_out.txt&#xA;+ csgrep --mode=evtstat processed_sast_unicode_check_out.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;+ mv processed_sast_unicode_check_out.json sast_unicode_check_out.json&#xA;+ csgrep --mode=sarif sast_unicode_check_out.json&#xA;+ [[ 0 -eq 0 ]]&#xA;+ note=&#39;Task sast-unicode-check success: No finding was detected&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task sast-unicode-check success: No finding was detected&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task sast-unicode-check success: No finding was detected&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-06T07:08:56+00:00 --arg result SUCCESS --arg note &#39;Task sast-unicode-check success: No finding was detected&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:08:56+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:08:56+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ ERROR_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:08:56+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:08:56+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-06T07:08:56+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: go-component-dlsyll-on-pulldfcd628380e10417233ca582b3fb3ea5-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll&#xA;Attaching to quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b@sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d sast_unicode_check_out.sarif:application/sarif+json&#xA;Preparing sast_unicode_check_out.sarif&#xA;Uploading 0e9806f310b4 sast_unicode_check_out.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploaded  0e9806f310b4 sast_unicode_check_out.sarif&#xA;Uploading 2a10262161e5 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  2a10262161e5 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/group-uztv/go-component-dlsyll:on-pr-a5839952a803695473c9db1daaf20da0c2f5d74b@sha256:c053d095b5cbfcdcb81dc6c9e56b3469240fe9fb9367477d0becb289c651631d&#xA;Digest: sha256:2a10262161e5732019298ce96bcb10d447126b22fde32aef2fff32a37462bbf0&#xA;No excluded-findings.json exists. Skipping upload.&#xA;New PipelineRun go-component-dlsyll-on-pull-request-fsc9w found after retrigger for component group-uztv/go-component-dlsyll&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w found for Component group-uztv/go-component-dlsyll&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: ResolvingTaskRef&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Running&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Completed&#xA;&lt; Exit [It] should lead to build PipelineRunA finishing successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:231 @ 05/06/26 07:18:38.459 (14m56.902s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:38.459&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:38.463 (3ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A should lead to a PaC PR creation for componentA go-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.451863992">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for componentA go-component - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:236 @ 05/06/26 07:18:38.473&#xA;&lt; Exit [It] should lead to a PaC PR creation for componentA go-component - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:236 @ 05/06/26 07:18:38.925 (451ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:38.925&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:38.925 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.008171574">
              <system-err>&gt; Enter [It] checks if the Snapshot is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:258 @ 05/06/26 07:18:38.926&#xA;&lt; Exit [It] checks if the Snapshot is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:258 @ 05/06/26 07:18:38.933 (8ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:38.934&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:38.934 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.08388458">
              <system-err>&gt; Enter [It] should find the related Integration PipelineRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:263 @ 05/06/26 07:18:38.934&#xA;&lt; Exit [It] should find the related Integration PipelineRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:263 @ 05/06/26 07:18:39.018 (83ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:39.018&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:39.018 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.006706893">
              <system-err>&gt; Enter [It] integration pipeline should end up with success - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:270 @ 05/06/26 07:18:39.018&#xA;PipelineRun integration-resolver-pipelinerun-rf59c reason: Succeeded&#xA;&lt; Exit [It] integration pipeline should end up with success - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:270 @ 05/06/26 07:18:39.025 (6ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:39.025&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:39.025 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="2.348440713">
              <system-err>&gt; Enter [It] should merge the init PaC PR successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:277 @ 05/06/26 07:18:39.025&#xA;merged result sha: f05a1231ddc54d23de27733de98e74c2dae23cff for PR #21703&#xA;&lt; Exit [It] should merge the init PaC PR successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:277 @ 05/06/26 07:18:41.373 (2.348s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:41.374&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:41.374 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B creates the Component B successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="10.02918202">
              <system-err>&gt; Enter [It] creates the Component B successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:296 @ 05/06/26 07:18:41.374&#xA;&lt; Exit [It] creates the Component B successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:296 @ 05/06/26 07:18:51.403 (10.029s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:51.403&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:18:51.403 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B triggers a Build PipelineRun for component python-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="20.056677001">
              <system-err>&gt; Enter [It] triggers a Build PipelineRun for component python-component - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:304 @ 05/06/26 07:18:51.404&#xA;Build PipelineRun has not been created yet for the componentB group-uztv/python-component-quemif&#xA;&lt; Exit [It] triggers a Build PipelineRun for component python-component - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:304 @ 05/06/26 07:19:11.46 (20.056s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:19:11.46&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:19:11.46 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000278908">
              <system-err>&gt; Enter [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:318 @ 05/06/26 07:19:11.461&#xA;&lt; Exit [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:318 @ 05/06/26 07:19:11.461 (0s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:19:11.461&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:19:11.461 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B should lead to build PipelineRun finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="300.017200166">
              <system-err>&gt; Enter [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:322 @ 05/06/26 07:19:11.461&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb found for Component group-uztv/python-component-quemif&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun python-component-quemif-on-pull-request-prvjb reason: Running&#xA;PipelineRun integration-resolver-pipelinerun-6xj7c reason: Succeeded&#xA;&lt; Exit [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:322 @ 05/06/26 07:24:11.478 (5m0.017s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:11.478&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:11.479 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B should lead to a PaC PR creation for component python-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.33124339">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for component python-component - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:327 @ 05/06/26 07:24:11.479&#xA;&lt; Exit [It] should lead to a PaC PR creation for component python-component - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:327 @ 05/06/26 07:24:11.81 (331ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:11.81&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:11.81 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.008966715">
              <system-err>&gt; Enter [It] checks if the Snapshot is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:349 @ 05/06/26 07:24:11.811&#xA;&lt; Exit [It] checks if the Snapshot is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:349 @ 05/06/26 07:24:11.819 (9ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:11.819&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:11.819 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.005820295">
              <system-err>&gt; Enter [It] should find the related Integration PipelineRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:354 @ 05/06/26 07:24:11.82&#xA;&lt; Exit [It] should find the related Integration PipelineRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:354 @ 05/06/26 07:24:11.825 (6ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:11.826&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:11.826 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.005809235">
              <system-err>&gt; Enter [It] integration pipeline should end up with success - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:361 @ 05/06/26 07:24:11.826&#xA;PipelineRun integration-resolver-pipelinerun-6xj7c reason: Succeeded&#xA;&lt; Exit [It] integration pipeline should end up with success - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:361 @ 05/06/26 07:24:11.831 (6ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:11.832&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:11.832 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="1.9955921509999999">
              <system-err>&gt; Enter [It] should merge the init PaC PR successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:368 @ 05/06/26 07:24:11.832&#xA;merged result sha: c62bf6ca0f05ea831c50c3c086c7fcd269b36e95 for PR #21707&#xA;&lt; Exit [It] should merge the init PaC PR successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:368 @ 05/06/26 07:24:13.827 (1.995s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:13.827&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:13.827 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C creates the Component C successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="10.061264668">
              <system-err>&gt; Enter [It] creates the Component C successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:387 @ 05/06/26 07:24:13.828&#xA;&lt; Exit [It] creates the Component C successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:387 @ 05/06/26 07:24:23.889 (10.061s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:23.889&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:23.889 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C triggers a Build PipelineRun for componentC konflux-test-integration-clone [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="20.029551334">
              <system-err>&gt; Enter [It] triggers a Build PipelineRun for componentC konflux-test-integration-clone - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:395 @ 05/06/26 07:24:23.89&#xA;Build PipelineRun has not been created yet for the componentC group-uztv/konflux-test-integration-clone-xdzkqc&#xA;&lt; Exit [It] triggers a Build PipelineRun for componentC konflux-test-integration-clone - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:395 @ 05/06/26 07:24:43.919 (20.029s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:43.919&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:43.919 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000265887">
              <system-err>&gt; Enter [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:409 @ 05/06/26 07:24:43.92&#xA;&lt; Exit [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:409 @ 05/06/26 07:24:43.92 (0s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:43.92&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:24:43.92 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C should lead to build PipelineRun finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="200.042977636">
              <system-err>&gt; Enter [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:413 @ 05/06/26 07:24:43.92&#xA;PipelineRun konflux-test-integration-clone-xdzkqc-on-pull-request-8pd9w found for Component group-uztv/konflux-test-integration-clone-xdzkqc&#xA;PipelineRun konflux-test-integration-clone-xdzkqc-on-pull-request-8pd9w reason: Running&#xA;PipelineRun konflux-test-integration-clone-xdzkqc-on-pull-request-8pd9w reason: Running&#xA;PipelineRun konflux-test-integration-clone-xdzkqc-on-pull-request-8pd9w reason: Running&#xA;PipelineRun konflux-test-integration-clone-xdzkqc-on-pull-request-8pd9w reason: Running&#xA;PipelineRun konflux-test-integration-clone-xdzkqc-on-pull-request-8pd9w reason: Running&#xA;PipelineRun konflux-test-integration-clone-xdzkqc-on-pull-request-8pd9w reason: Running&#xA;PipelineRun konflux-test-integration-clone-xdzkqc-on-pull-request-8pd9w reason: Running&#xA;PipelineRun konflux-test-integration-clone-xdzkqc-on-pull-request-8pd9w reason: Running&#xA;PipelineRun konflux-test-integration-clone-xdzkqc-on-pull-request-8pd9w reason: Running&#xA;PipelineRun konflux-test-integration-clone-xdzkqc-on-pull-request-8pd9w reason: Running&#xA;PipelineRun integration-resolver-pipelinerun-h45pj reason: Succeeded&#xA;&lt; Exit [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:413 @ 05/06/26 07:28:03.963 (3m20.043s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:03.963&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:03.963 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C should lead to a PaC PR creation for componentC konflux-test-integration-clone [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.388447502">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for componentC konflux-test-integration-clone - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:418 @ 05/06/26 07:28:03.964&#xA;&lt; Exit [It] should lead to a PaC PR creation for componentC konflux-test-integration-clone - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:418 @ 05/06/26 07:28:04.352 (388ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:04.352&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:04.352 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007801059">
              <system-err>&gt; Enter [It] checks if the Snapshot is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:440 @ 05/06/26 07:28:04.353&#xA;&lt; Exit [It] checks if the Snapshot is created - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:440 @ 05/06/26 07:28:04.36 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:04.36&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:04.36 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.006490301">
              <system-err>&gt; Enter [It] should find the related Integration PipelineRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:445 @ 05/06/26 07:28:04.361&#xA;&lt; Exit [It] should find the related Integration PipelineRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:445 @ 05/06/26 07:28:04.367 (6ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:04.367&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:04.367 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.006300596">
              <system-err>&gt; Enter [It] integration pipeline should end up with success - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:452 @ 05/06/26 07:28:04.368&#xA;PipelineRun integration-resolver-pipelinerun-h45pj reason: Succeeded&#xA;&lt; Exit [It] integration pipeline should end up with success - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:452 @ 05/06/26 07:28:04.374 (6ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:04.374&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:04.374 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="1.960652624">
              <system-err>&gt; Enter [It] should merge the init PaC PR successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:459 @ 05/06/26 07:28:04.374&#xA;merged result sha: ba44463a1fcf5c228196c32f0adfa2e12bc60ad4 for PR #9129&#xA;&lt; Exit [It] should merge the init PaC PR successfully - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:459 @ 05/06/26 07:28:06.335 (1.96s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:06.335&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:06.335 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged should make change to the root folder [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="2.939879829">
              <system-err>&gt; Enter [It] should make change to the root folder - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:479 @ 05/06/26 07:28:06.336&#xA;PR #21710 got created with sha 2e70ad4803910d228b91676cf40c0715db7ef024&#xA;&lt; Exit [It] should make change to the root folder - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:479 @ 05/06/26 07:28:09.275 (2.939s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:09.275&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:09.275 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged should make change to the multiple-repo [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="2.165076244">
              <system-err>&gt; Enter [It] should make change to the multiple-repo - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:497 @ 05/06/26 07:28:09.276&#xA;PR #9130 got created with sha 68ad7f32bfd03aa574b16197d5915efd229435c3&#xA;&lt; Exit [It] should make change to the multiple-repo - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:497 @ 05/06/26 07:28:11.441 (2.165s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:11.441&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:11.441 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged wait for the last components build to finish [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.043156856">
              <system-err>&gt; Enter [It] wait for the last components build to finish - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:513 @ 05/06/26 07:28:11.442&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w found for Component group-uztv/go-component-dlsyll&#xA;PipelineRun go-component-dlsyll-on-pull-request-fsc9w reason: Completed&#xA;PipelineRun integration-resolver-pipelinerun-6xj7c found for Component group-uztv/python-component-quemif&#xA;PipelineRun integration-resolver-pipelinerun-6xj7c reason: Succeeded&#xA;PipelineRun integration-resolver-pipelinerun-h45pj found for Component group-uztv/konflux-test-integration-clone-xdzkqc&#xA;PipelineRun integration-resolver-pipelinerun-h45pj reason: Succeeded&#xA;&lt; Exit [It] wait for the last components build to finish - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:513 @ 05/06/26 07:28:11.484 (43ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:11.485&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:11.485 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged wait for all component snapshots to be created with proper PR group annotations [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.008032644">
              <system-err>&gt; Enter [It] wait for all component snapshots to be created with proper PR group annotations - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:521 @ 05/06/26 07:28:11.485&#xA;Component snapshot integ-app-prtm-20260506-071214-000 has PR group annotation: konflux-go-component-dlsyll&#xA;Component snapshot integ-app-prtm-20260506-071852-000 is missing PR group annotation&#xA;Component snapshot integ-app-prtm-20260506-071858-000 has PR group annotation: konflux-python-component-quemif&#xA;Component snapshot integ-app-prtm-20260506-072429-000 has PR group annotation: konflux-konflux-test-integration-clone-xdzkqc&#xA;All component snapshots are ready with PR group annotations&#xA;&lt; Exit [It] wait for all component snapshots to be created with proper PR group annotations - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:521 @ 05/06/26 07:28:11.493 (8ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:11.493&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:28:11.493 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged get all group snapshots and check if pr-group annotation contains all components [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="330.44910069">
              <system-err>&gt; Enter [It] get all group snapshots and check if pr-group annotation contains all components - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:556 @ 05/06/26 07:28:11.494&#xA;Attempting to find group snapshots for application integ-app-prtm in namespace group-uztv&#xA;Found 4 component snapshots:&#xA;PR Groups found: map[konflux-go-component-dlsyll:1 konflux-konflux-test-integration-clone-xdzkqc:1 konflux-python-component-quemif:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-prtm in namespace group-uztv&#xA;Found 4 component snapshots:&#xA;PR Groups found: map[konflux-go-component-dlsyll:1 konflux-konflux-test-integration-clone-xdzkqc:1 konflux-python-component-quemif:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-prtm in namespace group-uztv&#xA;Found 5 component snapshots:&#xA;PR Groups found: map[konflux-go-component-dlsyll:1 konflux-konflux-test-integration-clone-xdzkqc:1 konflux-python-component-quemif:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-prtm in namespace group-uztv&#xA;Found 5 component snapshots:&#xA;PR Groups found: map[konflux-go-component-dlsyll:1 konflux-konflux-test-integration-clone-xdzkqc:1 konflux-python-component-quemif:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-prtm in namespace group-uztv&#xA;Found 5 component snapshots:&#xA;PR Groups found: map[konflux-go-component-dlsyll:1 konflux-konflux-test-integration-clone-xdzkqc:1 konflux-python-component-quemif:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-prtm in namespace group-uztv&#xA;Found 5 component snapshots:&#xA;PR Groups found: map[konflux-go-component-dlsyll:1 konflux-konflux-test-integration-clone-xdzkqc:1 konflux-python-component-quemif:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-prtm in namespace group-uztv&#xA;Found 5 component snapshots:&#xA;PR Groups found: map[konflux-go-component-dlsyll:1 konflux-konflux-test-integration-clone-xdzkqc:1 konflux-python-component-quemif:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-prtm in namespace group-uztv&#xA;Found 5 component snapshots:&#xA;PR Groups found: map[konflux-go-component-dlsyll:1 konflux-konflux-test-integration-clone-xdzkqc:1 konflux-python-component-quemif:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-prtm in namespace group-uztv&#xA;Found 6 component snapshots:&#xA;PR Groups found: map[konflux-go-component-dlsyll:1 konflux-konflux-test-integration-clone-xdzkqc:1 konflux-python-component-quemif:1 pr-branch-nlbauj:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-prtm in namespace group-uztv&#xA;Found 6 component snapshots:&#xA;PR Groups found: map[konflux-go-component-dlsyll:1 konflux-konflux-test-integration-clone-xdzkqc:1 konflux-python-component-quemif:1 pr-branch-nlbauj:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-prtm in namespace group-uztv&#xA;Found 7 component snapshots:&#xA;PR Groups found: map[konflux-go-component-dlsyll:1 konflux-konflux-test-integration-clone-xdzkqc:1 konflux-python-component-quemif:1 pr-branch-nlbauj:2]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-prtm in namespace group-uztv&#xA;Found 8 component snapshots:&#xA;PR Groups found: map[konflux-go-component-dlsyll:1 konflux-konflux-test-integration-clone-xdzkqc:1 konflux-python-component-quemif:1 pr-branch-nlbauj:3]&#xA;Found 1 group snapshots!&#xA;  Group Snapshot 0: integ-app-prtm-20260506-073336-408 (type: group)&#xA;    Group Test Info: [{&#34;namespace&#34;:&#34;group-uztv&#34;,&#34;component&#34;:&#34;go-component-dlsyll&#34;,&#34;buildPipelineRun&#34;:&#34;go-component-dlsyll-on-pull-request-dzf7q&#34;,&#34;snapshot&#34;:&#34;integ-app-prtm-20260506-072813-000-2t&#34;,&#34;repoUrl&#34;:&#34;https://github.com/redhat-appstudio-qe/group-snapshot-multi-component&#34;,&#34;pullRequestNumber&#34;:&#34;21710&#34;},{&#34;namespace&#34;:&#34;group-uztv&#34;,&#34;component&#34;:&#34;python-component-quemif&#34;,&#34;buildPipelineRun&#34;:&#34;python-component-quemif-on-pull-request-r6m8l&#34;,&#34;snapshot&#34;:&#34;integ-app-prtm-20260506-072813-000&#34;,&#34;repoUrl&#34;:&#34;https://github.com/redhat-appstudio-qe/group-snapshot-multi-component&#34;,&#34;pullRequestNumber&#34;:&#34;21710&#34;},{&#34;namespace&#34;:&#34;group-uztv&#34;,&#34;component&#34;:&#34;konflux-test-integration-clone-xdzkqc&#34;,&#34;buildPipelineRun&#34;:&#34;konflux-test-integration-clone-xdzkqc-on-pull-request-25bng&#34;,&#34;snapshot&#34;:&#34;integ-app-prtm-20260506-072815-000&#34;,&#34;repoUrl&#34;:&#34;https://github.com/redhat-appstudio-qe/konflux-test-integration-clone&#34;,&#34;pullRequestNumber&#34;:&#34;9130&#34;}]&#xA;Validating group test info annotation: [{&#34;namespace&#34;:&#34;group-uztv&#34;,&#34;component&#34;:&#34;go-component-dlsyll&#34;,&#34;buildPipelineRun&#34;:&#34;go-component-dlsyll-on-pull-request-dzf7q&#34;,&#34;snapshot&#34;:&#34;integ-app-prtm-20260506-072813-000-2t&#34;,&#34;repoUrl&#34;:&#34;https://github.com/redhat-appstudio-qe/group-snapshot-multi-component&#34;,&#34;pullRequestNumber&#34;:&#34;21710&#34;},{&#34;namespace&#34;:&#34;group-uztv&#34;,&#34;component&#34;:&#34;python-component-quemif&#34;,&#34;buildPipelineRun&#34;:&#34;python-component-quemif-on-pull-request-r6m8l&#34;,&#34;snapshot&#34;:&#34;integ-app-prtm-20260506-072813-000&#34;,&#34;repoUrl&#34;:&#34;https://github.com/redhat-appstudio-qe/group-snapshot-multi-component&#34;,&#34;pullRequestNumber&#34;:&#34;21710&#34;},{&#34;namespace&#34;:&#34;group-uztv&#34;,&#34;component&#34;:&#34;konflux-test-integration-clone-xdzkqc&#34;,&#34;buildPipelineRun&#34;:&#34;konflux-test-integration-clone-xdzkqc-on-pull-request-25bng&#34;,&#34;snapshot&#34;:&#34;integ-app-prtm-20260506-072815-000&#34;,&#34;repoUrl&#34;:&#34;https://github.com/redhat-appstudio-qe/konflux-test-integration-clone&#34;,&#34;pullRequestNumber&#34;:&#34;9130&#34;}]&#xA;Group snapshot validation completed successfully&#xA;&lt; Exit [It] get all group snapshots and check if pr-group annotation contains all components - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:556 @ 05/06/26 07:33:41.942 (5m30.449s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:33:41.942&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:33:41.943 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged make sure that group snapshot contains last build pipelinerun for each component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.216495223">
              <system-err>&gt; Enter [It] make sure that group snapshot contains last build pipelinerun for each component - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:635 @ 05/06/26 07:33:41.943&#xA;&lt; Exit [It] make sure that group snapshot contains last build pipelinerun for each component - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:635 @ 05/06/26 07:33:42.159 (216ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:33:42.159&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:33:42.159 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created make change to the multiple-repo to trigger a new cycle of testing [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.919505843">
              <system-err>&gt; Enter [It] make change to the multiple-repo to trigger a new cycle of testing - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:648 @ 05/06/26 07:33:42.16&#xA;&lt; Exit [It] make change to the multiple-repo to trigger a new cycle of testing - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:648 @ 05/06/26 07:33:43.079 (919ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:33:43.079&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:33:43.079 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created wait for the components A and B build to finish [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.119439921">
              <system-err>&gt; Enter [It] wait for the components A and B build to finish - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:654 @ 05/06/26 07:33:43.08&#xA;Waiting for build pipelineRun to be created for app group-uztv/integ-app-prtm, sha: 58a4be208d25707a69aa6cb33775dd105f3a34f4&#xA;PipelineRun go-component-dlsyll-on-pull-request-dzf7q found for Component group-uztv/go-component-dlsyll&#xA;PipelineRun go-component-dlsyll-on-pull-request-dzf7q reason: Completed&#xA;PipelineRun integration-resolver-pipelinerun-6xj7c found for Component group-uztv/python-component-quemif&#xA;PipelineRun integration-resolver-pipelinerun-6xj7c reason: Succeeded&#xA;&lt; Exit [It] wait for the components A and B build to finish - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:654 @ 05/06/26 07:33:43.199 (119ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:33:43.199&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:33:43.199 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created get all component snapshots for component A and check if older snapshot has been cancelled [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="340.299452932">
              <system-err>&gt; Enter [It] get all component snapshots for component A and check if older snapshot has been cancelled - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:663 @ 05/06/26 07:33:43.2&#xA;&lt; Exit [It] get all component snapshots for component A and check if older snapshot has been cancelled - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:663 @ 05/06/26 07:39:23.499 (5m40.299s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:39:23.499&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:39:23.499 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created get all group snapshots and check if older group snapshot is cancelled [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.099639208">
              <system-err>&gt; Enter [It] get all group snapshots and check if older group snapshot is cancelled - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:690 @ 05/06/26 07:39:23.5&#xA;&lt; Exit [It] get all group snapshots and check if older group snapshot is cancelled - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:690 @ 05/06/26 07:39:23.599 (99ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:39:23.599&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:39:23.599 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when ResolutionRequest is deleted after pipeline completes verifies that ResolutionRequest is deleted after pipeline resolution [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.220552907">
              <system-err>&gt; Enter [It] verifies that ResolutionRequest is deleted after pipeline resolution - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:720 @ 05/06/26 07:39:23.6&#xA;&lt; Exit [It] verifies that ResolutionRequest is deleted after pipeline resolution - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:720 @ 05/06/26 07:39:23.82 (220ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:39:23.82&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:39:23.82 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when ResolutionRequest is deleted after pipeline completes verifies that no orphaned ResolutionRequests remain in namespace after test completion [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.205705514">
              <system-err>&gt; Enter [It] verifies that no orphaned ResolutionRequests remain in namespace after test completion - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:740 @ 05/06/26 07:39:23.821&#xA;&lt; Exit [It] verifies that no orphaned ResolutionRequests remain in namespace after test completion - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:740 @ 05/06/26 07:39:24.026 (205ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:39:24.026&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:39:24.026 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when IntegrationTestScenario reference to task as pipelinerun resolution trigger pipelinerun for invalid integrationTestScenario by annotating snapshot and verify failing to create integration pipelinerun [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="26.431390133">
              <system-err>&gt; Enter [BeforeAll] when IntegrationTestScenario reference to task as pipelinerun resolution - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:775 @ 05/06/26 07:39:24.027&#xA;&lt; Exit [BeforeAll] when IntegrationTestScenario reference to task as pipelinerun resolution - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:775 @ 05/06/26 07:39:24.078 (51ms)&#xA;&gt; Enter [It] trigger pipelinerun for invalid integrationTestScenario by annotating snapshot and verify failing to create integration pipelinerun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:780 @ 05/06/26 07:39:24.078&#xA;&lt; Exit [It] trigger pipelinerun for invalid integrationTestScenario by annotating snapshot and verify failing to create integration pipelinerun - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:780 @ 05/06/26 07:39:44.132 (20.055s)&#xA;&gt; Enter [AfterAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:149 @ 05/06/26 07:39:44.132&#xA;&lt; Exit [AfterAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:149 @ 05/06/26 07:39:50.458 (6.325s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:39:50.458&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.x1MqQ7KQDy/tests/integration-service/group-snapshots-tests.go:50 @ 05/06/26 07:39:50.458 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies if the release CR is created [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies the rhtap release pipelinerun is running and succeeds [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies if the PR in infra-deployments repo is created/updated [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="110.925147618">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:72 @ 05/06/26 07:02:05.764&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;gh-multi-component-parent-pgxn&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:72 @ 05/06/26 07:02:56.563 (50.799s)&#xA;&gt; Enter [It] creates component with nudges - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:235 @ 05/06/26 07:02:56.563&#xA;Image repository for component gh-multi-component-child-pgxn in namespace build-e2e-wjua do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component gh-multi-component-child-pgxn in namespace build-e2e-wjua do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component gh-multi-component-parent-pgxn in namespace build-e2e-wjua do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;Image repository for component gh-multi-component-parent-pgxn in namespace build-e2e-wjua do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;    } []}.&#xA;&lt; Exit [It] creates component with nudges - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:235 @ 05/06/26 07:03:56.688 (1m0.125s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:03:56.688&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:03:56.688 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="40.069679845">
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:259 @ 05/06/26 07:03:56.689&#xA;PipelineRun has not been created yet for the component build-e2e-wjua/gh-multi-component-parent-pgxn&#xA;PipelineRun has not been created yet for the component build-e2e-wjua/gh-multi-component-parent-pgxn&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:259 @ 05/06/26 07:04:36.759 (40.069s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:04:36.759&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:04:36.759 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="420.014345437">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:274 @ 05/06/26 07:04:36.759&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 found for Component build-e2e-wjua/gh-multi-component-parent-pgxn&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-pull-request-hl2q7 reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:274 @ 05/06/26 07:11:36.773 (7m0.014s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:11:36.774&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:11:36.774 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="311.081900631">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:285 @ 05/06/26 07:11:36.774&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-g8gzh found for Component build-e2e-wjua/gh-multi-component-child-pgxn&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-g8gzh reason: Failed&#xA;attempt 1/3: PipelineRun &#34;gh-multi-component-child-pgxn-on-pull-request-g8gzh&#34; failed: &#xA; pod: gh-multi-component-child-pgxn-on-pull-request-g8gzh-init-pod | init container: prepare&#xA;2026/05/06 07:04:11 Entrypoint initialization&#xA;&#xA;pod: gh-multi-component-child-pgxn-on-pull-request-g8gzh-init-pod | container step-init: &#xA;time=&#34;2026-05-06T07:04:15Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-06T07:04:15Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-06T07:04:15Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-06T07:04:15Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-06T07:04:15Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-06T07:04:15Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-06T07:04:15Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-06T07:04:15Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-06T07:04:15Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj found after retrigger for component build-e2e-wjua/gh-multi-component-child-pgxn&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj found for Component build-e2e-wjua/gh-multi-component-child-pgxn&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Running&#xA;PipelineRun gh-multi-component-child-pgxn-on-pull-request-jhprj reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:285 @ 05/06/26 07:16:47.856 (5m11.082s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:16:47.856&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:16:47.856 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="0.22224312">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:289 @ 05/06/26 07:16:47.857&#xA;&lt; Exit [It] should lead to a PaC PR creation for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:289 @ 05/06/26 07:16:48.079 (222ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:16:48.079&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:16:48.079 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="2.638617277">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:307 @ 05/06/26 07:16:48.079&#xA;merged result sha: fe3c4c7135a256dc80675eab6653b729e3eaa87a for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:307 @ 05/06/26 07:16:50.717 (2.638s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:16:50.718&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:16:50.718 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="6.963859136">
              <system-err>&gt; Enter [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:318 @ 05/06/26 07:16:50.718&#xA;&lt; Exit [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:318 @ 05/06/26 07:16:57.682 (6.963s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:16:57.682&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:16:57.682 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="0.211109539">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:358 @ 05/06/26 07:16:57.683&#xA;&lt; Exit [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:358 @ 05/06/26 07:16:57.893 (211ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:16:57.894&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:16:57.894 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="2.104616392">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:375 @ 05/06/26 07:16:57.894&#xA;merged result sha: 6d08fbb7b8b864f7d80d7e990b97963f7a77ff1f for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:375 @ 05/06/26 07:16:59.998 (2.104s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:16:59.999&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:16:59.999 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="20.022277692">
              <system-err>&gt; Enter [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:385 @ 05/06/26 07:16:59.999&#xA;Push PipelineRun has not been created yet for the component build-e2e-wjua/gh-multi-component-parent-pgxn&#xA;&lt; Exit [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:385 @ 05/06/26 07:17:20.021 (20.022s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:17:20.021&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:17:20.021 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="280.016696984">
              <system-err>&gt; Enter [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:401 @ 05/06/26 07:17:20.022&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l found for Component build-e2e-wjua/gh-multi-component-parent-pgxn&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Running&#xA;PipelineRun gh-multi-component-parent-pgxn-on-push-tj62l reason: Succeeded&#xA;&lt; Exit [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:401 @ 05/06/26 07:22:00.038 (4m40.016s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:22:00.039&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:22:00.039 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="failed" time="1216.242915764">
              <failure message="Timed out after 1200.000s.&#xA;timed out when waiting for component nudge PR to be created in build-nudge-child-rixmca repository&#xA;Expected&#xA;    &lt;bool&gt;: false&#xA;to be true" type="failed">[FAILED] Timed out after 1200.000s.&#xA;timed out when waiting for component nudge PR to be created in build-nudge-child-rixmca repository&#xA;Expected&#xA;    &lt;bool&gt;: false&#xA;to be true&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:427 @ 05/06/26 07:42:00.04&#xA;</failure>
              <system-err>&gt; Enter [It] should lead to a nudge PR creation for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:412 @ 05/06/26 07:22:00.039&#xA;[FAILED] Timed out after 1200.000s.&#xA;timed out when waiting for component nudge PR to be created in build-nudge-child-rixmca repository&#xA;Expected&#xA;    &lt;bool&gt;: false&#xA;to be true&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:427 @ 05/06/26 07:42:00.04&#xA;&lt; Exit [It] should lead to a nudge PR creation for child component  - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:412 @ 05/06/26 07:42:00.04 (20m0.001s)&#xA;&gt; Enter [AfterAll] component update with renovate - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:214 @ 05/06/26 07:42:00.04&#xA;&lt; Exit [AfterAll] component update with renovate - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:214 @ 05/06/26 07:42:16.123 (16.083s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:42:16.123&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:28 @ 05/06/26 07:42:16.282 (159ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:429 @ 05/06/26 07:42:16.283&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.x1MqQ7KQDy/tests/build/renovate.go:440 @ 05/06/26 07:42:16.283&#xA;</system-err>
          </testcase>
      </testsuite>
  </testsuites>